tag:blogger.com,1999:blog-61934173092731542992024-03-05T18:44:13.282+10:00Contemporary CommunicationAnonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.comBlogger13125tag:blogger.com,1999:blog-6193417309273154299.post-49392188406730296522014-10-03T23:27:00.001+10:002014-10-03T23:29:28.934+10:00Video Assignment: What is Cloud Communication Technology?<iframe allowfullscreen="" frameborder="0" height="375" src="https://www.youtube.com/embed/vpMevpFtAlw" width="600"></iframe>Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-50796645837350177432014-09-26T10:23:00.003+10:002014-09-26T11:01:56.667+10:00Essay: Cyberspace Explored Through the Symbiotic Perspective<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><a href="http://johnbendix.wordpress.com/2013/01/03/the-matrix-movie-review/" target="_blank"><img alt="http://johnbendix.wordpress.com/2013/01/03/the-matrix-movie-review/" src="http://johnbendix.files.wordpress.com/2013/01/amatrix1.jpg" height="356" id="irc_mi" style="margin-top: 29px;" width="600" /></a><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-AU</w:LidThemeOther>
<w:LidThemeAsian>ZH-CN</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
<w:UseFELayout/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
DefSemiHidden="false" DefQFormat="false" DefPriority="99"
LatentStyleCount="371">
<w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index 9"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" Name="toc 9"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="header"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footer"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="index heading"/>
<w:LsdException Locked="false" Priority="35" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of figures"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="envelope return"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="footnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="line number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="page number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote reference"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="endnote text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="table of authorities"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="macro"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="toa heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Bullet 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Number 5"/>
<w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Closing"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Signature"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="true"
UnhideWhenUsed="true" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="List Continue 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Message Header"/>
<w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Salutation"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Date"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text First Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Note Heading"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Body Text Indent 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Block Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Hyperlink"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="FollowedHyperlink"/>
<w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Document Map"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Plain Text"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="E-mail Signature"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Top of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Bottom of Form"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal (Web)"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Acronym"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Address"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Cite"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Code"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Definition"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Keyboard"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Preformatted"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Sample"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Typewriter"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="HTML Variable"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Normal Table"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="annotation subject"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="No List"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Outline List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Simple 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Classic 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Colorful 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Columns 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Grid 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 4"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 5"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 6"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 7"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table List 8"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table 3D effects 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Contemporary"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Elegant"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Professional"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Subtle 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 1"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 2"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Web 3"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Balloon Text"/>
<w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
<w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
Name="Table Theme"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" QFormat="true"
Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" QFormat="true"
Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" QFormat="true"
Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" QFormat="true"
Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" QFormat="true"
Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" QFormat="true"
Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" SemiHidden="true"
UnhideWhenUsed="true" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" SemiHidden="true"
UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
<w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
<w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
<w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
<w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
<w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
<w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
<w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="Grid Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="Grid Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="Grid Table 7 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
<w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
<w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 1"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 1"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 2"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 2"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 3"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 3"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 4"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 4"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 5"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 5"/>
<w:LsdException Locked="false" Priority="46"
Name="List Table 1 Light Accent 6"/>
<w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
<w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
<w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
<w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
<w:LsdException Locked="false" Priority="51"
Name="List Table 6 Colorful Accent 6"/>
<w:LsdException Locked="false" Priority="52"
Name="List Table 7 Colorful Accent 6"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:8.0pt;
mso-para-margin-left:0cm;
line-height:107%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
<br />
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<br />
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">Cyberspace
has become the quintessential term for describing the vagueness and complexity
that surrounds human-computer interaction (Adams & Warf 1997). Many people
would have been unprepared for the <a href="https://www.youtube.com/watch?v=kA2ytAcVsvg" target="_blank">rapid ascension of technology</a> in daily life,
let alone the significance that the Internet and World Wide Web would have on
almost every aspect of society <span style="color: white;"><span style="background-color: black;">(</span></span></span><span style="color: white;"><span style="background-color: black;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Clark Wroclawski, Sollins, & Braden 2002)</span></span></span><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;"><span style="color: white;"><span style="background-color: black;">.</span></span> When something so significant appears in history,
man has the need to define it. This is a necessary thing to do in order to
provide frameworks for research, study and understanding, to communicate with
consistency, and to build on the creation that has been released upon the world.<span style="color: red;"> </span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">This
paper will discuss the current literature and commentary attempting to define
cyberspace, with the aim of providing clarity to the definition and its
potential for future use. First, the nature of cyberspace is briefly discussed,
contextualised through the writings of <a href="http://www.williamgibsonbooks.com/books/spook.asp" target="_blank">William Gibson</a>. Second, the paper
analyses various ways of defining cyberspace by introducing the <i style="mso-bidi-font-style: normal;">functionality perspective</i> and <i style="mso-bidi-font-style: normal;">experiential perspective</i>. Third, an
examination of these perspectives reveal that there is a symbiotic relationship
between them, which once recognised, can dilute the often convoluted definition
of cyberspace.<span style="mso-spacerun: yes;"> </span><span style="color: white;">The essay concludes, that
<span style="mso-themecolor: text1;">by utilising the <i style="mso-bidi-font-style: normal;">symbiotic perspective</i>, the greatest
understanding of cyberspace and its future in society can be achieved. </span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">The
term ‘cyberspace’ first appeared when William Gibson released his 1984
science-fiction novel, <a href="http://project.cyberpunk.ru/idb/neuromancer.html" target="_blank"><i style="mso-bidi-font-style: normal;">Neuromancer</i></a>.
In the book, Gibson describes cyberspace as a “consensual hallucination”,
alluding to the disembodied consciousness projected into a virtual realm by his
character ‘jacking in’ to cyberspace (Gibson 1984). Since that time, the
evolution of technology, and the way society interacts with technology, has
continuously shifted the dialogue of computing (Coyne 1998). Computing was once
considered a rival of human intelligence, due to the threat of <a href="http://www.sciencedaily.com/news/computers_math/artificial_intelligence/" target="_blank">Artificial Intelligence</a>
(Coyne 1998). However, the shift of the contemporary human-computer
relationship shows the dissolution of that fear. Computers are now considered an
indispensable component of human activity, and have a significant role in the
lives of millions of people around the world (Abraham 2000). What relationship
do these shifts in technology have to cyberspace? The nature of cyberspace can
be described as dynamic and flexible, shifting more endlessly than the
technology within which it resides (Cobb 1999). Issues of increasing human cognitive
ability have become far less important than the amplification of our vision to
observe aesthetically gratifying <a href="http://en.wikipedia.org/wiki/Graphical_user_interface" target="_blank">graphical interfaces</a> for obtaining the information
that resides within our technology (Heim 1991). Cyberspace is representative of
this change in focus, and has more relevance than ever, as technology becomes
increasingly pervasive throughout all aspects of society (Abraham 2000).<span style="mso-spacerun: yes;"> </span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;"><a href="https://etd.ohiolink.edu/rws_etd/document/get/bgsu1262720615/inline" target="_blank">Pralea<span style="font-family: inherit;"> </span>(2010)</a> makes the point though that “Pervasive as it is, digital technology
cannot account for a universal human experience” (p. 2). Using this thought as
a foundation, cyberspace can be broadly defined as what humans experience it to
be, and what it actually is. This leads to the two perspectives of cyberspace.
The <i style="mso-bidi-font-style: normal;">experiential perspective, </i>on one
hand, relates to how humans experience human-computer interaction, attempting
to explain cyberspace through numerous psychological, philosophical and
sociocultural approaches. The <i style="mso-bidi-font-style: normal;">functionality
perspective</i>, on the other hand, relates to the more tangible elements
within the human-computer relationship, attempting to explain cyberspace
through practicality and logic. The approaches to this perspective are common
in fields such as economics, governance, and military applications (Lord 2008;
Kobrin 2001). This distinction between perspectives, while initially creating
some barriers to understanding, ultimately assist in realising a more complete interpretation
of cyberspace. A visualisation of cyberspace becomes clear that it is outside
of individual perspectives, and outside of a real or unreal environment.
Cyberspace demonstrates it has become an interwoven fabric through both
physical spaces and the space between our minds. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">The<i style="mso-bidi-font-style: normal;"> </i>practical elements of cyberspace are deceivingly
simple, it’s functionality abundant with opportunity for interaction with any
number of applications. The internet was initially a concept for functionality,
and like all great inventions could not have realised the true limit of its
potential. A recorded description of <a href="http://en.wikipedia.org/wiki/J._C._R._Licklider" target="_blank">Licklider’s</a> 1962 vision of a “galactic
network” was to have a globally interconnected set of computers, that people
could access data and programs from, no matter what their location (Internet
Society 2014). Cyberspace was born from this vision over half a century ago,
but is no longer confined to it (Cobb 1999). Cyberspace is functionally
utilised with limitless purposes throughout individual, business and government
spheres. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;"><a href="http://www.jstor.org/discover/10.2307/3069472?uid=3737536&uid=2129&uid=2&uid=70&uid=4&sid=21104688057517" target="_blank">Kobrin (2001) </a>explores the territoriality and governance of cyberspace, questioning
the necessity of cyberspace to be self-regulated. He argues that “cyberspace
should not (and will not) remain free from taxation and regulation” (p. 688). The
cyber-warfare attacks launched on <a href="http://www.economist.com/node/9163598" target="_blank">Estonia in 2007</a>, crippling the country’s
information technology infrastructure, provides another example of the
functional possibilities of cyberspace (Lord 2008). The analyses of these
applications pertain to the <i style="mso-bidi-font-style: normal;">functionality
perspective</i> of cyberspace. This is the idea that cyberspace by itself,
separated in its virtual distinctness, is nothing. Definition’s stemming from
this perspective, regard cyberspace as another communication medium and a
structure that needs to be controlled in order to achieve strategic objectives.
<a href="http://www.journalofdemocracy.org/articles/gratis/Rohozinski-21-4.pdf" target="_blank">Deibert & Rohozinski (2010)</a> provide an insightful analogy to the condition
of cyberspace, likening it to “a gangster-dominated version of New York: a
tangled web of rival public and private authorities, civic associations,
criminal networks, and underground economies” (p. 44). A single observation of
the <i style="mso-bidi-font-style: normal;">functionality perspective</i> and its
materially developmental priorities may give one the opinion that it is a
wasteland for thought, inherently wicked and part only to the institutions of
global economics and governance. However, all the complications of our reality,
both physical and non-physical are reflected in the world behind the computer
screen. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">Behind
the screens lies a world, but no physical investigation of wires is able to
take you there. The paradox of the cyber-world is non-physical space<i style="mso-bidi-font-style: normal;"> </i>(Adams & Warf 1997). As </span><a href="https://etd.ohiolink.edu/rws_etd/document/get/bgsu1262720615/inline" target="_blank"><span style="color: white;"><span style="background-color: black;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Pralea</span></span></span></a><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;"><a href="https://etd.ohiolink.edu/rws_etd/document/get/bgsu1262720615/inline" target="_blank"><span style="color: white;"><span style="background-color: black;"> </span></span>(2010)</a> explains it: “[In fact,] there, there is no
there… nothing that resembles a world” (p. 61). Cyberspace is something that
exists, but only because of human-computer interaction. <a href="http://project.cyberpunk.ru/idb/erotic_ontology_of_cyberspace.html" target="_blank">Heim (1991)</a> considers
cyberspace “A metaphysical laboratory, a tool to examine our own sense of
reality” (p. 59). This type of analysis of cyberspace can be defined as the <i style="mso-bidi-font-style: normal;">experiential perspective</i>. Descriptions
through this perspective realise that cyberspace cannot exist in what we
consider to be reality, but exists and continues to evolve within the space
between our minds (Pralea 2010). This shared space that exists between our
minds brings together thoughts, ideas, emotions and information communicated
through text and images (Cobb 1999). <a href="http://onlinelibrary.wiley.com/doi/10.1111/j.1469-5812.2000.tb00445.x/abstract" target="_blank">Gur-Ze’ev (2000)</a> goes to the extent of
saying that “Cyberspace is a giant pleasure machine” (p. 227). This kind of
perception is further elaborated by Coyne (1999), who notes the high degree of <a href="http://www.vcu.edu/engweb/eng372/intro-h4.htm" target="_blank">romanticism</a>
present in contemporary cyberspace dialogue. People possess a growing disdain
for the limits of the body, hoping for an ultimate transcendence through
cyberspace, which may lead them to a more promising and truly democratic future
(Pralea 2010; </span><span style="background-color: black;"><span style="color: white;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Gur</span><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">‐</span><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Ze'ev 2000; Coyne 1999)</span></span></span><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;"><span style="background-color: black;">.</span> Feldman (2012) also observes the etymology of
‘space’, describing it as a social construct before a geographical territory,
underlining the necessity to recognise the social significance of cyberspace. It
is the <i style="mso-bidi-font-style: normal;">experiential perspective</i> that
moves cyberspace from a one-dimensional representation of technology, to a
realm of discovery that uncovers the dynamic and flexible nature of its
existence, while reflecting upon our own. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 11.0pt;">The
individual analyses of cyberspace, through the <i style="mso-bidi-font-style: normal;">functionality perspective </i>or <i style="mso-bidi-font-style: normal;">experiential
perspective</i> alone, is not sufficient for explicating the complexities of
cyberspace. Krueger (2007) alludes to the fact that cyberspace consists of both
tangible and abstract foundations. There is a physical existence present
between hardware devices and network data flows that is not separate, but interrelated
to the ‘experienced’ space where people connect both directly and indirectly
(Kruger 2007). It is the holistic approach, the symbiotic relationship between
the <i style="mso-bidi-font-style: normal;">functionality perspective</i> and the
<i style="mso-bidi-font-style: normal;">experiential perspective</i> that
promotes a higher understanding of cyberspace as both a technological and
sociocultural construction. The flexible and dynamic nature of cyberspace requires
the continuous construction and development of its parts. <a href="http://www.questia.com/library/journal/1G1-57532985/introduction-cyberspace-and-geographical-space" target="_blank">Adams & Warf (1997)</a>
highlight this continuum of technology and society, articulating that “Computer
network communications are not simply passive reiterations of an existing
social reality; they are integral to the constitution of society… [a] society
[that] constantly constructs and regulates itself” (p. 142). There is no centre
of control in cyberspace. It is a collaborative construct of the masses,
reflective of our own biological design. Therefore, it is the <i style="mso-bidi-font-style: normal;">symbiotic perspective</i> that is necessary
to attain a more complete definition of cyberspace. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; mso-layout-grid-align: none; text-align: justify; text-autospace: none; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><span style="font-size: 12.0pt; line-height: 150%;">The elusive answer to defining the
entirety of cyberspace, has curiously been within reach, but never entirely
attained. The reason for this is that cyberspace resides not only in the
virtual dimension of digital technologies, nor the real world in which that
technology is exploited. Consequently, attempts at defining cyberspace must
encompass the whole. The <i style="mso-bidi-font-style: normal;">functionality
perspective</i> and <i style="mso-bidi-font-style: normal;">experiential
perspective</i> are contained within a symbiotic relationship, assisting further
understanding and the evolution of cyberspace and its representations. Instead
of reducing the definition to an egocentric perception of the impact that technology
has on our lives, or the destructive abilities that can be delivered through
warfare applications, the answer is found to be that cyberspace is an interwoven
and highly pervasive construct. <span style="mso-spacerun: yes;"> </span>It is the
space between our minds that determines that cyberspace exists, and the space
between our screens that enables it to exist. Cyberspace is outside of a real
and unreal distinction, its entire representation unavailable to be defined.
However, the <i style="mso-bidi-font-style: normal;">symbiotic perspective</i>
will provide clarity as the presence of cyberspace continues to permeate our
lives, and will continue to do so as we move toward the ever-changing future of
the human-computer relationship. </span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; mso-layout-grid-align: none; text-align: justify; text-autospace: none; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; mso-layout-grid-align: none; text-align: justify; text-autospace: none; text-justify: inter-ideograph;">
<span style="font-family: inherit;"><br /></span></div>
<h3 style="margin-top: 0cm;">
<span style="font-family: inherit;">
References </span></h3>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Abraham, RH 2000, ‘Cyberspace and the Ecotopian
dream’,<span class="apple-converted-space"> </span><i>World Futures: Journal
of General Evolution</i>,<span class="apple-converted-space"> </span><span style="mso-bidi-font-style: italic;">vol. 55, no. </span>2, pp. 153-158.</span><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 16pt; line-height: 150%;"> </span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Adams, PC & Warf, B 1997, ‘Introduction:
cyberspace and geographical space’,<span class="apple-converted-space"> </span><i>Geographical
Review</i>,<span class="apple-converted-space"> vol. </span><span style="mso-bidi-font-style: italic;">87</span>, no. 2, pp. 139-145.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Clark, DD, Wroclawski, J, Sollins, KR &
Braden, R 2002 ‘Tussle in cyberspace: defining tomorrow's internet’, <i>ACM
SIGCOMM Computer Communication Review</i><span class="apple-converted-space">, </span>Vol.
32, No. 4, pp. 347-356.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Cobb, JJ 1999, ‘A spiritual experience of
cyberspace’,<span class="apple-converted-space"> </span><i>Technology in
Society</i>, vol. <span style="mso-bidi-font-style: italic;">21, no. </span>4, pp.
393-407.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Coyne, R 1998, ‘Cyberspace and Heidegger’s
pragmatics’,<span class="apple-converted-space"> </span><i>Information
Technology & People</i>,<span class="apple-converted-space"> vol. </span><span style="mso-bidi-font-style: italic;">11, no. </span>4, pp. 338-350.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Deibert, R & Rohozinski, R 2010, ‘Liberation
vs. control: The future of cyberspace’,<span class="apple-converted-space"> </span><i>Journal
of Democracy</i>,<span class="apple-converted-space"> vol. 21, no. </span>4,
pp. 43-57.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Feldman, Z 2012, ‘Simmel in cyberspace’,<span class="apple-converted-space"> </span><i>Information, Communication &
Society</i>,<span class="apple-converted-space"> vol. 15 no. </span>2, pp. 297-319.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Gibson, W 1995, <i style="mso-bidi-font-style: normal;">Neuromancer</i>,<span class="apple-converted-space"> </span><span style="mso-bidi-font-style: italic;">Ace Publishing, New York.</span></span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Gur</span><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">‐</span><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Ze'ev, I 2000, ‘Critical
education in cyberspace?’,<span class="apple-converted-space"> </span><i>Educational
Philosophy and Theory</i>,<span class="apple-converted-space"> </span><span style="mso-bidi-font-style: italic;">vol. 32, no. </span>2, pp. 209-231.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Heim, M. (1991). The erotic ontology of
cyberspace.<span class="apple-converted-space"> </span><i>Cyberspace: First
steps</i>, 59-80.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Internet Society. (2014). <i style="mso-bidi-font-style: normal;">Brief History of the Internet</i>, viewed 25 September 2014, <</span>
<a href="http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">http://www.internetsociety.org/internet/what-internet/history-internet/brief-history-internet</span></a><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">>. </span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Kobrin, SJ 2001, ‘Territoriality and the
Governance of Cyberspace’,<span class="apple-converted-space"> </span><i>Journal
of International Business Studies</i>, vol. 32, no. 4, pp. 687-704.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Krueger, T 2007, ‘Mapping Cyberspace: The Image
of the Internet’,<span class="apple-converted-space"> </span><i>Annals of
the History of Computing, IEEE</i>,<span class="apple-converted-space"> vol.
29, no. </span>1, pp. 100-100.</span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Lord, WT 2008,<span class="apple-converted-space"> ‘</span><span style="mso-bidi-font-style: italic;">USAF Cyberspace Command: To Fly and Fight in Cyberspace’, <i>Strategic
Studies Quarterly</i>, vol. 1, no, 3, pp. 5-18. </span><span style="mso-spacerun: yes;"> </span></span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="color: white;"><span style="background-color: black;"><span style="font-family: inherit;"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">Pralea, C 2010,<span class="apple-converted-space"> </span><i>A Hermeneutical Ontology of
Cyberspace</i><span class="apple-converted-space">, </span>Doctoral dissertation,
Bowling Green State University, viewed 15 Septembers 2014, via <</span> <a href="https://etd.ohiolink.edu/rws_etd/document/get/bgsu1262720615/inline"><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">https://etd.ohiolink.edu/rws_etd/document/get/bgsu1262720615/inline</span></a><span style="background-attachment: scroll; background-clip: border-box; background-image: none; background-origin: padding-box; background-position: 0% 0%; background-repeat: repeat; background-size: auto auto; font-size: 12pt; line-height: 150%;">> </span></span></span></span></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<br /></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: justify; text-justify: inter-ideograph;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com1tag:blogger.com,1999:blog-6193417309273154299.post-15053392650535701432014-09-25T23:45:00.003+10:002014-09-25T23:54:18.599+10:00Academic Journals and Brainstorming Map<span style="background-color: black; color: white; font-family: inherit;">List of academic papers related to cyberspace:</span><br />
<span style="background-color: black; color: white; font-family: inherit;"><br /><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Adams, PC & Warf, B 1997, ‘Introduction:
cyberspace and geographical space’,<span class="apple-converted-space"> </span><i>Geographical Review</i>,<span class="apple-converted-space"> vol. </span>87, no. 2, pp. 139-145.</span></span><br />
<span style="background-color: black;"><span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;"><br /></span></span>
<span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Clark, DD, Wroclawski, J, Sollins, KR &
Braden, R 2002 ‘Tussle in cyberspace: defining tomorrow's internet’, <i>ACM
SIGCOMM Computer Communication Review</i><span class="apple-converted-space">, </span>Vol.
32, No. 4, pp. 347-356.</span></span></span><br />
<span style="background-color: black;"><span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;"><br /></span></span>
<span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Cobb, JJ 1999, ‘A spiritual experience of
cyberspace’,<span class="apple-converted-space"> </span><i>Technology in
Society</i>, vol. 21, no. 4, pp.
393- 407.</span></span></span><br />
<span style="background-color: black;"><span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;"><br /></span></span>
<span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Coyne, R 1998, ‘Cyberspace and Heidegger’s pragmatics’,<span class="apple-converted-space"> </span><i>Information Technology & People</i>,<span class="apple-converted-space"> vol. </span>11, no. 4, pp. 338-350.</span></span></span><br />
<span style="background-color: black;"><span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;"><br /></span></span>
<span style="color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Deibert, R & Rohozinski, R 2010, ‘Liberation
vs. control: The future of cyberspace’,<span class="apple-converted-space"> </span><i>Journal
of Democracy</i>,<span class="apple-converted-space"> vol. 21, no. </span>4,
pp. 43-57.</span></span></span><br />
<span style="background-color: black; color: white; font-family: inherit;"><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;"><br /></span><span style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; font-size: 12pt; line-height: 150%;">Basic brainstorm created from<a href="https://bubbl.us/mindmap" target="_blank"> bubbl.us</a></span></span><br />
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<span style="background: white; color: #222222; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 150%; mso-bidi-font-size: 10.0pt;"></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV05tjrPCCsZI2sJhI0jNLqQ30X2cn3_v_ih_-KGrGyZ28WiVMoMqOoarKXrM0LI9OvtU6WyuPfCgKNUoAWV-bT4odzCXL10OVkGzefTnV0MHsqEiGHJbsLddrseGTHeXQJ7VOUTY2EalV/s1600/bubbl.us+++brainstorm+and+mind+map+online.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgV05tjrPCCsZI2sJhI0jNLqQ30X2cn3_v_ih_-KGrGyZ28WiVMoMqOoarKXrM0LI9OvtU6WyuPfCgKNUoAWV-bT4odzCXL10OVkGzefTnV0MHsqEiGHJbsLddrseGTHeXQJ7VOUTY2EalV/s1600/bubbl.us+++brainstorm+and+mind+map+online.png" height="352" width="600" /></a></div>
<div class="MsoNormal" style="line-height: 150%; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 36.0pt; margin-right: 0cm; margin-top: 0cm; mso-layout-grid-align: none; text-autospace: none; text-indent: -36.0pt;">
<br /></div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-52626550311584631032014-09-24T08:31:00.002+10:002014-09-24T08:31:45.425+10:00Incoming Essay: Defining Cyberspace<h4>
<span style="border: 1pt none windowtext; font-weight: normal; padding: 0cm;">An essay will be posted on this blog, from the topic below for a university assessment piece.</span></h4>
<h4>
<i><span style="border: 1pt none windowtext; font-weight: normal; padding: 0cm;">William Gibson says cyberspace is a consensual
hallucination. Is he right or is cyberspace just another part of the everyday
world? Is there a future for the concept of cyberspace? or is it time
to come up with a better term for human interaction with computer
networks?</span><o:p></o:p></i></h4>
<div>
Defining cyberspace can be a difficult task. There are various explanations that are simple. The simple explanations pertain to the functional side of cyberspace. The difficulty of defining cyberspace is rooted in the paradox of cyberspace - <i>cyberspace is a non-physical space</i>. From my recent literature review of cyberspace, I came to the conclusion that cyberspace has two main elements, two sides to it. The first is the functional element, previously mentioned. The second is the existential, experiential side. </div>
<div>
<br /></div>
<div>
This second element is extremely complicated, trying to pull together definitions from philosophy of mind, socio-cultural determinants, and it is this realm of cyberspace explanations that often carries the romanticism of cyber ideologies. </div>
<div>
<br /></div>
<div>
My essay will delve into both elements in an attempt to provide a more complete description of cyberspace, using the two elements previously mentioned as a simple framework. My essay will discuss William Gibson's original meaning of cyberspace as a consensual hallucination, and conclude that this description is entirely insufficient. To be fair, even Gibson didn't truly know what it meant. In an interview he says that he thought it and then saw it on the page and there it was. He couldn't have known the mutations in the use of the word that were to follow. </div>
<div>
<br /></div>
<div>
I will also address the topic question by arguing that there is a future for the concept of cyberspace. The ramifications that can occur in the economic and developed worlds due to misuse of computer power are a real threat, and there are plenty of people out there that want the internet sewn up with laws and regulations. The most insane idea I read about was that everybody who wanted to access the internet would have an individual ID. This ID would be like an access card with a security clearance. So depending on who you are, would determine what you are allowed to access and to do online. Governments are worried. It's been a long time since the Peace of Westphalia, and governments don't like the idea of cyberspace diluting their long held sovereign borders. </div>
<div>
<br /></div>
<div>
Perhaps there is room however, for some new terms. Just like the internet is a mother to the world wide web, perhaps there are some other terms that can be the sons and daughters of cyberspace? and just like the internet, people will continue to use the term in general conversation, and not for it's true meaning. But the new common terms may provide clarity and assistance for writers and academics who further explore the ever-changing realm of cyberspace. </div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-24916598162009651662014-08-31T17:58:00.001+10:002014-09-04T07:40:13.801+10:00Mind Control & the Internet<div class="MsoNormal">
<b><span style="font-family: inherit;">The topic of this entry is based upon the writing by Sue Halpern (2011), "Mind Control & the Internet".</span></b></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="margin-bottom: 12pt;">
<span style="font-family: inherit;">How might the
internet be controlling our minds? Directly? Indirectly? By setting our
expectations? By becoming our psychic environment? Advertising is one of the key players to answer all these questions. The amount of data that is now captured when individuals are online provides marketing departments with an abundance of information that can be used to target very specific markets, acting before we do from past experience, making people aware of products they might not have ever searched for directly (Halpern, 2011). </span></div>
<div class="MsoNormal" style="margin-bottom: 12pt;">
<span style="font-family: inherit;">Are neural
implants the way of the future? Would you have neural implants inserted? Under
what conditions? Brain-interface technology will most likely have applications in the future for
people with disabilities who cannot move limbs and will move robotic devices or prosthesis with their mind, such as the </span><a href="http://www.braingate.com/" style="font-family: inherit;" target="_blank">Braingate system</a><span style="font-family: inherit;">. Microscopic sensors or neural
dust is another technology </span>currently<span style="font-family: inherit;"> in research stages, and can record the </span>equivalent<span style="font-family: inherit;"> of electrical signals of neurons. I would only try implants if I
had a debilitating disability that made my life cumbersome for myself and other
people.</span></div>
<div class="MsoNormal" style="margin-bottom: 12pt;">
<span style="font-family: inherit;">Does Google's
personalisation of our internet interaction assist us? Or is it exploitation?
Does it deny our freedom or is it all part of being a collective? How is it
affecting the climate change debate? It is both. Data is taken form everyone but only a percentage of people use the
information and applications that Google can provide. Much of the data is used
for business income. They create more freedom within the context of the
internet and digital connectivity and provide solutions to be more collective
as a culture, but this does not apply to people who desire freedom in nature,
away from the digital world. Digital products save trees but produce e-waste,
the climate change debate is more accessible to everyone who has internet
access. People are living in areas that experience dramatic environmental
changes and can let the world know of their problems while engaging people to receive support.</span></div>
<div class="MsoNormal" style="margin-bottom: 12pt;">
<span style="font-family: inherit;">Is commercialization destroying the web or is the web improving the way we do
business? with education people are free to choose the way in which they engage with the
internet. Online business is hugely successful and provides a competitive edge
for people who realize the future if digital business. People are able to look
at business and their products before they decide to buy or visit a store or
restaurant. Many people will not use many businesses now that don’t have an
online presence.</span></div>
<div class="MsoNormal" style="margin-bottom: 12pt;">
<span style="font-family: inherit;">Will Moore's
law give out in 2015? What will happen then? not likely, but there is no definite outcome. Some people think 2020-2022 when chip-sets reduce to about 7-5nM, with the cost-benefit unlikely to take circuits
any smaller. Once the size of circuits using current CMOS technology has
reduced to the smallest viable size, then technology research will perhaps focus on bettering existing technology and moving to different materials that will
allow further advancements – such as <o:p></o:p>nano-ribbons for example. </span></div>
<span style="font-family: inherit;">Or perhaps you can. Researchers at the University of New South Wales, Purdue
University and the University of Melbourne, created a <a href="http://www.purdue.edu/newsroom/research/2012/120219KlimeckAtom.html">0.1
nanometer transistor</a> from a single phosphorus atom in 2012. "To me,
this is the physical limit of Moore's Law," said Gerhard Kilmeck, Director
of the Network for Computational Nanotechnology at Purdue and a Professor of
Electrical and Computer Engineering. "We can't make it smaller than
this." There's plenty of scope to improve tomorrow's processors that we haven't
talked about - parallelism offers ways of scaling up processing power without
the need for new chips, while it can be argued that raw processing power is now
less important than power efficiency. Software can be rewritten, I/O and memory
can be tweaked. Further into the future, there's the prospect of tunnel
transistors, photonics and quantum computing.</span><br />
<span style="font-family: inherit;"><o:p></o:p><br /></span>
<span style="font-family: inherit;">By then, perhaps Moore's Law will be adjusted to fit a new technology
landscape. Or we may never see its like again. We'll leave the last word to
DARPA's Robert Colwell, who points out that "when Moore's Law stops, it
will be economics that stops it, not physics. So keep your eye on the money."<o:p></o:p></span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><b><a href="http://www.nybooks.com/articles/archives/2011/jun/23/mind-control-and-internet/">Halpern, Sue</a></b><a href="http://www.nybooks.com/articles/archives/2011/jun/23/mind-control-and-internet/"><b> (2011) "Mind Control & the Internet</b></a><a href="http://www.nybooks.com/articles/archives/2011/jun/23/mind-control-and-internet/"><b>", New York Review of Books June 23.</b></a></span>Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-24827996425309282102014-08-31T17:48:00.001+10:002014-09-04T07:22:47.839+10:00Cyberspace<div class="MsoNormal">
<span style="font-family: inherit;">What is cyberspace? <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 115%; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: inherit;"><span style="line-height: 115%;">An attempt
by humans to understand something by making it a tangible environment. </span>The word "cyberspace"
is credited to William Gibson, who used it in his book, <u>Neuromancer</u>,
written in 1984. Gibson defines cyberspace as "a consensual hallucination
experienced daily by billions of legitimate operators, in every nation, by
children being taught mathematical concepts... A graphical representation of
data abstracted from the banks of every computer in the human system.
Unthinkable complexity. Lines of light ranged in the non-space of the mind,
clusters and constellations of data" (New York: Berkley Publishing Group,
1989), pp. 128. But simply put it is the notional environment in which
communication over computer networks occurs.<span style="line-height: 115%;"><o:p></o:p></span></span></div>
<div class="MsoNormal" style="line-height: 115%; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal" style="line-height: 115%; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: inherit;">The video below outlines another explanation of what cyberspace consists of.</span><br />
<span style="font-family: "Times New Roman","serif";"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='600' height='340' src='https://www.youtube.com/embed/OL2IORXwg2E?feature=player_embedded' frameborder='0'></iframe></div>
<div class="MsoNormal" style="line-height: 115%; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;">
<span style="font-family: "Times New Roman","serif";"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Is cyberspace real? <o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">This depends on the definition that
is applied to both real and cyberspace, but generally cyberspace can be
considered as real as it is something that exists, though not necessarily as
something physical, but a tangible environment of which we can create real
world effects (Strate, 1999). </span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Where is cyberspace? There is no physical location, but
perhaps it can be considered as anywhere there is a digitally connected
presence, where people can communicate beyond physical presence. Is Facebook in cyberspace? Yes. </span><br />
<span style="font-family: inherit;"><br />
Cybernetics is the study of systems
of command, control and communication in machines and animals.</span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">What is an example of a cybernetic
product from your own life? Computer, mobile. Is iTunes a cybernetic system? Maybe
through its communication in podcast. Is the University a cybernetic
system? Maybe through the communication of learning, especially online. Do cybernetics leave out the human
element? Definitely not, it is concerned with the symbiotic relationships that
can be determined between both humans and machines</span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">What is an example of Cyberpunk from
your own media consumption? Mostly movies and video games. Is <i>Hunger Games</i> cyberpunk or
fantasy? What is the difference? There are elements of an elitist
cyberpunk society, where a huge disparity exists between rich and poor, and
where the poor people have no control and are subject to hardships from the
wealthy. The technology of this environment is sophisticated, but is not used
in typical cyberpunk tradition. Arguably, the wealthy element of hunger games
could be seen as <i><a href="http://www.cyberpunkforums.com/viewtopic.php?id=2874" target="_blank">cyberprep</a></i>. </span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">Strate, L 1999, 'The </span>varieties of cyberspace: problems in definition and delimitation', <i>Western Journal of Communication</i>, vol. 63, no. 3, pp. 382-412.<span style="font-family: inherit;"> </span></div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-41218438057562001132014-08-24T20:30:00.003+10:002014-08-24T20:36:14.295+10:00Cyberpunk 2077Based on the pen & paper '<i>Cyberpunk'</i> series written by Mike Pondsmith and published by R. Talsorian Games, Cyberpunk 2077 is an upcoming RPG being developed by CD Projekt RED. CD Projekt is the developer behind the international successful '<i>The Witcher'</i> series, and will feature a dystopian futuristic world in which ultra-modern technology co-exists with a degenerated human society, while delivering cutting-edge graphics thanks to the REDengine that was also used in <i>'The Witcher 2'</i>.<br />
<br />
Check out the trailer below or head to their website where you can sign up and get involved with the 2077 and CD Projekt community: <a href="http://cyberpunk.net/" target="_blank">http://cyberpunk.net/</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/5y9711pvZkc?feature=player_embedded' frameborder='0'></iframe><br />
<br />Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-37688859282716825392014-08-20T16:39:00.004+10:002014-08-20T16:43:24.634+10:00A Brief History of Cyberpunk<a href="http://wallpoper.com/wallpaper/cyberpunk-393674" target="_blank"><img alt="http://wallpoper.com/wallpaper/cyberpunk-393674" src="http://wallpoper.com/images/00/34/84/57/dystopia-cyberpunk_00348457.jpg" height="396" id="irc_mi" style="margin-top: 1px;" width="600" /></a> <br />
<br />
Google defines cyberpunk as "a genre of science fiction set in a lawless subculture of an oppressive society dominated by computer technology".<br />
<br />
<span style="font-size: large;"><a href="http://www.tiki-toki.com/timeline/entry/317380/The-History-of-Cyberpunk/" target="_blank">Timeline: The History of Cyberpunk</a></span><br />
<br />
The timeline above attempts to provide a history of the cyberpunk genre through the development of film, novels, and video games. While the list is far from exhaustive, the direction of cyberpunk can be clearly observed. I have decided to begin the timeline with the movie 'Blade Runner' (1982), and end the timeline with the video game 'Watch Dogs (2014). <br />
<br />Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-28924460486951839622014-08-15T17:14:00.001+10:002014-09-04T07:39:15.339+10:00Tyranny, Social Media, Internet Addiction, and Surveillance Cameras<div dir="ltr" id="docs-internal-guid-d39af2bf-d6bd-d3ef-f062-ae9ea591fb19" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: inherit;"><a href="https://mubi.com/notebook/posts/movie-poster-of-the-week-jean-luc-godards-alphaville-and-the-films-of-lemmy-caution" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img alt="https://mubi.com/notebook/posts/movie-poster-of-the-week-jean-luc-godards-alphaville-and-the-films-of-lemmy-caution" src="http://s3.amazonaws.com/auteurs_production/post_images/9113/Alphaville_Belgium_MPOTW.jpg?1325543898" height="400" id="irc_mi" style="margin-top: 0px;" width="327" /></a></span></div>
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span><br />
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Alphaville is a 1965 sci-fi, written and directed by Jean Luc Godard. </span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">A U.S. secret agent is sent to the distant space city of Alphaville
where he must find a missing person and free the city from its
tyrannical ruler <a href="http://www.imdb.com/title/tt0058898/" target="_blank">(IMDb)</a>. </span></span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Cite three academic books that might provide useful material for an essay about</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline;"> Jean Luc Godard's </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline;">Alphaville</span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> On which campuses do they reside?</span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<ol>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Thornton, MF 1992, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Tyranny Unmasked</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Liberty Fund, Indianapolis.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> (located in online database)</span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Bovard, J 2003, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Terrorism and Tyranny: Trampling Freedom, Justice, and Peace to Rid the World of Evil</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Palgrave Macmillan, New York.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> (located in online database)</span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Preparata, GG 2011 </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Ideology of Tyranny: Bataille, Foucalt, and the Postmodern Corruption of Political Dissent</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Palgrave Macmillan, New York. (located in Nathan campus)</span></span></li>
</ol>
</div>
<div dir="ltr" id="docs-internal-guid-d39af2bf-d6be-0dd3-cd67-9167c8b19442" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">What is a book that will assist you to find out about possible research methods to explore</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: bold; text-decoration: none; vertical-align: baseline;"> social media</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">? Full citation.</span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Bertrand, I & Hughes, P 2005, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Media research methods: audiences, institutions, texts</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Palgrave Macmillan, New York.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Weerakkody, N 2009, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Research methods for media and communication</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Oxford University Press, South Melbourne.</span></span></li>
</ul>
</div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><br /></span></div>
<div dir="ltr" id="docs-internal-guid-d39af2bf-d6be-65c2-d05b-e69f48240d4e" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">What is the latest medical thinking about internet addiction? What database did you use? Full citation.</span></span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Internet addiction is a continuously increasing problem in societies all over the world, particularly in youth (Dreier, Wolfling & Beutel 2014). The study conducted by Dreier et. al. (2014), discovered certain factors that put youth at more risk of developing addictive behaviour towards the internet. These were: age; sex; education; and preference for gambling and gaming. Furthermore, "</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">dysfunctional users show considerable impairments regarding a broad
range of mental problems, especially aggression, attention-related,
social, and also achievement problems"(Dreier et. al. 2014, p. 496). </span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Dreier, M, Wolfling, K & Beutel, ME 2014, ‘Internet addiction in youth’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Monatsschrift Kinderheilkunde</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 162, no. 6, pp. 496-496.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Wallace, P 2014, ‘Internet addiction disorder and youth’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">EMBO Reports</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 15, no. 1, pp. 12-16.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Finlay, F & Furnell, C 2014, ‘Internet addiction disorder/ problematic internet use and ADHD’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Archives of Disease in Childhood</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 99, no. 4, pp. 145-146.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Craparo, G, Messina, R, Severino, S, Fasciano, S, Cannella, V, Gori, A, Cacioppo, M & Baiocco, R 2014,</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> ‘</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">The relationships between self-efficacy, internet addiction and shame’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Indian Journal of Psychological Medicine</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 36, no. 3, pp. 304-307.</span></span></li>
</ul>
</div>
<div dir="ltr" id="docs-internal-guid-d39af2bf-d6be-bcfc-530f-eae40c9d9cfe" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">What are IT engineers thinking about surveillance cameras? Identify a theme you could write an essay about and cite three papers that would be useful.</span></span><br />
<br />
<span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">There is a growing number of wireless enabled surveillance cameras being installed for both personal and business purposes. Security on these devices is a risk issue that needs to be mitigated through consumer education and increased security. </span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Chen, C, Favre, J, Kurillo, G, Andriacci, TP, Bajcsy, R & Chellappa, R 2014, ‘Camera networks for healthcare, tele-immersion, and surveillance’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Computer</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 47, no. 5, pp. 26-36.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Xiaogang, W 2013, ‘Intelligent multi-camera video surveillance: a review’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Pattern Recognition Letters</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 34, no. 1, pp. 3-19.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Abas, K, Porto, C & Obraczka, K 2014, ‘Wireless smart camera networks for the surveillance of public spaces’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Computer</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 47, no. 5, pp. 37-44.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Mukesh, KS, Pradeep, KA & Abdulmotaleb, ES 2014, ‘From smart camera to smart hub: embracing cloud for video surveillance’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">International Journal of Distributed Sensor Networks</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vo. 1, no. 1, pp. 1-10.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Sonali, V & Kamal, S 2014, ‘Real time video surveillance system’, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">International Journal of Computer Application</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 86, no. 14, pp. 22-27.</span></span></li>
</ul>
</div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><br /></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><br /></span></div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-45944123198772413842014-08-15T08:10:00.001+10:002014-09-04T07:34:53.482+10:00Stephen Stockwell, Friedrich Nietzsche and Communication Theory<span style="font-family: inherit;">"Where necessity and need have long compelled men to communicate with
their fellows and understand one another rapidly and subtly, a surplus
of the power and art of communication is at last acquired, as if it were
a fortune which had gradually accumulated, and now waited for an heir
to squander it prodigally."</span><br />
<div style="text-align: right;">
<span style="font-family: inherit;"><b>Nietzsche, <i>The Gay Science</i>, 1882</b></span></div>
<div style="text-align: right;">
<span style="font-family: inherit;"><br /></span></div>
<div style="text-align: left;">
<span style="font-family: inherit;">Stephen Stockwell has been with Griffith University since 1996 and is
currently an Associate Professor in Journalism and Communication. His most
recent work consists of the manoeuvres of spin doctors, unconventional media in
Brisbane, and new thoughts on deciphering communication theory.</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">Written in 2006, Stockwell's <i>'Theory Jamming: Uses of Eclectic Method in an Ontological Spiral' </i>suggests the diversity and contrasts of communication theory can be used positively and provide certain coherence. Thi<span style="font-size: 15px;">s occurs when the collective of communication theories is considered as a form of expression of skill, like musicians who play together, unrehearsed, their melodies ephemeral and flexible, exploring ideas and m</span>oving towards an increase in feeling and knowledge.</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">I enjoyed the element of this work inspired by <a href="http://en.wikipedia.org/wiki/Friedrich_Nietzsche" target="_blank">Nietzsche</a>, who provides us with encouragement to leap forward with certainty, from possibility to possibility. Stockwell commends his bravery but realises the necessity for further guidance when dealing with the conflicts within communication theory. The article concludes with five thesis on theory-jamming which include: eclecticism requires ethnography; Enculturation and Enumeration need each other; Ephemera and Esoterica tell us the most; Experimentation beyond Empiricism; Extravagance and Exuberance.</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">Stockwell, S 2006 'Theory-Jamming: uses of eclectic method in an ontological spiral', <cite>M/C Journal</cite>, vol. 9, no. 6, pp. 1-4.</span><br />
<span style="font-family: inherit;"><br />
Below is a list of books by Stephen Stockwell currently in the Griffith University library:</span><br />
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Stockwell, S 2005, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Political Campaign Strategy: Doing Democracy in the 21st Century</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Australian Scholarly Publishing, Melbourne.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
</ul>
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Stockwell, S 2010, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Rhetoric and Democracy: Deliberative Opportunities in Current Electoral Processes, </span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">VDM Saarsbruken, Germany.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
</ul>
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Stockwell, S & Scott, P 2000, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">All-media Guide to Fair and Cross-Cultural Reporting: For Journalists, Program Makers and Media Students</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Australian Key Centre for Cultural and Media Policy, Nathan, Queensland.</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
</ul>
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Stockwell, S & Isakhan, B 2012, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">The Edinburgh Companion to the History of Democracy</span>, International Bibliography of the Social Sciences (IBSS), Cambridge.<span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;"> </span></span></li>
</ul>
<ul>
<li><span style="font-family: inherit;"><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Stockwell, S & Isakhan, B 2011, </span><span style="background-color: transparent; font-size: 15px; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">The Secret History of Democracy</span><span style="background-color: transparent; font-size: 15px; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, Palgrave Macmillan, London. </span></span> </li>
</ul>
<div dir="ltr" id="docs-internal-guid-d39af2bf-d6b2-011c-aa39-e677f354b7e2" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="font-size: 15px;"><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">What database would you use to find Stockwell's first academic article about Brisbane in a national journal? What year? Provide a full citation.</span></span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="font-size: 15px;"><br /></span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="font-size: 15px;"><b><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Database: Taylor and Francis Online; </span></b></span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="font-size: 15px;"><b><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Year: 1995;</span></b></span></span></div>
<div dir="ltr" style="line-height: 1.15; margin-bottom: 0pt; margin-top: 0pt;">
<span style="font-family: inherit;"><span style="font-size: 15px;"><b><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Reference: Stockwell, S, 1995, </span><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">‘The Brisbane Model: considering a unique experiment’ </span><span style="background-color: transparent; font-style: italic; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">Urban Policy and Research</span><span style="background-color: transparent; font-style: normal; font-variant: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">, vol. 13, no. 2, pp. 89-96.</span></b></span></span></div>
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;"><br /></span></div>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-52270138459482888242014-08-08T10:28:00.001+10:002014-09-04T07:34:33.450+10:00Communicating with New Communication Technologies <div class="separator" style="clear: both; text-align: center;">
<a href="http://videohive.net/item/hd-data-scanner-transition-revealer/35488" style="margin-left: 1em; margin-right: 1em;" target="_blank"><img alt="http://videohive.net/item/hd-data-scanner-transition-revealer/35488" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgp7IgN7uamOb8x9QHhYbL4jePoZRJxofK0FQ0dK89TtR4e9k6S5wdqbxtAf3itHsxAk5NuHD3r1_ah5nP3_i1NMOR2MntWKeIva8-q5tytU3R9nfAcyhYz2PuIXa-bkwBBjsMbBZfCJZo/s1600/data-scanner-vp.jpg" /></a></div>
<br />
Like most people, I have a strong relationship with my mobile phone, but rather than social media, I prefer to use the technology in messaging, email and phone calls to communicate. I actually severed my ties to social media a few years ago now and haven’t looked back. My life feels no better or worse. To be honest it is probably better because it is one less thing I have to worry about.
Going ‘cold turkey’ on social media is a trend I have come to see more frequently among users, although new product trends can have a mighty polarizing effect on people. I do see the benefits from using those platforms, but for my purposes I couldn't be bothered finding what I need through all the noise.
I am, however, an advocate for the cloud technology and its applications. I love using both Microsoft 365 products and Google Drive. I believe the best and most productive use for communication technology is for organizational benefit. Having the ability to communicate and collaborate with team members at any time and place can be very beneficial for productivity and efficiency.<br />
<br />
Privacy and security in the technology context is an issue that I see as a continuously growing concern. The integration of technology in so many areas of our lives arguably creates higher risk for criminal activity and misconduct for both the individual and the State. Governments and policy-makers frequently encounter new threats that are not restricted by borders, which need to be prepared for with adaptable frameworks and infrastructure (Gürkaynak, Yilmaz & Taskiran, 2014). Simple measures such as learning how to develop a more complex password are worthwhile ventures.
When people are trying to develop skills in a specific field or have aspirations for certain achievements, it is best to observe those people who have already accomplished what you are trying to achieve. In the case of privacy and security, we can observe programmers and cyber security experts. Many of these people are telling us to be careful and to mitigate our risk exposure. <br />
<br />
Currently a big topic is the collection of data, and in Australia, meta data in particular. <a href="http://www.abc.net.au/news/2014-08-06/security-laws-abbott-browsing-history-not-collected/5652364" target="_blank">New security legislation on privacy</a> has been drafted to give ASIO (Australian Security and Intelligence Organisation) more information for counter-terrorism measures. I personally do not have an issue with my basic data being collected as long as that data is being stored correctly and in the safest environment possible. Companies like Google give me peace of mind about the direction of data collection and storage. However, people need to be aware of the risks out there and not open their devices and infrastructure to avoidable risk. It is worthwhile doing background checks on companies who you might own or download products from and how they manage their data. <br />
<br />
Another interesting topic is the building of relationships over digital mediums which never constitute actually meeting that person face-to-face. The best example of this is an acquaintance of mine, Ray. He lives in the Philippines and we met through an online design website where I requested his design skills for some t-shirts I was doing. We have communicated various times and I have used his skills for various company logos, business cards, etc. We have never spoken to each other or met face to face, but have communicated purely through the internet.
It is this technology use that makes the world a smaller place and provides people with the resources they need, and a choice of who will provide those resources.<br />
<br />
Gurkaynak, G, Yilmaz, I & Taskiran, MP 2014, 'Protecting the communication: data protection and security measures under telecommunications regulations in the digital age', <i>Computer Law & Security Report</i>, vol. 30, no. 2, pp. 179-190. viewed 12 August 2014, <http://www.sciencedirect.com.libraryproxy.griffith.edu.au/science/article/pii/S0267364914000272>.Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0tag:blogger.com,1999:blog-6193417309273154299.post-33914432434416079422014-08-06T09:49:00.001+10:002014-09-04T07:33:48.359+10:00Someday, I'd Like to Learn How to Have a ConversationOur relationship with technology is a contentious issue in today's world. Are we more connected or less connected than in the past?<br />
<br />
Sherry Turkle is a psychologist who studies how digital technology is shaping our modern relationships and ourselves. This video was presented at an official TED conference and explains the theory of being technologically connected but removed from human interaction. Turkle argues that "We need to make room for solitude in our life and we need to mark the
difference between connection (of which we have plenty) and conversation
(of which we don't have nearly enough)".<br />
<iframe allowfullscreen="" frameborder="0" height="360" mozallowfullscreen="" scrolling="no" src="http://embed.ted.com/talks/sherry_turkle_alone_together.html" webkitallowfullscreen="" width="600"></iframe>
Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com1tag:blogger.com,1999:blog-6193417309273154299.post-66867233994867075522014-08-04T08:28:00.002+10:002014-08-31T18:01:34.883+10:00Knowledge Before the Known - Initial Thoughts on New Communications Technology<span class="fnt0"><span class="fnt0" style="font-family: inherit;">This blog has been created as part of a university course to explore communication in the Age of Information through the contexts of media theory and the history of communication technology. I myself have taken this course as an undergraduate for an arts and business degree, relishing the opportunity to develop skills and knowledge in an area that is so very prominent the world over. I start my journey being asked these simple, yet sizable questions to one of the most important constituents of mankind, communication. </span></span><br />
<span style="font-family: inherit;"><br />
<i><span class="fnt0"><span class="fnt0">What are the main issues in new communications technology from your point of view?</span></span></i></span><br />
<span class="fnt0"><span class="fnt0" style="font-family: inherit;"> </span></span><br />
<span style="font-family: inherit;"><span class="fnt0"><span class="fnt0">There is such a flood of information that stems from so many platforms that sometimes it is difficult to distinguish what information you need through all the noise. I think it is important to communicate in effective and efficient ways, using </span></span><span class="fnt0"><span class="fnt0">that </span></span><span class="fnt0"><span class="fnt0">technology to your advantage and not being caught up in menial tasks and trends. </span></span></span><br />
<span style="font-family: inherit;"><br />
<span class="fnt0"><span class="fnt0">Another significant problem is security. However, I believe security issues with web-based technology can be mitigated, to a greater extent, with knowledge. The <a href="http://www.pcworld.com/article/257045/6_5m_linkedin_passwords_posted_online_after_apparent_hack.html" target="_blank">LinkedIn incident</a> would have been far less severe if people had the knowledge of the security risks that simple passwords pose. Many of the accounts that were hacked used passwords like 'link1234' for example. Knowledge, skill, and risk mitigation are an essential element for anyone dealing with the technologies of the information age. </span></span></span><br />
<span style="font-family: inherit;"><br />
<span class="fnt0"><span class="fnt0"><i>How do we distinguish between old and new communication technologies?</i> <br /> </span></span></span><br />
<span class="fnt0"><span class="fnt0" style="font-family: inherit;">Two words instantly come to mind; digital and internet. With those two words comes a slew of imaginative constructs that I can only dream of or read about. Those constructs come from the comparison I draw from my lifelong exposure to digital technologies and that of a person still pushing the technological boundaries of the time, but eclipsed by the power of the digital age. </span></span><br />
<span style="font-family: inherit;"><br />
<span class="fnt0"><span class="fnt0"><i>Under what circumstances will new communication technologies become old communication technologies?</i><br /> </span></span></span><br />
<span class="fnt0"><span class="fnt0" style="font-family: inherit;">This is a particularly important question to the minds behind marketing teams of communication products, and any business that relies on innovative solutions to provide them with a competitive advantage. I believe it is a combination of the innovation and creation of new technologies and the appetite of the masses to adopt to that new technology. </span></span><br />
<span style="font-family: inherit;"><br />
<i><span class="fnt0"><span class="fnt0">What is your favourite digital technology? Which analog technologies are still part of your life?</span></span></i></span><br />
<span style="font-family: inherit;"><br />
<span class="fnt0"><span class="fnt0">Without contextualizing this question it is hard to pinpoint favourite technologies. This question also makes you realize how many parts of your life are shadowed by some form of digital technology. The two that come to mind first however are the increased ability to make music, and the efficiency and effectiveness of team collaboration and communication. As a guitarist I can appreciate the simplistic methods we have been given in the way we make and change sound. For a few hundred dollars I can make my guitar do pretty much what a room full of analogue equipment and hundreds of thousands of dollars could do in the past. </span></span></span><br />
<span style="font-family: inherit;"><span class="fnt0"><span class="fnt0"><br /></span></span>
<span class="fnt0"><span class="fnt0">Having the ability to collaborate with teams anywhere in the world is a popular way of building competitive advantage. People are able to access skills and knowledge by communicating through various digital channels, then apply those skills and knowledge to projects. People no longer need to be physically present to contribute to projects which saves time and money, and in turn be invested in further innovation activities. These activities continue to be an essential component of business sustainability in the contemporary world. </span></span></span>Anonymoushttp://www.blogger.com/profile/12696399762929745741noreply@blogger.com0