IT University of Copenhagen

The IT University of Copenhagen's Repository
Not a member yet
    5848 research outputs found

    Trusting elections:complexities and risks of digital voting in Denmark

    No full text
    It is often said that election processes depend on trust for their legitimacy. Trust is therefore crucial to the sustainability of democracy. It also seems clear that patterns and forms of trust in Western democracies are changing in tandem with digitalization. This paper explores some possible inflections of the concept of trust in the ‘age of digitalization’ by examining its articulation by computer scientists doing research on digital voting and by contrasting these articulations with a Science and Technology Studies (STS) analysis of trust in the Danish voting process. The motivation for characterizing and discussing these views of trust, is that it matters deeply how trust is conceptualized in relation to voting, democracy and beyond, and that today computer science as an engineering, scientific and intellectual field increasingly affects how we perceive of trust – indeed, how we organize social life and come to think about the world we live in. If Digitalization appears to be implicated in the current transformation of trust, then the questions of how trust is defined, by whom, and with what implications are open and acute matters in need of more general awareness and careful attention

    The complementary and substitutional effects of forced and emergent mechanisms in multisourcing

    No full text
    This paper examines the effect of forced and emergent competition- and cooperation-enhancing mechanisms on joint multisourcing performance. We draw on research on coopetition in IS multisourcing and the literature on the crowding-out effect to theorise the interplay between these mechanisms. We argue that the key to understanding whether these mechanisms complement or substitute each other lies in the distinction between forced and emergent mechanisms, as these respectively invoke either an economic or a social logic among vendors. We test these ideas through a survey study of 108 multisourcing arrangements. Our results show that while a forced competition and an emergent cooperation mechanism can individually improve joint performance in multisourcing, the co-existence of economic and social logics results in a substitutional effect. A complementary effect is achieved when competition and cooperation mechanisms are of the same logic. Our study extends the existing IS outsourcing literature by shedding light on the role of forced and emergent mechanisms, either as competition or cooperation-enhancing, in enhancing multisourcing performance

    Biometric Data Doubles and the Technicisation of Personhood in Ghana

    No full text
    Biometric identification technologies have been heralded by development practitioners, state bureaucrats, the biometric industry, and technology enthusiasts alike as a means to increase accountability and transparency, while reducing discretion in bureaucratic encounters. However, the proliferation of biometric technologies in Ghana since the early 2010s, has increasingly rendered the exchange of credentials for the purpose of establishing unique identities invisible, retreating thus into the background of person-to-person, person-to-business, and state-citizen interactions. Drawing on the case of Ghana, the chapter presents contemporary innovations in identity registration and the ways in which these have altered the production of personhood. Explicit attention will be paid to the processes “making up” personhood in relation to datafied selves and the technologies co-producing them. It will be argued that the immersion of identification technologies into the lifeworld, as a moment of technicisation, is necessarily incomplete. This is because data frictions bring into focus the moment of classification, including the haunting of hegemonic categories. These frictions produce an oscillation between immersion and detachment from the lifeworld, which can provide a potential starting point for the critique of postcolonial data politics in Ghana

    A registered replication study on body-ownership, perceptions, and attitudes [Stage 1 Registered Report Protocol]

    No full text
    In a seminal paper, Banakou et al. (2013) showed that illusory ownership of a child’s body experienced through virtual reality (VR) changes perceptions and attitudes. The illusion of having the body of a 4-year-old child led participants to overestimate object sizes and react faster when associating the self with child-like attributes in an Implicit Association Test. The paper has become a model for conducting experimental embodiment research, and has impacted the study of how bodies shape minds considerably. Despite its massive impact, the study is underpowered, does not control for demand characteristics, and uses unvalidated subjective scales. The evidence of behavioral effects caused by the embodiment is therefore uncertain. To address this, we will perform a large-scale partial replication, updated to refined methodological practices with regard to objective and subjective measures, controlling for demand characteristics, and increasing the statistical power to 95%

    Curious interdisciplinarity

    No full text

    The role of psychological safety in promoting software quality in agile teams

    No full text
    Psychological safety continues to pique the interest of scholars in a variety of disciplines of study. Recent research indicates that psychological safety fosters knowledge sharing and norm clarity and complements agile values. Although software quality remains a concern in the software industry, academics have yet to investigate whether and how psychologically safe teams provide superior results. In this study, we explore how psychological safety influences agile teams’ quality-related behaviors aimed at enhancing software quality. To widen the empirical coverage and evaluate the results, we chose a two-phase mixed-methods research design with an exploratory qualitative phase (20 interviews) followed by a quantitative phase (survey study, N = 423). Our findings show that, when psychological safety is established in agile software teams, it induces enablers of a social nature that advance the teams’ ability to pursue software quality. For example, admitting mistakes and taking initiatives equally help teams learn and invest their learning in their future decisions related to software quality. Past mistakes become points of reference for avoiding them in the future. Individuals become more willing to take initiatives aimed at enhancing quality practices and mitigating software quality issues. We contribute to our endeavor to understand the circumstances that promote software quality. Psychological safety requires organizations, their management, agile teams, and individuals to maintain and propagate safety principles. Our results also suggest that technological tools and procedures can be utilized alongside social strategies to promote software quality

    Knowledge Overlap and Iterative Development in ML Projects: An Information Processing View

    Get PDF
    Machine Learning (ML) projects encounter significant uncertainty due to the search for potential use cases and the opacity of ML models, which may challenge project efficiency and model effectiveness. Taking an Information Processing (IP) View, we examine how projects can counter these sources of uncertainty with appropriate sources of IP capacity, including iterative development and knowledge overlap between data scientists and domain experts. Survey data from 141 ML project teams shows that iterative development and knowledge overlap in the form of domain experts’ data science knowledge can significantly enhance ML project efficiency. Our interaction analysis shows that iterative development and domain experts’ data science knowledge helps address uncertainty in the business sphere (i.e., requirements uncertainty), while data scientists’ domain knowledge helps address uncertainty in the technical sphere (i.e., inscrutability). We conclude by providing implications for the IS ML literature and practice

    Digital sourcing: A discussion of agential, semiotic, infrastructural, combinatorial, and economic shifts

    No full text
    For over four decades, a rich body of information systems (IS) sourcing research has examined topics concerning sourcing decisions, governing relationships and performance in various contexts (e.g., outsourcing, multisourcing and offshoring). The last few years have witnessed a significant change in some of the key assumptions in this literature. Organizations and their sourcing practices have been undergoing significant shifts in the digital era, involving not only human but also technology agency (e.g., artificial intelligence), malleable digital assets that can be flexibly recombined (e.g., in platform ecosystems and low-code development), and digital technology that attenuates bounded rationality (e.g., generative artificial intelligence). Such fundamental changes call for the re-examination of such past assumptions in the IS sourcing literature. In this editorial, e discuss the implications of these agential, semiotic, infrastructural, combinatorial, and economic shifts for digital sourcing, that is, research and practice of IS sourcing in the digital era

    Is loot box presence in video games being correctly and consistently labelled? Comparing all age rating decisions made by the German USK, the American ESRB, and the European PEGI in 2023

    No full text
    Loot boxes in video games that provide random rewards in exchange for real-world money have been identified as gambling-like and potentially harmful. Many stakeholders are concerned. One regulatory approach is to label games with loot boxes with a presence warning. This has been adopted by the age rating organizations of Germany (the USK), North America (the ESRB), and Europe (PEGI). Previous research, by cross-checking the historical age rating decisions made by the ESRB and PEGI between April 2020 and September 2022, has identified mistakes where one or both organizations failed to label certain games with loot boxes as containing them. The USK only started identifying loot box presence from 2023 and so could not previously be studied. All age rating decisions concerning games with loot boxes made in 2023 by the USK, the ESRB, and PEGI were compared. This process identified how the USK has seemingly (i) failed to label two games as containing loot boxes and (ii) adopted an unspoken policy of giving games with loot boxes a USK 12 rating (i.e., ‘approved for children aged 12 and above’) at a minimum. Confirmation of the above has been sought from the USK, and an official reply has been promised and is expected imminently. In addition, the ESRB and PEGI have correctly labelled all games with loot boxes that they assessed in 2023 as containing them, thus giving the public more confidence in the reliability of their age rating information and demonstrating an improvement from their performance in previous years

    Carbon: the currency which values everything and prices nothing

    No full text
    "Carbon" in the form of emission permits or credits displays several functions that allow us to compare it to actual currencies. It represents and compares a vast multiplicity of actions, and it both temporalises and territorialises value. Yet what is traded is often criticised for not existing

    2,225

    full texts

    5,848

    metadata records
    Updated in last 30 days.
    The IT University of Copenhagen's Repository is based in Denmark
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇