Switch to: References

Add citations

You must login to add citations.
  1. Primiero on Physical Computation. [REVIEW]André Curtis-Trudel - 2023 - Global Philosophy 33 (1):1-15.
    This note discusses the account of physical computation offered in Part II of Primiero’s On the Foundations of Computing. Although there is much to find attractive about the account, I argue that the account is obscure at certain crucial junctures and that it does not supply a wholly satisfactory account of miscomputation. I close by considering whether the engineering foundation of computing requires a theory of physical computation in the first place, suggesting tentatively that it does not.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Design, Malfunction, Validity: Three More Tasks for the Philosophy of Computing.Giuseppe Primiero - 2020 - Philosophy and Technology 33 (2):331-337.
    We present a review of Raymond Turner’s Book Computational Artifacts – Towards a Philosophy of Computer Science, focusing on three main topics: Design, Malfunction, and Validity.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Cyberattacks as “state of exception” reconceptualizing cybersecurity from prevention to surviving and accommodating.Sebastian Knebel, Mario D. Schultz & Peter Seele - 2022 - Journal of Information, Communication and Ethics in Society 20 (1):91-109.
    Purpose This paper aims to outline how destructive communication exemplified by ransomware cyberattacks destroys the process of organization, causes a “state of exception,” and thus constitutes organization. The authors build on Agamben's state of exception and translate it into communicative constitution of organization theory. Design/methodology/approach A significant increase of cyberattacks have impacted organizations in recent times and laid organizations under siege. This conceptual research builds on illustrative cases chosen by positive deviance case selection of ransomware attacks. Findings CCO theory focuses (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark