Beyond the Information Age discusses a new way of thinking about computers, knowledge and understanding. See the editorial for more information.... |
Home The Understanding Affect Knowledge Warfare Attack and Defense | |
Attack and DefenseCommon methods of attacking and defending knowledge are by disproving, confusing, corrupting, disrupting, destroying, hiding, lying, cheating, stealing, and spoofing. These procedures have been developed and refined over millions of years of human evolution. That makes it very difficult to analyze the exact procedural knowledge of all these understanding affectors. But, you should know how most of them work because you probably used many of them yourself.
|
|
Home The Understanding Affect Knowledge Warfare Attack and Defense |