Life in Code and Software/Attributions: Difference between revisions

No edit summary
No edit summary
Line 3: Line 3:
<br>  
<br>  


Andersen, C. U. and Pold, S. (2011) The Scripted Spaces of Urban Ubiquitous Computing: The experience, poetics, and politics of public scripted space, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/
Andersen, C. U. and Pold, S. (2011) The Scripted Spaces of Urban Ubiquitous Computing: The experience, poetics, and politics of public scripted space, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''  
''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''


Berry, D. M. (2008) “A Contribution Towards a Grammar of Code,” "Fibreculture", issue 13: n. pag. Web. 9 Nov 2009, accessed 16/03/2012, http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/
Berry, D. M. (2008) “A Contribution Towards a Grammar of Code,” ''Fibreculture'', issue 13: n. pag. Web. 9 Nov 2009, accessed 16/03/2012, http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''  
''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''


Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html
Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html ''(c) David M. Berry, made available here for reuse by permission of the author''  
''(c) David M. Berry, made available here for reuse by permission of the author''


Berry, D. M. (2012) ''Understanding Digital Humanities'', London: Palgrave Macmillan, accessed 15/03/2012, http://www.palgrave.com/PDFs/9780230292642.pdf
Berry, D. M. (2012) ''Understanding Digital Humanities'', London: Palgrave Macmillan, accessed 15/03/2012, http://www.palgrave.com/PDFs/9780230292642.pdf ''(c) 2012 David M. Berry, Palgrave Macmillan, sample chapter available for open access''  
''(c) 2012 David M. Berry, Palgrave Macmillan, sample chapter available for open access''


Bogost, I. (2005) Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium, accessed 15/03/2012, http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf
Bogost, I. (2005) Procedural Literacy: Problem Solving with Programming, Systems, &amp; Play, Telemedium, accessed 15/03/2012, http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf ''(c) 2005 Telemedium''  
''(c) 2005 Telemedium''


Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263
Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263 ''(c) 2010 Wendy Chun''  
''(c) 2010 Wendy Chun''


Davidson, C. (2012) Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms, DML Central, accessed 15/03/2012, http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms
Davidson, C. (2012) Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms, DML Central, accessed 15/03/2012, http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms ''(c) 2012 C. Davidson, Creative Commons Attribution 3.0 License ''  
''(c) 2012 C. Davidson, Creative Commons Attribution 3.0 License ''


Deleuze, G. (1992) Postscript on the Societies of Control, October, vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm
Deleuze, G. (1992) Postscript on the Societies of Control, ''October'', vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm ''(c) 1992 October/MIT Press''  
''(c) 1992 October/MIT Press''


Dijkstra, E. W. (1998) On the cruelty of really teaching computing science, accessed 15/03/2012, http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf
Dijkstra, E. W. (1998) On the cruelty of really teaching computing science, accessed 15/03/2012, http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf ''(c) 1998 Dijkstra, E. W.''  
''(c) 1998 Dijkstra, E. W.''


Guattari, F. (1989) The Three Ecologies, new formations, no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf
Guattari, F. (1989) The Three Ecologies, new formations, no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf ''(c) New Formations''  
''(c) New Formations''


Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf
Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf ''(c) 2003 Laurence Erbaum Associates''  
''(c) 2003 Laurence Erbaum Associates''


Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, "Fibreculture", issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/
Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''  
''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''


Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212
Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 ''(c) 2010 F. Frabetti''  
''(c) 2010 F. Frabetti''


Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/
Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ ''(c) 2011 Wired''  
''(c) 2011 Wired''


Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html
Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html ''This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License''  
''This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License''


Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf
Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf ''Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design''  
''Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design''


Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ
Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&amp;v=CS01Hmjv1pQ ''© TED CONFERENCES, LLC''  
''© TED CONFERENCES, LLC''


MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf
MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf ''(c) 2006 Adrian MacKenzie''  
''(c) 2006 Adrian MacKenzie''


MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/
MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''  
''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''


Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html
Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html ''Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License''  
''Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License''


Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology
Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology ''Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)''  
''Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)''


McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649
McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 ''(c) McCallum, L., and Smith, D.''  
''(c) McCallum, L., and Smith, D.''


Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012,
Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf ''© 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers''  
http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf
''© 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers''


Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/
Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''  
''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''


Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought
Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought ''(c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal''  
''(c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal''


Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850
Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 ''(c) Stephan Ramsay''  
''(c) Stephan Ramsay''


Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html
Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html ''(c) Stephan Ramsay''  
''(c) Stephan Ramsay''


Slavin, K. (2010) How algorithms shape our world, TEDGlobal accessed 15/03/2012,http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html
Slavin, K. (2010) How algorithms shape our world, TEDGlobal accessed 15/03/2012,http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html ''© TED CONFERENCES, LLC''  
''© TED CONFERENCES, LLC''


Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf
Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf ''(c) 1937 London Mathematical Society''  
''(c) 1937 London Mathematical Society''


Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460.
Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. ''(c) 1950 Mind''  
''(c) 1950 Mind''


Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html
Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html ''© 1999-2012 Wolfram Research, Inc.''  
''© 1999-2012 Wolfram Research, Inc.''


Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf
Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf ''(c) Jeannette Wing''  
''(c) Jeannette Wing''


Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I
Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I ''(c) Jeannette Wing, standard Youtube license''  
''(c) Jeannette Wing, standard Youtube license''


Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo
Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo ''(c) 2010 TED CONFERENCES, LLC''
''(c) 2010 TED CONFERENCES, LLC''

Revision as of 19:44, 16 March 2012

Back to the book


Andersen, C. U. and Pold, S. (2011) The Scripted Spaces of Urban Ubiquitous Computing: The experience, poetics, and politics of public scripted space, Fibreculture, issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Berry, D. M. (2008) “A Contribution Towards a Grammar of Code,” Fibreculture, issue 13: n. pag. Web. 9 Nov 2009, accessed 16/03/2012, http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html (c) David M. Berry, made available here for reuse by permission of the author

Berry, D. M. (2012) Understanding Digital Humanities, London: Palgrave Macmillan, accessed 15/03/2012, http://www.palgrave.com/PDFs/9780230292642.pdf (c) 2012 David M. Berry, Palgrave Macmillan, sample chapter available for open access

Bogost, I. (2005) Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium, accessed 15/03/2012, http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf (c) 2005 Telemedium

Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263 (c) 2010 Wendy Chun

Davidson, C. (2012) Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms, DML Central, accessed 15/03/2012, http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms (c) 2012 C. Davidson, Creative Commons Attribution 3.0 License

Deleuze, G. (1992) Postscript on the Societies of Control, October, vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm (c) 1992 October/MIT Press

Dijkstra, E. W. (1998) On the cruelty of really teaching computing science, accessed 15/03/2012, http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf (c) 1998 Dijkstra, E. W.

Guattari, F. (1989) The Three Ecologies, new formations, no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf (c) New Formations

Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf (c) 2003 Laurence Erbaum Associates

Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, Fibreculture, issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 (c) 2010 F. Frabetti

Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ (c) 2011 Wired

Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License

Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design

Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ © TED CONFERENCES, LLC

MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf (c) 2006 Adrian MacKenzie

MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License

Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)

McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 (c) McCallum, L., and Smith, D.

Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf © 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers

Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought (c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal

Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 (c) Stephan Ramsay

Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html (c) Stephan Ramsay

Slavin, K. (2010) How algorithms shape our world, TEDGlobal accessed 15/03/2012,http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html © TED CONFERENCES, LLC

Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf (c) 1937 London Mathematical Society

Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. (c) 1950 Mind

Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html © 1999-2012 Wolfram Research, Inc.

Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf (c) Jeannette Wing

Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I (c) Jeannette Wing, standard Youtube license

Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo (c) 2010 TED CONFERENCES, LLC