|
|
|
|
LEADER |
01000caa a22002652 4500 |
001 |
JST132229838 |
003 |
DE-627 |
005 |
20240625152858.0 |
007 |
cr uuu---uuuuu |
008 |
220303s2018 xx |||||o 00| ||en c |
035 |
|
|
|a (DE-627)JST132229838
|
035 |
|
|
|a (JST)sciefictstud.45.1.0069
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a en
|
245 |
1 |
0 |
|a "Works like Magic": Metaphor, Meaning, and the GUI in Snow Crash
|
264 |
|
1 |
|c 2018
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Computers might well be said to work "like magic." Graphical User Interfaces (GUIs) allow computers to work predictably but inscrutably. Central to the design of GUIs are visual metaphors that help users understand the function of interface elements. In 1992, as GUIs were supplanting command-based interfaces, Snow Crash was published. In it, Neal Stephenson offers a new take on the SF/cyberpunk conceit of "cyberspace" with "the Metaverse," a VR world Stephenson claims was inspired by real-world GUI design principles. Yet in Stephenson's 1999 essay "In the Beginning… was the Command Line," the author rails against metaphor-based interfaces, claiming such software separates users from total control of their systems, control that can only be achieved by learning computer code. Similarly, in Snow Crash, programming code itself is cast as magical, an analog to a pre-Babelian speech that can control human minds as if they are computers. While Stephenson's novel does show that GUIs can constrain what users can do with their computers—as well as articulate ideas about what computers are for—it does something else. Despite its attack on GUIs, Snow Crash sees the appeal of cyberspace visions as rooted in a human desire to interact with computers in a human way. The real "magic" of making computers mean something on a human level occurs through metaphor-based mental operations which long predate computers.
|
540 |
|
|
|a © 2018 SF-TH
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer technology
|x Computer systems
|x Personal computers
|
650 |
|
4 |
|a Philosophy
|x Axiology
|x Aesthetics
|x Applied aesthetics
|x Human computer interaction
|x Computer interfaces
|x Graphical user interfaces
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer software
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer programming
|
650 |
|
4 |
|a Applied sciences
|x Technology
|x Communications technology
|x Communication systems
|x Digital communication systems
|x Internet
|x Cyberspace
|
650 |
|
4 |
|a Arts
|x Literature
|x Literary genres
|x Fiction
|x Speculative fiction
|x Science fiction
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer technology
|
650 |
|
4 |
|a Arts
|x Literature
|x Literary genres
|x Fiction
|x Novels
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Cybersecurity
|x Malware
|x Computer viruses
|
650 |
|
4 |
|a Philosophy
|x Axiology
|x Aesthetics
|x Applied aesthetics
|x Human computer interaction
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer technology
|x Computer systems
|x Personal computers
|
650 |
|
4 |
|a Philosophy
|x Axiology
|x Aesthetics
|x Applied aesthetics
|x Human computer interaction
|x Computer interfaces
|x Graphical user interfaces
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer software
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer programming
|
650 |
|
4 |
|a Applied sciences
|x Technology
|x Communications technology
|x Communication systems
|x Digital communication systems
|x Internet
|x Cyberspace
|
650 |
|
4 |
|a Arts
|x Literature
|x Literary genres
|x Fiction
|x Speculative fiction
|x Science fiction
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Computer technology
|
650 |
|
4 |
|a Arts
|x Literature
|x Literary genres
|x Fiction
|x Novels
|
650 |
|
4 |
|a Applied sciences
|x Computer science
|x Computer engineering
|x Cybersecurity
|x Malware
|x Computer viruses
|
650 |
|
4 |
|a Philosophy
|x Axiology
|x Aesthetics
|x Applied aesthetics
|x Human computer interaction
|
655 |
|
4 |
|a research-article
|
773 |
0 |
8 |
|i Enthalten in
|t Science Fiction Studies
|d SF-TH Inc., 1973
|g 45(2018), 1, Seite 69-90
|w (DE-627)341346438
|w (DE-600)2067357-7
|x 23276207
|7 nnns
|
773 |
1 |
8 |
|g volume:45
|g year:2018
|g number:1
|g pages:69-90
|
856 |
4 |
0 |
|u https://www.jstor.org/stable/10.5621/sciefictstud.45.1.0069
|3 Volltext
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_JST
|
912 |
|
|
|a GBV_ILN_11
|
912 |
|
|
|a GBV_ILN_20
|
912 |
|
|
|a GBV_ILN_22
|
912 |
|
|
|a GBV_ILN_24
|
912 |
|
|
|a GBV_ILN_31
|
912 |
|
|
|a GBV_ILN_39
|
912 |
|
|
|a GBV_ILN_40
|
912 |
|
|
|a GBV_ILN_60
|
912 |
|
|
|a GBV_ILN_62
|
912 |
|
|
|a GBV_ILN_63
|
912 |
|
|
|a GBV_ILN_65
|
912 |
|
|
|a GBV_ILN_69
|
912 |
|
|
|a GBV_ILN_70
|
912 |
|
|
|a GBV_ILN_90
|
912 |
|
|
|a GBV_ILN_100
|
912 |
|
|
|a GBV_ILN_110
|
912 |
|
|
|a GBV_ILN_120
|
912 |
|
|
|a GBV_ILN_150
|
912 |
|
|
|a GBV_ILN_165
|
912 |
|
|
|a GBV_ILN_187
|
912 |
|
|
|a GBV_ILN_285
|
912 |
|
|
|a GBV_ILN_374
|
912 |
|
|
|a GBV_ILN_702
|
912 |
|
|
|a GBV_ILN_2001
|
912 |
|
|
|a GBV_ILN_2003
|
912 |
|
|
|a GBV_ILN_2005
|
912 |
|
|
|a GBV_ILN_2006
|
912 |
|
|
|a GBV_ILN_2007
|
912 |
|
|
|a GBV_ILN_2008
|
912 |
|
|
|a GBV_ILN_2009
|
912 |
|
|
|a GBV_ILN_2010
|
912 |
|
|
|a GBV_ILN_2011
|
912 |
|
|
|a GBV_ILN_2014
|
912 |
|
|
|a GBV_ILN_2015
|
912 |
|
|
|a GBV_ILN_2018
|
912 |
|
|
|a GBV_ILN_2020
|
912 |
|
|
|a GBV_ILN_2021
|
912 |
|
|
|a GBV_ILN_2026
|
912 |
|
|
|a GBV_ILN_2027
|
912 |
|
|
|a GBV_ILN_2043
|
912 |
|
|
|a GBV_ILN_2044
|
912 |
|
|
|a GBV_ILN_2050
|
912 |
|
|
|a GBV_ILN_2056
|
912 |
|
|
|a GBV_ILN_2057
|
912 |
|
|
|a GBV_ILN_2061
|
912 |
|
|
|a GBV_ILN_2107
|
912 |
|
|
|a GBV_ILN_2190
|
912 |
|
|
|a GBV_ILN_2936
|
912 |
|
|
|a GBV_ILN_2949
|
912 |
|
|
|a GBV_ILN_2950
|
912 |
|
|
|a GBV_ILN_4012
|
912 |
|
|
|a GBV_ILN_4035
|
912 |
|
|
|a GBV_ILN_4037
|
912 |
|
|
|a GBV_ILN_4046
|
912 |
|
|
|a GBV_ILN_4112
|
912 |
|
|
|a GBV_ILN_4125
|
912 |
|
|
|a GBV_ILN_4126
|
912 |
|
|
|a GBV_ILN_4242
|
912 |
|
|
|a GBV_ILN_4251
|
912 |
|
|
|a GBV_ILN_4305
|
912 |
|
|
|a GBV_ILN_4306
|
912 |
|
|
|a GBV_ILN_4307
|
912 |
|
|
|a GBV_ILN_4322
|
912 |
|
|
|a GBV_ILN_4323
|
912 |
|
|
|a GBV_ILN_4325
|
912 |
|
|
|a GBV_ILN_4335
|
912 |
|
|
|a GBV_ILN_4346
|
912 |
|
|
|a GBV_ILN_4392
|
912 |
|
|
|a GBV_ILN_4393
|
951 |
|
|
|a AR
|
952 |
|
|
|d 45
|j 2018
|e 1
|h 69-90
|