Academic literature on the topic 'Cyborg theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyborg theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cyborg theory"
Dos Santos, Victoria, and Humberto Valdivieso. "The Contemporary Cyborg." Techné: Research in Philosophy and Technology 25, no. 2 (2021): 195–207. http://dx.doi.org/10.5840/techne202167141.
Full textViljanen, Mika. "A Cyborg Turn in Law?" German Law Journal 18, no. 5 (2017): 1277–308. http://dx.doi.org/10.1017/s2071832200022331.
Full textCox, Lara. "Decolonial Queer Feminism in Donna Haraway's ‘A Cyborg Manifesto’ (1985)." Paragraph 41, no. 3 (2018): 317–32. http://dx.doi.org/10.3366/para.2018.0274.
Full textTorres-Hostench, Olga. "Will translators be cyborgs? What would make a cyborg translator?" Tradumàtica: tecnologies de la traducció, no. 20 (December 21, 2022): 268–75. http://dx.doi.org/10.5565/rev/tradumatica.316.
Full textBrowne, Kath. "Cyborg uterine geographies." Dialogues in Human Geography 8, no. 3 (2018): 317–19. http://dx.doi.org/10.1177/2043820618800601.
Full textMehaffy, Marilyn Maness. "Fetal attractions: The limit of Cyborg theory." Women's Studies 29, no. 2 (2000): 177–94. http://dx.doi.org/10.1080/00497878.2000.9979307.
Full textObolkina, Svetlana. "Cyborg in the “mirror” of philosophical reflection (using the example of the game “Cyberpunk 2077”)." Chelovek 33, no. 1 (2022): 122. http://dx.doi.org/10.31857/s023620070019078-2.
Full textChang,Jung-Hee. "Feminism in the Age of Technoscience and Cyborg Theory." Feminist Studies in English Literature 17, no. 1 (2009): 269–95. http://dx.doi.org/10.15796/fsel.2009.17.1.011.
Full textSey, J. "The terminator syndrome: Science fiction, cinema and contemporary culture." Literator 13, no. 3 (1992): 13–20. http://dx.doi.org/10.4102/lit.v13i3.760.
Full textN, Uma Maheswari. "The Eleventh-Dimensional Fish Man from the Short Story Lion's Tail." International Research Journal of Tamil 4, S-7 (2022): 335–43. http://dx.doi.org/10.34256/irjt22s753.
Full textDissertations / Theses on the topic "Cyborg theory"
Merrick, Katherine Anna. "The cyborg is the message a monstrous perspective for communication theory /." [Ames, Iowa : Iowa State University], 2007.
Find full textCraveiro, António Manuel Balazeiro Cascão. "O hipercorpo-tecnologias da carne : do culturista ao cyborg." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2000. http://dited.bn.pt:80/29212.
Full textBilgen, Funda. "An Ecofeminist Approach To Atwood&." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/3/12610246/index.pdf.
Full textBlaeuer, Daniel Matthew. "An Ecology of Performance: Gregory Bateson's Cybernetic Performance." Scholar Commons, 2010. http://scholarcommons.usf.edu/etd/3510.
Full textVan, der Schyff Karlien. "Screen bound/skin bound : the politics of embodiment in the posthuman age." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4139.
Full textVillafana, Johans. "Att (re) –introducera hybrida tankar i ett bilsamhälle : En studie av förbindelsen bil-männniska cyborgen med hjälp av Actor Network Theory." Thesis, Stockholms universitet, Kulturgeografiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-90827.
Full textSwift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16439/1/Adam_Swift_Thesis.pdf.
Full textSwift, Adam Glen. "Mapping posthuman discourse and the evolution of living information." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16439/.
Full textBolich, Cecilia Madeline. "_Alien_ Thoughts: Spectatorial Pleasure and Mind Reading in Ridley Scott's Horror Film." Scholar Commons, 2011. http://scholarcommons.usf.edu/etd/3012.
Full textAlphin, Caroline Grey. "Living on the Edge of Burnout: Defamiliarizing Neoliberalism Through Cyberpunk Science Fiction." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/88796.
Full textBooks on the topic "Cyborg theory"
Technologies of the gendered body: Reading cyborg women. Duke University Press, 1996.
Find full textPawlick, Jeffrey, and Quanyan Zhu. Game Theory for Cyber Deception. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66065-9.
Full textJenny, Wolmark, ed. Cybersexualities: A reader on feminist theory, cyborgs, and cyberspace. Edinburgh University Press, 1999.
Find full textLiu, Peng, Sushil Jajodia, and Cliff Wang, eds. Theory and Models for Cyber Situation Awareness. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61152-5.
Full textOn spiders, cyborgs, and being scared: The feminine and the sublime. Manchester University Press, 2001.
Find full textThe souls of cyberfolk: Posthumanism as vernacular theory. University of Minnesota Press, 2005.
Find full textCavallaro, Lorenzo, and Dieter Gollmann, eds. Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38530-8.
Full textBook chapters on the topic "Cyborg theory"
Short, Sue. "Body and Soul: A History of Cyborg Theory." In Cyborg Cinema and Contemporary Subjectivity. Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230513501_3.
Full textGoodman, Robin Truth. "Baghdad Burning: Cyborg Meets the Negative." In Feminist Theory in Pursuit of the Public. Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230112957_6.
Full textPuar, Jasbir K. "“I Would Rather be a Cyborg than a Goddess”." In Feminist Theory Reader. Routledge, 2020. http://dx.doi.org/10.4324/9781003001201-47.
Full textEarle, Joshua. "Cyborg Maintenance: Design, Breakdown, and Inclusion." In Design, User Experience, and Usability. Design Philosophy and Theory. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23570-3_5.
Full textLupton, Deborah. "Donna Haraway: The Digital Cyborg Assemblage and the New Digital Health Technologies." In The Palgrave Handbook of Social Theory in Health, Illness and Medicine. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137355621_36.
Full textFielder, Andrew. "Game Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-11.
Full textRuth, David M. "Probability Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-10.
Full textRussell, Travis B. "Quantum Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-13.
Full textCocke, William, and Meng-Che ‘Turbo’ Ho. "Group Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-14.
Full textLauderdale, Lindsey-Kay. "Ring Theory." In Mathematics in Cyber Research. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9780429354649-15.
Full textConference papers on the topic "Cyborg theory"
Wu, Zhen, Guoyuan Liang, Jiao Ren, Fan Chen, Likai Zhou, and Xinyu Wu. "Nonuniform Illumination Image Segmentation Based on Improved Homomorphic Filtering and Class Uncertainty Theory." In 2018 IEEE International Conference on Cyborg and Bionic Systems (CBS). IEEE, 2018. http://dx.doi.org/10.1109/cbs.2018.8612180.
Full textReissman, Timothy, and Ephrahim Garcia. "Surgically Implanted Energy Harvesting Devices for Renewable Power Sources in Insect Cyborgs." In ASME 2008 International Mechanical Engineering Congress and Exposition. ASMEDC, 2008. http://dx.doi.org/10.1115/imece2008-68136.
Full textPeng, Ling-Xi, and Tian-Wei Chen. "Automated Intrusion Response System Algorithm with Danger Theory." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.16.
Full textGuellati, Souad, Ilham Kitouni, Riadh Matmat, and Djamel Eddine Saidouni. "Forward Analysis of Timed Automata with Action Durations: Theory and Implementation." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.55.
Full textHuang, Haihui, Jing Cai, and Shaoci Xie. "Implementing an Asset Trading System Based on Blockchain and Game Theory." In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00045.
Full textZhu, Quanyan. "Game theory for cyber deception." In the 6th Annual Symposium. ACM Press, 2019. http://dx.doi.org/10.1145/3314058.3314067.
Full textZhuang, Rui, Alexandru G. Bardas, Scott A. DeLoach, and Xinming Ou. "A Theory of Cyber Attacks." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2808475.2808478.
Full textDawood, Harith A. "Graph Theory and Cyber Security." In 2014 3rd International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 2014. http://dx.doi.org/10.1109/acsat.2014.23.
Full textShiva, Sajjan, Sankardas Roy, and Dipankar Dasgupta. "Game theory for cyber security." In the Sixth Annual Workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1852666.1852704.
Full textWang, Gang, Yinhui Yang, Qinhua Ren, and Runnian Ma. "Efficiency of Command and Control in Cyberspace: Visit from the Perspective of Complexity Theory." In 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2013. http://dx.doi.org/10.1109/cyberc.2013.74.
Full textReports on the topic "Cyborg theory"
Bier, Asmeret Brooke. A cognitive and economic decision theory for examining cyber defense strategies. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1147206.
Full textLohn, Andrew, and Krystal Jackson. Will AI Make Cyber Swords or Shields? Center for Security and Emerging Technology, 2022. http://dx.doi.org/10.51593/2022ca002.
Full textLetchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1330190.
Full textNucera, Diana J., and Catalina Vallejo. Media-making Pedagogies for Empowerment & Social Change: An Interview with Diana J. Nucera (AKA Mother Cyborg). Just Tech, Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3022.d.2022.
Full textGoode, Kayla, Ali Crawford, and Christopher Back. U.S. High School Cybersecurity Competitions: Building Cyber Talent Through Extracurricular Activities. Center for Security and Emerging Technology, 2022. http://dx.doi.org/10.51593/2021ca012.
Full textBelcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2113.
Full textHoffman, Wyatt. "Making AI Work for Cyber Defense: The Accuracy-Robustness Tradeoff ". Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2021ca007.
Full textCarty, Anthony, and Jing Gu. Theory and Practice in China’s Approaches to Multilateralism and Critical Reflections on the Western ‘Rules-Based International Order’. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/ids.2021.057.
Full textBuchanan, Ben, John Bansemer, Dakota Cary, Jack Lucas, and Micah Musser. Automating Cyber Attacks: Hype and Reality. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca002.
Full textMartinez, Cindy, and Micah Musser. U.S. Demand for Talent at the Intersection of AI and Cybersecurity. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca009.
Full text