Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
G. Smith
University of the Sciences
Philadelphia, Pennsylvania

For almost 18 years, G. Mick Smith, PhD was CIO at Smith Consulting where he assisted numerous clients in the Philadelphia-Valley Forge and Delaware Valley area. Prior to his consulting career at an Internet start-up, at universities, in several corporations, and a non-profit, he was a professor of humanities at Hahnemann University where he developed on online History of World Medicine course in 1994; and, in 1997, he earned a Distance Learning Administrator Certificate from Texas A&M University and the Center for Distance Learning Research. He recently completed two certificates at the Massachusetts Institute of Technology in their edX component, Design and Development of Educational Technology (2014) and Design and Development of Games for Learning (2015). In addition to his technology background, as an administrator, he earned two more certificates from the Jack Welch Management Institute: Creating a Winning Strategy (2015) and Becoming a Leader (2014).

Smith has published widely in gaming, educational technology, and in the history of computing, in addition to presenting academic papers at international, national, and regional conferences. His educational teaching runs the gamut, from universities to several private schools at the K-12 level. In addition, he publishes in Computing Reviews (of course!), as well as in Choice: Current Reviews for Academic Libraries, the Bryn Mawr Classical Journal, and the Medieval Review.

Smith earned his doctorate at UCLA in the history of religions and has been awarded two master’s degrees as well, one in history from UCLA and the other in historical theology from Fuller Theological Seminary (Pasadena, CA). Also, he was a Johannes Quasten Scholar in Patristics from The Catholic University of America (Washington, DC). He is currently campus dean at the Christiana, DE Strayer University site, and previously he served at the King of Prussia and the Center City, PA Strayer locations.


 The emergence of personal data protection as a fundamental right of the EU
Fuster G.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 274 pp. Type: Book (978-3-319050-22-5)

Law in the European Union (EU) is at the forefront of proposing the fundamental right to personal data protection. This book reveals the steps leading to the emergence of the new understanding of rights while indicating the intricacies of its rel...


Protection of information and the right to privacy - A new equilibrium?
Floridi L.,  Springer Publishing Company, Incorporated, Cham, Switzerland, 2014. 144 pp. Type: Book (978-3-319057-19-4)

This slim volume arose from a 2013 international workshop on the “Protection of Information and the Right to Privacy.” The editor maintains that digital communication has complicated the “balance that liberal societies must find ...


The evolution of global Internet governance: principles and policies in the making
Radu R., Chenou J., Weber R.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 198 pp. Type: Book (978-3-642452-98-7), Reviews: (1 of 2)

An international cast of scholars, policy makers, and activists are included here to address the findings of the Middle Eastern Dubai meeting of the World Conference on International Telecommunications (WCIT). A subsequent meeting took place in Sw...


“Wat for ever”: student-oriented computing at the University of Waterloo
Campbell S.  IEEE Annals of the History of Computing 35(1): 11-22, 2013. Type: Article

Computing, in addition to requiring technical expertise, is also a product of human interaction and culture. In the case of Watfor, a fast student-oriented Fortran compiler for the University of Waterloo’s IBM 7040, the “unique-within-...


A brief history of cryptology and cryptographic algorithms
Dooley J.,  Springer Publishing Company, Incorporated, New York, NY, 2013. 118 pp. Type: Book (978-3-319016-27-6)

Despite its brevity, this 96-page book provides a detailed survey of cryptology from Julius Caesar’s time to 2001. Most readers will find the cryptographic algorithms included at specific points to be of greatest interest. In short, the work...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy