22,928 research outputs found

    Proxy of democracy? : metaphors of connection as arguments against representation

    Get PDF
    This paper aims to assess the arguments that claim representative democracy may be enhanced or replaced by an updated electronic version. Focusing on the dimension of elections and electioneering as the core mechanism of representative democracy I will discuss: (1) the proximity argument used to claim the necessity of filling the gap between decision-makers and stakeholders; (2) the transparency argument, which claims to remove obstacles to the publicity of power; (3) the bottom-up argument, which calls for a new form of legitimacy that goes beyond classical mediation of parties or unions; (4) the public sphere argument, referred to the problem of hierarchical relation between voters and their representatives; (5) the disintermediation argument, used to describe the (supposed) new form of democracy following the massive use of ICTs. The first way of conceptualizing e-democracy as different from mainstream 20th century representative democracy regimes is to imagine it as a new form direct democracy: this conception is often underlying contemporary studies of e-voting. To avoid some of the ingenuousness of this conception of e-democracy, we should take a step back and consider a broader range of issues than mere gerrymandering around the electoral moment. Therefore I shall problematize the abovementioned approach by analyzing a wider range of problems connected to election and electioneering in their relation with ICTs

    SLIS Student Research Journal, Vol. 4, Iss. 1

    Get PDF

    Learning through collaboration: video game wikis

    Get PDF
    The wiki, wherein community-spirited players meticulously document their gaming experiences for the benefit of others, from simple guides to complex theories and strategies, has become the de facto online reference medium for video game players. This study sought to examine how players learn from one another about the systems that underpin their favourite games and how they engaged with social media – wikis, in particular – to facilitate this collaborative learning. It is argued that in collating, synthesizing and disseminating the often complex behaviours observed in a modern video game, the wiki author is displaying academic proficiency in a non-academic field. Drawing on a series of interviews with gaming wiki contributors and users, the practices of those engaged in using gaming wikis are discussed, together with an account of the research methods used. In undertaking such research, a number of challenges and concerns were encountered: these, too, are described

    Meaningful Human Control over Smart Home Systems: A Value Sensitive Design Approach

    Get PDF
    The last decade has witnessed the mass distribution and adoption of smart home systems and devices powered by artificial intelligence systems ranging from household appliances like fridges and toasters to more background systems such as air and water quality controllers. The pervasiveness of these sociotechnical systems makes analyzing their ethical implications necessary during the design phases of these devices to ensure not only sociotechnical resilience, but to design them for human values in mind and thus preserve meaningful human control over them. This paper engages in a conceptual investigations of how meaningful human control over smart home devices can be attained through design. The value sensitive design (VSD) approach is proposed as a way of attaining this level of control. In the proposed framework, values are identified and defined, stakeholder groups are investigated and brought into the design process and the technical constraints of the technologies in question are considered. The paper concludes with some initial examples that illustrate a more adoptable way forward for both ethicists and engineers of smart home devices

    Experimental investigations of #authenticity online

    Get PDF
    The concept of 'authenticity' is highly valued on social media sites (SMSes), despite its ambiguous nature and definition. One interpretation of 'authenticity' by media scholars is a human's congruence with online portrayals of themselves (e.g. posting spontaneous photographs from their lives, or using real biodata online). For marketers and 'influencers', these patterns of behaviour can achieve certain gains: sales for a business, or success of a campaign. For existentialist philosophers, using 'authenticity' as a means to an end is against its very definition. In this paper, I investigate what SMS users are looking for by their supposed 'authentic' portrayal online. My experimental approach draws upon empirical data from the Instagram social media site. Using machine learning techniques, descriptions and features of posts - including subjects, captions, and contexts - will be categorised and aggregated. I will then interpret these findings, drawing upon work by Taylor, Golomb, and Guignon, whose works on authenticity are based on mid-20th century existentalists. I argue that the existentialist ideals on authenticity are not necessarily present in contemporary SMS use. I will also argue that the popular interpretation of authenticity on SMSes can be self-defeating, when it seeks to turn the 'for-itself' into an 'in-itself'

    A Stronger Data Protection Regime for a Better Digital India

    Get PDF
    Introduction India's presence in the cyberspace has been propelled in to digital power narratives in the global cyber diplomacy discourse. To name a few, India's selection to chair the first group of governmental experts constituted to deliberate the issue of Lethal Autonomous Weapons Systems and their impact on International security, and as the first non-OECD country to host the Global Conference on Cyber Space. Until recently, Digital India initiative, followed by governments ‘shove' to promote a digital market on the base of cashless transactions has been necessitating a lot of policy reboot at a purely domestic level. In India, Cyber security is the biggest threat to national security – and something needs to be done to protect our financial, strategic and civilian networks. Similarly, some form of policy needs to be implemented wisely and precisely to manoeuvre the currency of digital age viz. DATA! Statistically, India ranks second in the world in terms of the highest number of internet users which are almost 34 per cent of a total of 1.3 billion population. DOI: 10.5281/zenodo.340601

    Search Engine Users

    Get PDF
    Presents findings from a survey conducted in May and June 2004. Looks at confidence in search ability; satisfaction with results; overall trust of search engines; and demographic differences among searchers

    Data Mining and Privacy: An Initial Attempt at a Comprehensive Code of Conduct for Online Business

    Get PDF
    The prevalence of data mining by businesses and government organizations raises concerns among many individuals about the privacy of their personal data. We address this issue by offering a different perspective that reconciles the conflicting desires of businesses and consumers. We describe privacy, data mining, and their interaction in the larger context, identify the costs and benefits of the uses of data mining, and discuss potential stakeholders found at the intersection of the two subjects. To help synthesize our proposed code of ethical conduct, we examine existing codes of conduct and how they relate to the issue of privacy in the context of data mining with people, processes, and technology. Showing that a uniform code of ethical conduct for online privacy is feasible from both a managerial and ethical perspective, we provide an initial philosophical and principle synthesis that businesses and organizations can tailor for their own specific customers and needs. The developed code of ethical conduct respects consumers’ desire for privacy while allowing businesses to use data mining techniques to elicit information that benefits both the business and the consumer
    • …
    corecore