Page 6 of 13
Voice messaging sends prerecorded audio messages via messaging apps. Users can mix and match audio messages with other media such as text or visual. Voice messaging allows people…
Just adding to the rash of ‘stop thinking disinformation is the problem’ takes out there. The high cultural capital crew like to imagine there to be a bright…
If you see the ‘No user serviceable parts inside’ notice as a challenge, I am with you. I am in the class of people most open to the…
I often say to students ‘describe, then analyse’. Well, how do you know which one you are doing and what the difference between them is? And while we’re…
Computer security is the culmination of a series of subversions. Just as policing evolves in response to crime, so computer systems evolve in response to threats. When it…
Early in my career I researched smoking in areas of multiple deprivation in Scotland. At the time these were places where the social, economic and physical fabric had…
🎵 In the year 2525, if man is still alive, if woman can survive 🎵 Projects such as the Clock of the Long Now, the Svalbard Global Seed…
This post is about crime script analysis as a method of bridging micro- and meta- analysis of criminal activity. It lays out what crime script is and how…
Some further thoughts on the long term future of illicit drug markets. 10-15 years ago most people buying drugs would do it from a known contact, arranged by…
The internet has been turned into a disclosing machine. Anonymous communication is rare and difficult to achieve. Digital worlds are characterised by affordances, the technological qualities that enable…