2,913 research outputs found

    Autonomous Systems as Legal Agents: Directly by the Recognition of Personhood or Indirectly by the Alchemy of Algorithmic Entities

    Get PDF
    The clinical manifestations of platelet dense (δ) granule defects are easy bruising, as well as epistaxis and bleeding after delivery, tooth extractions and surgical procedures. The observed symptoms may be explained either by a decreased number of granules or by a defect in the uptake/release of granule contents. We have developed a method to study platelet dense granule storage and release. The uptake of the fluorescent marker, mepacrine, into the platelet dense granule was measured using flow cytometry. The platelet population was identified by the size and binding of a phycoerythrin-conjugated antibody against GPIb. Cells within the discrimination frame were analysed for green (mepacrine) fluorescence. Both resting platelets and platelets previously stimulated with collagen and the thrombin receptor agonist peptide SFLLRN was analysed for mepacrine uptake. By subtracting the value for mepacrine uptake after stimulation from the value for uptake without stimulation for each individual, the platelet dense granule release capacity could be estimated. Whole blood samples from 22 healthy individuals were analysed. Mepacrine incubation without previous stimulation gave mean fluorescence intensity (MFI) values of 83±6 (mean ± 1 SD, range 69–91). The difference in MFI between resting and stimulated platelets was 28±7 (range 17–40). Six members of a family, of whom one had a known δ-storage pool disease, were analysed. The two members (mother and son) who had prolonged bleeding times also had MFI values disparate from the normal population in this analysis. The values of one daughter with mild bleeding problems but a normal bleeding time were in the lower part of the reference interval

    A Theory of Tailorable Technology Design

    Get PDF
    Tailorable technologies are a class of information systems designed with the intention that users modify and redesign the technology in the context of use. Tailorable technologies support user goals, intentions, metaphor, and use patterns in the selection and integration of technology functions in the creation of new and unique information systems. We propose a theory of tailorable technology design and identify principles necessary for the initial design. Following a Kantian style of inquiry, we identified four definitional characteristics of tailorable technology: a dual design perspective, user engagement, recognizable environments, and component architectures. From these characteristics, we propose nine design principles that will support the phenomenon of tailoring. Through a year-long case study, we refined and evidenced the principles, finding found that designers of tailorable technologies build environments in which users can both interact and engage with the technology, supporting the proposed design principles. The findings highlight a distinction between a reflective environment, where users recognize and imagine uses for the technology, and an active environment in which users tailor the technology in accordance with the imagined uses. This research contributes to the clarification of the role of theory in design science, expands the concept of possibilities for action to IS design, and proposes a design theory of a class of information systems for testing and refinement

    Can Computers Motivate? The Association Between End User Computing Levels, Job Motivation, And Job Core Characteristics: A Field Study

    Get PDF
    While end user computing (EUC) has been studied from the standpoint of classification and management, less attention has been placed on how the utilization of the technology impacts on users jobs.  This study proposes that differing levels of EUC activity will be associated with differing levels of job characteristics and computer related job outcomes.  The study focused on the jobs of 121 middle managers and professional workers enrolled in an MBA program at a southeastern university.  The study finds that with successive levels of complexity in EUC utilization, there are corresponding increases in the levels of users' experiencing of job core characteristics

    This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology

    Get PDF
    The explosion in the use of software in important sociotechnical systems has renewed focus on the study of the way technical constructs reflect policies, norms, and human values. This effort requires the engagement of scholars and practitioners from many disciplines. And yet, these disciplines often conceptualize the operative values very differently while referring to them using the same vocabulary. The resulting conflation of ideas confuses discussions about values in technology at disciplinary boundaries. In the service of improving this situation, this paper examines the value of shared vocabularies, analytics, and other tools that facilitate conversations about values in light of these disciplinary specific conceptualizations, the role such tools play in furthering research and practice, outlines different conceptions of ``fairness''deployed in discussions about computer systems, and provides an analytic tool for interdisciplinary discussions and collaborations around the concept of fairness. We use a case study of risk assessments in criminal justice applications to both motivate our effort--describing how conflation of different concepts under the banner of ``fairness'' led to unproductive confusion--and illustrate the value of the fairness analytic by demonstrating how the rigorous analysis it enables can assist in identifying key areas of theoretical, political, and practical misunderstanding or disagreement, and where desired support alignment or collaboration in the absence of consensus

    Digital Vigilantism as Weaponisation of Visibility

    Get PDF
    This paper considers an emerging practice whereby citizen’s use of ubiquitous and domesticated technologies enable a parallel form of criminal justice. Here, weaponised visibility supersedes police intervention as an appropriate response. Digital vigilantism is a user-led violation of privacy that not only transcends online/offline distinctions but also complicates relations of visibility and control between police and the public. This paper develops a theoretically nuanced and empirically grounded understanding of digital vigilantism in order to advance a research agenda in this area of study. In addition to literature on vigilantism and citizen-led violence, this paper draws from key works in surveillance (Haggerty and Ericsson, British Journal of Sociology, 51, 605–622, 2000) as well as visibility studies (Brighenti 2007; Goldsmith, British Journal of Criminology, 50(5), 914–934, 2010) in order to situate how digital media affordances and cultures inform both the moral and organisational dimensions of digital vigilantism. Digital vigilantism is a process where citizens are collectively offended by other citizen activity, and coordinate retaliation on mobile devices and social platforms. The offending acts range from mild breaches of social protocol to terrorist acts and participation in riots. The vigilantism includes, but is not limited to a ‘naming and shaming’ type of visibility, where the target’s home address, work details and other highly sensitive details are published on a public site (‘doxing’), followed by online as well as embodied harassment. The visibility produced through digital vigilantism is unwanted (the target is typically not soliciting publicity), intense (content like text, photos and videos can circulate to millions of users within a few days) and enduring (the vigilantism campaign may be top search item linked to the target, and even become a cultural reference). Such campaigns also further a merging of digital and physical spaces through the reproduction of localised and nationalist identities (through ‘us/them’ distinctions) on global digital platforms as an impetus for privacy violations and breaches of fundamental rights

    Evaluating Digital Libraries: A Longitudinal and Multifaceted View

    Get PDF
    published or submitted for publicatio
    • …
    corecore