The Evolution of Digital Architecture and the Formation Of

Total Page:16

File Type:pdf, Size:1020Kb

The Evolution of Digital Architecture and the Formation Of University of Wisconsin Milwaukee UWM Digital Commons Theses and Dissertations May 2019 Culture and Code: The volutE ion of Digital Architecture and the Formation of Networked Publics Geoffrey Gimse University of Wisconsin-Milwaukee Follow this and additional works at: https://dc.uwm.edu/etd Part of the Communication Technology and New Media Commons, Databases and Information Systems Commons, and the History of Science, Technology, and Medicine Commons Recommended Citation Gimse, Geoffrey, "Culture and Code: The vE olution of Digital Architecture and the Formation of Networked Publics" (2019). Theses and Dissertations. 2070. https://dc.uwm.edu/etd/2070 This Dissertation is brought to you for free and open access by UWM Digital Commons. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of UWM Digital Commons. For more information, please contact [email protected]. CULTURE AND CODE: THE EVOLUTION OF DIGITAL ARCHITECTURE AND THE FORMATION OF NETWORKED PUBLICS by Geoffrey Gimse A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in English at The University of Wisconsin-Milwaukee May 2019 ABSTRACT CULTURE AND CODE: THE EVOLUTION OF DIGITAL ARCHITECTURE AND THE FORMATION OF NETWORKED PUBLICS by Geoffrey Gimse The University of Wisconsin-Milwaukee, 2019 Under the Supervision of Professor William Keith Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media this dissertation positions the construction of the idea of the Internet and its technology as the result of an ongoing series of intersections and collisions between the sociotechnical imaginaries of three different publics: Implementors, Vendors, and Users. These publics were identified as the primary audiences of the 1989 Internet Engineering Task Force specification of the four-layer TCP/IP model that became a core part of our modern infrastructure. Using that model as a continued metaphor throughout the work, Culture and Code shows how each public’s sociotechnical imaginary developed, how they influenced and shaped one another, and the inevitable conflicts that arose leading to a coalescing sociotechnical imaginary that is centered around vendor control while continuing to project the ideal of the empowered user. ii © Copyright by Geoffrey Gimse, 2019 All Rights Reserved To Courtney, my wife and partner through this crazy journey. Without your amazing support and encouragement, none of this would have been possible. TABLE OF CONTENTS Introduction: Imaginaries in Conflict ............................................................................................................ 1 Chapter 1: Models for a Social History of Network Technology ................................................................... 6 Rethinking the Narrative ........................................................................................................................... 6 Telling the History of the Digital Public Sphere ...................................................................................... 14 Computing and the Network in the Public Mind .................................................................................... 15 The Personal Computer: Power and Boundaries .................................................................................... 20 The Birth of the Cloud and the Growing Abstraction of Digital Power................................................... 28 Evolution of Technological Change ......................................................................................................... 31 Chapter 2: The Link Layer ........................................................................................................................... 33 The Network as a Public .......................................................................................................................... 35 Self-Organization ................................................................................................................................. 37 Stranger Relations ............................................................................................................................... 37 Personal and Impersonal Speech ........................................................................................................ 38 Attention ............................................................................................................................................. 39 Social Space ......................................................................................................................................... 39 Temporality ......................................................................................................................................... 40 Poetic World Making........................................................................................................................... 41 RFC 1122 and 1123: The TCP/IP Network Model and its Audiences ...................................................... 44 The Implementors: Imagining Meritocracy ............................................................................................ 51 Users: From Hobbyist to Hacker to Genius ............................................................................................. 54 Vendors: Innovation and Destruction ..................................................................................................... 57 Publics, Change, and Internet Imaginaries ............................................................................................. 60 Chapter 3: The Internet Layer: .................................................................................................................... 66 The Rise of the User Imaginary ............................................................................................................... 66 Power and Control .................................................................................................................................. 70 Government and the Vendor Publics .................................................................................................. 72 User and Implementor Alliances ............................................................................................................. 77 The Expansion of the User Imaginary ..................................................................................................... 79 The BBS and the Locus of the User Imaginary ........................................................................................ 81 Tensions with the Vendor Imaginary ...................................................................................................... 84 The Rise of MUDS and the User as Creator ............................................................................................ 86 Chapter 4: The Transport Layer .................................................................................................................. 90 The Stack, Redux ..................................................................................................................................... 90 The Protocol Suite as Political Space ...................................................................................................... 95 The Importance of (a) Protocol ............................................................................................................... 97 Cyborg Publics ......................................................................................................................................... 99 The Robustness Principle ...................................................................................................................... 102 The Hypertext Transport Protocol ........................................................................................................ 103 The Origins of HTTP ............................................................................................................................... 104 The Vendor Arrives ............................................................................................................................... 112 Government’s Role in the Imaginaries ................................................................................................. 116 Chapter 5: The Application Layer .............................................................................................................. 121 Application Layer .................................................................................................................................. 121 Into the Modern Imaginary ................................................................................................................... 122 Path 1: User-Imaginary 2.0: De-Centralization ..................................................................................... 131 Path 2: Vendor
Recommended publications
  • Internet Invariants: What Really Matters an Internet Society Public Policy Briefing
    Internet Invariants: What Really Matters An Internet Society Public Policy Briefing 26 September 2016 Introduction Today’s Internet has We place an enormous amount of faith in the Internet, largely because it facilitates our transformed how more than two billion people connect and everyday lives. We instinctively trust that when we send an email, it will be received by communicate. And it will the intended recipient. When we type a domain name into a browser, we presume that continue to transform our economy, infrastructure, and the results will be what we are looking for. We can make these assumptions because social lives as cloud computing, Internet invariants ensure that if we send data, it arrives; and if we seek content, it will the Internet of Things, and be located. mobile devices evolve in ways we cannot yet imagine. We don’t often talk about how the Starting in the 1970s, a variety of protocols and network architectures were developed, network behind this technology works, just as most of us don’t but none became the driver of economic and social development that the Internet did. concern ourselves with where IBM’s Systems Network Architecture, for example, failed to take off because it could only electricity comes from, so long connect with hardware manufactured by IBM. The technical system that proliferated as our lights turn on. But as the Internet becomes an instead, and which remains at the foundation of the Internet, was TCP/IP because of its increasingly more pervasive and decentralized nature and underlying values of interoperability, flexibility, resilience, and critical piece of infrastructure, we need to understand both global reach.
    [Show full text]
  • Cancel Culture: Posthuman Hauntologies in Digital Rhetoric and the Latent Values of Virtual Community Networks
    CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks Heather Palmer Rik Hunter Associate Professor of English Associate Professor of English (Chair) (Committee Member) Matthew Guy Associate Professor of English (Committee Member) CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks A Thesis Submitted to the Faculty of the University of Tennessee at Chattanooga in Partial Fulfillment of the Requirements of the Degree of Master of English The University of Tennessee at Chattanooga Chattanooga, Tennessee August 2020 ii Copyright © 2020 By Austin Michael Hooks All Rights Reserved iii ABSTRACT This study explores how modern epideictic practices enact latent community values by analyzing modern call-out culture, a form of public shaming that aims to hold individuals responsible for perceived politically incorrect behavior via social media, and cancel culture, a boycott of such behavior and a variant of call-out culture. As a result, this thesis is mainly concerned with the capacity of words, iterated within the archive of social media, to haunt us— both culturally and informatically. Through hauntology, this study hopes to understand a modern discourse community that is bound by an epideictic framework that specializes in the deconstruction of the individual’s ethos via the constant demonization and incitement of past, current, and possible social media expressions. The primary goal of this study is to understand how these practices function within a capitalistic framework and mirror the performativity of capital by reducing affective human interactions to that of a transaction.
    [Show full text]
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • "Cloud Computing Is a Model for Enabling Convenient, On
    What is Cloud Computing? "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction." National Institute of Standards and Technology (NIST) Forum May 2010 http://csrc.nist.gov/groups/SNS/cloud-computing/forum-workshop_may2010.html Cloud Computing concept... it's been around longer than you think "In 1984, John Gage and Bill Joy of Sun Microsystems were credited with saying, "The network is the computer," one of the most memorable slogans of the information age. This concept, based on the tenet of making computing resources available to all users irrespective of location, as long as they are connected to the network, forms the basis of the Internet as we know it, and foretold the advent of cloud computing." Garry Metcalf, Analysys Mason, Sep 2009 http://www.analysysmason.com/about-us/news/newsletter/Previous-news-articles/Now-the-network-really-is-the-computer 2 The Cloud Pyramid What is App Engine? •App Engine is a platform •You build & test your app •Then upload your app to Google •App Engine runs everything •No need to worry about machines, network, storage, scalability, etc. 4 Challenges building web apps What keeps you up at night? 5 The Components of Google App Engine Components Language Runtimes Web-based SDK Admin Console Scalable Infrastructure 7 Components Linux Scalable GFS Infrastructure
    [Show full text]
  • A FACULTY PERSPECTIVES and PRACTICES of SOCIAL PRESENCE in ONLINE POST-SECONDARY LEARNING ENVIRONMENTS a Dissertation SUBMITTED
    FACULTY PERSPECTIVES AND PRACTICES OF SOCIAL PRESENCE IN ONLINE POST-SECONDARY LEARNING ENVIRONMENTS A Dissertation SUBMITTED TO THE FACULTY OF THE UNIVERSITY OF MINNESOTA BY Julie Ann Smith IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF EDUCATION Joyce Strand, Ph.D., Adviser April 2018 a Julie Ann Smith 2018 © b Acknowledgements This dissertation would not have been able without my patient adviser, Dr. Joyce Strand, who continued to support me throughout the years and help me to finally finish this research project. The last three years of trying to finish my dissertation included the caregiving to my mother and father. My father spent over two years in assistive care at the end of battling a long war with Alzheimer’s. He needed my mother’s help and she needed mine. This, and a concurrent divorce to my husband of 23 years, prolonged my ability to complete the writing of this dissertation, thus a long time had passed since the literature review. Many thanks go to my committee and doctoral chair who patiently provided me excellent advice in educational theory, interview and survey questionnaire revisions and/or dissertation guidance: Drs. Helen Mongan-Rallis, Craig Stroupe, Terrie Shannon, and Linda Deneen, and Chair Dr. Frank Guldbrandsen. Acknowledgements also go out to the faculty survey respondents and interviewees. Without their volunteer time, participation, and input, I would not have results to advance the study of social presence in the Community of Inquiry model. Additional thanks go to the faculty and staff and my cohort of the Education Doctorate in Teaching and Learning program at the University of Minnesota Duluth in the College of Education and Human Service Professions.
    [Show full text]
  • Digital Image Steganalysis Techniques
    ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 4, October 2013 A Review on Digital Image Steganalysis Techniques Categorised by Features Extracted Rita Chhikara, Latika Singh ITM University, Gurgaon, Haryana, India presence or absence of embedded message. Images are Abstract- The overwhelming growth in communication often used as a carrier because of their extensive technology and usage of public domain channels (i.e. availability with high resolution of pixels. Data Internet) has greatly facilitated transfer of data. However, embedding in a multimedia carrier like image may such open communication channels have greater vulnerability involve varying parameters such as different image to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data formats, different embedding algorithms and various through apparently innocuous carriers such as text, image, steganographic keys. This has made steganalysis a more audio or video in an effort to conceal the existence of the difficult and challenging task. Earliest work on secret data and the fact that communication is even taking steganalysis was reported by Johnson and Jajodia [9] and place. Steganalysis is an attack on steganography. Both Chandramouli et al.[10]. It has gained prominence in steganography and steganalysis have received a great deal of national security and forensic sciences as detection of attention from law enforcement and the media. In the past hidden messages can lead to the prevention of disastrous years many powerful and robust methods of steganography security incidents. Algorithms for Steganalysis are and steganalysis have been reported in the literature.
    [Show full text]
  • MDM & Integration
    MDM & Integration Past, Present & Future John Jacobs Jacobs Consulting Four Decades of Change Late 70s to early 80s Change Is Coming 1990s Standards Movement The Standards “Wars” Integration Technologies Late 90s to 2012 Today’s Buzz The Future 70s – 80s What Did We Worry About Machines did not network well EBCDIC vs ASCII Big Endian vs Little Endian (byte order) Format Conversions (why are they always different) READ(*,'(2I5,F10.2)') READ(*,"(5F10.2)") WRITE(*,"(10F5.2)") Change Is Coming Mainframes started to give way to “minicomputers” VAX 11/780 Introduced in 1977 (32-bit) Sun Microsystems 1982 (RISC) "the network is the computer,” John Gage 1984 The Personal Computers Arrive Commodore 64 1982 First IBM PC 1982 Apple’s Lisa 1983 First Mac 1984 Computer Aided Exploration (CAEX) Intergraph InterPro 32 was introduced in 1984 1MB 1st Landmark workstation 1984 3D Interpretation on PC architecture (Intel 286 chip) GeoQuest 1984 2D on VAX Sun E&P’s Geophysical Workstation 1987 1990s Standards Movement 1988 Open Software Foundation (OSF): Motif (GUI Standard), X- Windows The PPDM organization got its start in 1988 when, recognizing the need for petroleum data standards, a group of petroleum industry players and data experts joined forces in 1991 to create the Public Petroleum Data Model Association.* Petroleum Open Software Company (POSC) was formed in October 1990 by five founding sponsor oil companies: BP, Chevron, Elf (since merged into Total), Mobil (since merged into ExxonMobil), and Texaco (since merged into Chevron). Now known as Energistics.* IBM’s Mercury project to establish a logical data model for the petroleum industry.
    [Show full text]
  • Linuxvilág 4.Évf. 10. Sz. (2003 Október)
    Kovácsmûhely A Bricolage A Salon és más népszerû webhelyek mögött meghúzódó tartalomkezelõ rendszer egyszerûen használható saját webhelyünk írói és szerkesztõi számára is. z elmúlt néhány hónapban bemutattunk egy pár hajtódik végre minden alkalommal. Ez a megoldás azt ered- Zope alapú tartalomkezelõ rendszert. Természetesen ményezi, hogy a Bricolage mûködése gyors lesz. nem a Zope az egyetlen versenyzõ a nyílt forrású Mint már említettem, a mod_perl csak az Apache webkiszol- Atartalomkezelõ rendszerek mezõnyében. Az egyik egyre jelen- gálóval mûködik. Bár folyamatosan dolgoznak a mod_perl átvi- tõsebbé váló csomag a Bricolage, amelyet David Wheeler írt és telén az Apache 2.x számára, a cikk írásának idején (2003 júniu- tart karban, és amely a mod_perl csomagon és a PostgreSQL sa) még csak az Apache 1.x változatával mûködik együtt. Mivel adatbázis-kezelõn alapul. az Apache 1.x több különálló folyamatot futtat, ahelyett hogy © Kiskapu Kft. Minden jog fenntartva A Bricolage program használatához nem szükséges számítás- egy folyamaton belül több szálat indítana, nincs lehetõség arra, technikai ismeret. Igaz, hogy a program módosítása, illetve hogy igazi adatbázisgyûjtõt hozzunk létre a különféle gyermek karbantartása nagy szakértelmet kíván, de az Apache webki- HTTP-kiszolgálók számára. A létrehozott adatbázis-kapcsolat szolgálóval vagy a Perl nyelvvel dolgozó emberek általában viszont életben tartható az Apache és a PostgreSQL között az programozók vagy rendszergazdák, míg a Bricolage felhasz- Apache::DBI modul használatával. A Bricolage pontosan ezt nálói a webhely írói, szerkesztõi és készítõi. teszi, így az adatbázis-kapcsolatot nem kell minden alkalommal A Bricolage a való világban is bizonyított. Az Apache és a Perl újra létrehozni, amikor egy felhasználó lekér valamit. évekig küzdött azért, hogy bekerüljön a fõáramba.
    [Show full text]
  • Java Programming/Print Version - Wikibooks, Open Books for an Open World
    Java Programming/Print version - Wikibooks, open books for an open worldhttps://en.wikibooks.org/w/index.php?title=Java_Programming/Print_ve... Java Programming/Print version Contents 1 Overview 2 Preface 2.1 Are you new to programming? 2.2 Programming with Java™ 2.3 What can Java not do? 3 About This Book 3.1 Who should read this book? 3.2 How to use this book 3.3 How can you participate 3.3.1 As a reader 3.3.2 As a contributor 4 History 4.1 Earlier programming languages 4.2 The Green team 4.3 Reshaping thought 4.4 The demise of an idea, birth of another 4.5 Versions 4.5.1 Initial Release (versions 1.0 and 1.1) 4.5.2 Java 2 (version 1.2) 4.5.3 Kestrel (Java 1.3) 4.5.4 Merlin (Java 1.4) 4.5.5 Tiger (version 1.5.0; Java SE 5) 4.5.6 Mustang (version 1.6.0; Java SE 6) 4.5.7 Dolphin (version 1.7.0; Java SE 7) 4.6 References 5 Java Overview 5.1 Object orientation 5.2 Platform dependence 5.3 Standardization 5.4 Secure execution 5.5 Error handling 5.6 Networking capabilities 5.7 Dynamic class loading 5.8 Automatic memory garbage collection 5.9 Applet 5.10 Forbidden bad practices 5.11 Evaluation 6 The Java Platform 6.1 Java Runtime Environment (JRE) 6.1.1 Executing native Java code (or byte-code) 6.1.2 Do you have a JRE? 6.1.3 Java Virtual Machine (JVM) 6.1.3.1 Just-in-Time Compilation 6.1.3.2 Native optimization 6.1.3.3 Was JVM the first virtual machine? 6.2 Java Development Kit (JDK) 6.2.1 The Java compiler 6.2.2 Applet development 6.2.3 Annotation processing 6.2.4 Integration of non-Java and Java code 6.2.5 Class library conflicts 6.2.6 Software
    [Show full text]
  • Computer-Supported Cooperative Work for Music Applications
    Computer-Supported Cooperative Work for Music Applications Author: Álvaro Mendes Barbosa April 2006 Dipòsit legal: B.48971-2006 ISBN: 978-84-690-3933-5 Dissertation submitted to the Department of Technology of the Pompeu Fabra University for the Program in Computer Science and Digital Communication, in partial fulfillment of the requirements of the degree: Doctor per la Universitat Pompeu Fabra with Mention of European Doctor Dissertation directed by Dr. Xavier Serra and co-directed by Dr. Sergi Jordà Universitat Pompeu Fabra Departamento de Tecnologia Estació de França Passeig de Circumvallació, 8 08003 Barcelona, España Research leading to this Dissertation was conducted by the author at: This Doctorate Research Work was supported through the award of a Doctorate Scholarship by: (SFRH/BD/5192/2001) The Author is affiliated with: To Sofia Abstract This dissertation derives from research on musical practices mediated by computer networks conducted from 2001 to 2005 in the Music Technology Group of the Pompeu Fabra University in Barcelona, Spain. It departs from work carried out over the last decades in the field of Computer-Supported Cooperative Work (CSCW), which provides us with collaborative communication mechanisms that can be regarded from a music perspective in diverse scenarios: Composition, Performance, Improvisation or Education. The first contribution originated from this research work is an extensive survey and systematic classification of Computer-Supported Cooperative Work for Music Applications. This survey led to the identification of innovative approaches, models and applications, with special emphasis on the shared nature of geographically displaced communication over the Internet. The notion of a Shared Sonic Environments was introduced and implemented in a proof-of- concept application entitled Public Sound Objects (PSOs).
    [Show full text]
  • Trump's Disinformation 'Magaphone'. Consequences, First Lessons and Outlook
    BRIEFING Trump's disinformation 'magaphone' Consequences, first lessons and outlook SUMMARY The deadly insurrection at the US Capitol on 6 January 2021 was a significant cautionary example of the offline effects of online disinformation and conspiracy theories. The historic democratic crisis this has sparked − adding to a number of other historic crises the US is currently battling − provides valuable lessons not only for the United States, but also for Europe and the democratic world. The US presidential election and its aftermath saw domestic disinformation emerging as a more visible immediate threat than disinformation by third countries. While political violence has been the most tangible physical effect of manipulative information, corrosive conspiracy theories have moved from the fringes to the heart of political debate, normalising extremist rhetoric. At the same time, recent developments have confirmed that the lines between domestic and foreign attempts to undermine democracy are increasingly blurred. While the perceived weaknesses in democratic systems are − unsurprisingly − celebrated as a victory for authoritarian state actors, links between foreign interference and domestic terrorism are under growing scrutiny. The question of how to depolarise US society − one of a long list of challenges facing the Biden Administration − is tied to the polarised media environment. The crackdown by major social media platforms on Donald Trump and his supporters has prompted far-right groups to abandon the established information ecosystem to join right-wing social media. This could further accelerate the ongoing fragmentation of the US infosphere, cementing the trend towards separate realities. Ahead of the proposed Democracy Summit − a key objective of the Biden Administration − tempering the 'sword of democracy' has risen to the top of the agenda on both sides of the Atlantic.
    [Show full text]
  • Researching Violent Extremism the State of Play
    Researching Violent Extremism The State of Play J.M. Berger RESOLVE NETWORK | JUNE 2019 Researching Violent Extremism Series The views in this publication are those of the author. They do not necessarily reflect the views of the RESOLVE Network, its partners, the U.S. Institute of Peace, or any U.S. government agency. 2 RESOLVE NETWORK RESEARCH REPORT NO. 1 | LAKE CHAD BASIN RESEARCH SERIES The study of violent extremism is entering a new phase, with shifts in academic focus and policy direction, as well as a host of new and continuing practical and ethical challenges. This chapter will present an overview of the challenges ahead and discuss some strategies for improving the state of research. INTRODUCTION The field of terrorism studies has vastly expanded over the last two decades. As an illustrative example, the term “terrorism” has been mentioned in an average of more than 60,000 Google Scholar results per year since 2010 alone, including academic publications and cited works. While Google Scholar is an admittedly imprecise tool, the index provides some insights on relative trends in research on terrorism. While almost 5,000 publications indexed on Google Scholar address, to a greater or lesser extent, the question of “root causes of terrorism, at the beginning of this marathon of output, which started soon after the terrorist attacks of September 11, 2001, only a fractional number of indexed publications addressed “extremism.” Given the nature of terrorist movements, however, this should be no great mys- tery. The root cause of terrorism is extremism. Figure 1: Google Scholar Results per Year1 Publications mentioning terrorism Publications mentioning extremism 90,000 80,000 70,000 60,000 50,000 40,000 30,000 20,000 Google Scholar Results 10,000 0 Year 1 Google Scholar, accessed May 30, 2019.
    [Show full text]