This paper argues that scholars of computing, networks, and infrastructures must reckon with the inseparability of “viral” discourses in the 1990s. This co-assembled history documents the reliance on viral analogies and explanations honed in the HIV/AIDS crisis and its massive loss of life, widespread institutional neglect, and comprehensive technological failures. As the 1990s marked a period of intense domestication of computing technologies in the global North, we document how public figures, computer experts, activists, academics, and artists used the intertwined discourses surrounding HIV and new computer technologies to explicate the risks of vulnerability in complex, networked systems. The efficacy of HIV as an analogy is visible in ...
COVID-19 has been a crisis represented and interpreted through models. Models are metaphors that ill...
The history of the Internet and the history of the HIV/AIDS crisis are fundamentally intertwined. Be...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
body in computer culture, computer virus, hacker, HIV/AIDS activism, viralityInternational audienceA...
This article analyzes computer security rhetoric, particularly in the United States, argu-ing that d...
This article analyzes computer security rhetoric, particularly in the United States, arguing that do...
This paper draws on archival research to revisit the Year 2000 Problem as an episode of recent techn...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
The historicization of the computer in the second half of the 20th century can be understood as the ...
347 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.There are notable disjuncture...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
On the cusp of the 1980s personal computers became affordable for the first time. Apple and IBM in t...
Infection of computer systems by destructive computer viruses is a commonplace occurrence. Consequen...
When discovered for the first time in America in 1981, Human Immunodeficiency Virus (HIV) posed a se...
COVID-19 has been a crisis represented and interpreted through models. Models are metaphors that ill...
The history of the Internet and the history of the HIV/AIDS crisis are fundamentally intertwined. Be...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
body in computer culture, computer virus, hacker, HIV/AIDS activism, viralityInternational audienceA...
This article analyzes computer security rhetoric, particularly in the United States, argu-ing that d...
This article analyzes computer security rhetoric, particularly in the United States, arguing that do...
This paper draws on archival research to revisit the Year 2000 Problem as an episode of recent techn...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
The historicization of the computer in the second half of the 20th century can be understood as the ...
347 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2003.There are notable disjuncture...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
On the cusp of the 1980s personal computers became affordable for the first time. Apple and IBM in t...
Infection of computer systems by destructive computer viruses is a commonplace occurrence. Consequen...
When discovered for the first time in America in 1981, Human Immunodeficiency Virus (HIV) posed a se...
COVID-19 has been a crisis represented and interpreted through models. Models are metaphors that ill...
The history of the Internet and the history of the HIV/AIDS crisis are fundamentally intertwined. Be...
This article deals with articulations of digital accidents, focusing especially on how the computer ...