Euro-American forms of social organization are increasingly performed via ever more intricate computer systems and networks. Against this backdrop, the corrosive spectre of computer failure has assumed the role of the 'network society's dreaded other, the harbinger of dis-organization and dis-order. At the close of the twentieth century anxiety over the probable effects and consequences of the so-called 'Millennium Bug' provided a stark contrast to the then prevailing internet euphoria.This article suggests that the Bug, and the extensive (and costly) efforts that were dedicated to its extermination, provide us with a useful illustration of the ways in which IT applications have been used to think and enact particular, historically and cult...
Based on chosen aspects of the idea of software subscription as well as the Microsoft Corporation&ap...
In contemporary age, the information-internet engineering has been expanding to a global scale, and ...
Cybersecurity is often treated as a national security issue with responses to attacks implemented by...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
People often assume that computerized networks are relatively stable and well connected. This implie...
This article focuses on the role of experience in the processing of risk information. With a written...
Software is a mode of ordering social, workplace, and individual activity. However, despite years of...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
This article focuses on the role of experience in the processing of risk information. With a written...
This paper draws on archival research to revisit the Year 2000 Problem as an episode of recent techn...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
AbstractEconomy underwent a strong transformation in the last decade. Computerization, cybernetics, ...
The following was written in 1997. Many, but not all, of the issues surrounding the Millennium bug r...
Based on chosen aspects of the idea of software subscription as well as the Microsoft Corporation&ap...
In contemporary age, the information-internet engineering has been expanding to a global scale, and ...
Cybersecurity is often treated as a national security issue with responses to attacks implemented by...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
Euro-American forms of social organization are increasingly performed via ever more intricate comput...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
People often assume that computerized networks are relatively stable and well connected. This implie...
This article focuses on the role of experience in the processing of risk information. With a written...
Software is a mode of ordering social, workplace, and individual activity. However, despite years of...
This paper argues that scholars of computing, networks, and infrastructures must reckon with the ins...
This article focuses on the role of experience in the processing of risk information. With a written...
This paper draws on archival research to revisit the Year 2000 Problem as an episode of recent techn...
This article deals with articulations of digital accidents, focusing especially on how the computer ...
AbstractEconomy underwent a strong transformation in the last decade. Computerization, cybernetics, ...
The following was written in 1997. Many, but not all, of the issues surrounding the Millennium bug r...
Based on chosen aspects of the idea of software subscription as well as the Microsoft Corporation&ap...
In contemporary age, the information-internet engineering has been expanding to a global scale, and ...
Cybersecurity is often treated as a national security issue with responses to attacks implemented by...