1 Modern operating systems offer graphical user interfaces (GUI) to control and administer them to run applications with clicks, drag and drop. Below the surface, there is still a level of immediate control, the command line (see Stephenson 1999). In its iconic form it sometimes appears in popular culture as a black window with green typography, in the lived reality of computer culture it is accessed by starting a so-called ‘shell’ to communicate with the computer. An encrypted secure version of this is the secure shell or SSH.
2 Fortran is a programming language, in fact, the first programming language ever implemented. Before that, computers were programmed in machine code (such as START ST:MOV R1,#…MOVE R2,#1.END), after that in a more accessible form. Fortran (or FORmula TRANslation) was designed in 1957 and it is still in use in e.g. scientific and numeric calculations, although the number of people who can code in Fortran is decreasing constantly.
Amoore, L., and De Goede, M. (2005). Governance, Risk and Dataveillance in the War on Terror. Crime, Law and Social Change 43(2): 149–173.
Burgess, J. P., and Balzacq, T. (2010). Securitization Theory: How Security Problems Emerge and Dissolve (New.). Milton Park, Abingdon, Oxon; New York: Taylor & Francis Ltd.
Buzan, B., Wæver, O., and Wilde, J. D. (1997). Security: A New Framework for Analysis (UK ed.). Boulder, CO: Lynne Rienner Publishers.
Clifford, J., and Marcus, G. E. (Eds). (2010). Writing Culture: The Poetics and Politics of Ethnography (25th Anniversary Edition edition). Berkeley, CA: University of California Press.
Cohn, M. (2019). Keeping Software Present: Software as a Timely Object for Digital STS. Digital STS: A Field Guide for Science & Technology Studies: 423–446.
Cohn, M. L. (2013). Lifetimes and Legacies: Temporalities of Sociotechnical Change in a Long-Lived System. Dissertation thesis.
Dijck, J. van. (2014). Datafication, Dataism and Dataveillance: Big Data Between Scientific Paradigm and Ideology. Surveillance & Society 12(2): 197–208.
Edwards, P. N. (1996). The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, MA: The MIT Press.
Haraway, D., and Kenney, M. (2015). Anthropocene, Capitalocene, Chthulhucene. Donna Haraway in Conversation with Martha Kenney. In H. Davis and E. Turpin (Eds), Art in the Anthropocene: Encounters among aesthetics, politics, environments and epistemologies. London: Open Humanities Press London, pp. 255–269.
Kenney, M. (2019). Fables of Response-ability: Feminist Science Studies as Didactic Literature. Catalyst: Feminism, Theory, Technoscience 5(1): 1–39.
Kelty, C. M. (2008). Two Bits. The Cultural Significance of Free Software. Durham; London: Duke University Press.
Latour, B. (1988). The Politics of Explanation: An Alternative. In S. Woolgar (Ed.), Knowledge and Reflexivity, New Frontiers in the Sociology of Knowledge. London: Sage, pp. 155–176.
Passoth, J.-H., and Rowland, N. J. (2013). Beware of Allies! Notes on Analytical Hygiene in Actor-Network Account-Making. Qualitative Sociology 36(4): 465–483.
Schrader, A. (2010). Responding to Pfiesteria Piscicida (the Fish Killer): Phantomatic Ontologies, Indeterminacy, and Responsibility in Toxic Microbiology. Social Studies of Science 40(2): 275–306.
Star, S. L. (1999). The Ethnography of Infrastructure. American Behavioral Scientist 43(3): 377–391.
Stengers, I. (2005). The Cosmopolitical Proposal. In B. Latour and P. Weibel (Eds), Making Things Public: Atmospheres of Democracy. Cambridge, MA: The MIT Press.
Tronto, J. C., and Fisher, B. (1990). Toward a Feminist Theory of Caring. In E. Abel, and M. Nelson (Eds), Circles of Care. Albany, NY: SUNY Press, pp. 36–54.
Tronto, J. C. (1993). Moral Boundaries: A Political Argument for an Ethic of Care. New York: Routledge.
Tsing, A. L. (2015). The Mushroom at the End of the World: On the Possibility of Life in Capitalist Ruins. Princeton: Princeton University Press.
Gabrys, J., Prichard, H. and Barratt, B. (2016) Just good enough data: Figuring data citizenship through air pollution sensing and data stories. Big Data & Society. 3(2): 1–14.
Gehl, R. W., and McKelvey, F. (2019). Bugging Out: Darknets as Parasites of Large-scale Media Objects. Media, Culture and Society. 41(2): 219 –235.
Greene, R., Meysenburg, N., and Ritzo., C. An Experiment in Detecting Cell Phone Surveillance. <https://www.newamerica.org/oti/blog/oti-experiment-open-source-surveillance-detection/> [accessed 13 November 2018]
Elwood, S. (2018) Feminist digital geographies’. Gender, Place & Culture. 25(5): 629–644.
Leszczynski, A. (2018). Digital methods I: Wicked tensions. Progress in Human Geography. 42(3): 473–481.
Mattern, S. (2016). Cloud and Field. Places Journal. <https://doi.org/10.22269/160802>
Ney, P., Smith, I., Cadamuro, I., G. , and Kohno, T. (2017)SeaGlass: Enabling City-Wide IMSI-Catcher Detection’. Proceedings on Privacy Enhancing Technologies. 3: 39–56.
Offenhuber, D., and Schechtner, K. (2018) Improstructure - an improvisational perspective on smart infrastructure governance. Cities. 72: 329–338.
Parks, L. (2016). Rise of the IMSI Catcher. Media Fields Journal. 11: 1–19.
Powell, A. (2018). The data walkshop and radical bottom-up data knowledge’ in H. Knox, and D. Nafus (Eds), Ethnography for a data-saturated world. Manchester: Manchester University Press, pp. 212–232.
Shaik, A., Borgaonkar, R., Asokan, N., Niemi, V., & Seifert, J.-P. (2015). Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. ArXiv:1510.07563 [Cs]. Retrieved from http://arxiv.org/abs/1510.07563.
Pell, S. K., and Soghoian, C. (2014). Your Secret StingRay’s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy. Harvard Journal of Law & Technology. 28(1): 1–75
Tsing, A. L. (2015). The mushroom at the end of the world: on the possibility of life in capitalist ruins. Princeton : Princeton University Press.