43,704 research outputs found

    Exploring mischief and mayhem in social computing or: how we learned to stop worrying and love the trolls

    Get PDF
    In this paper, we explore the role of mischief as borderline socially acceptable behaviour within social computing applications. Mischievous activity pushes the boundaries of the implicit social contract present in all online social systems, and, we argue, is of vital importance understanding online social interactions. Using examples from games and other applications, we explore mischief as an act of appropriation, which reinterprets mechanics defined by developers in unexpected and sometimes upsetting ways. Although frequently interpreted as negative and anti-social behaviour, we argue that mischief serves a vital social role, and find surprising richness in the chaos

    Periodical Price Survey 2000: Pushing Toward More Affordable Acccess

    Get PDF

    The Collective Consciousness of Information Technology Research: Ways of seeing Information Technology Research: Its Objects and Territories

    Get PDF
    The collective consciousness of effective groups of researchers is characterised by shared understandings of their research object or territory. In the relatively new field of information technology research, rapid expansion and fragmentation of the territory has led to different perceptions about what constitutes information technology research. This project explores a facet of the collective consciousness of disparate groups of researchers and lays a foundation for constructing shared research objects. Making IT researchers’ ways of seeing explicit may help us understand some of the complexities associated with inter and intra disciplinary collaboration amongst research groups, and the complexities associated with technology transfer to industry. This report analyses IT research, its objects and territories, as they are constituted by IT researchers associated with the sub-disciplines of information systems, computer science and information security. A phenomenographic approach is used to elicit data from a diverse range of IT researchers in semistructured interviews. This data is analysed to show (1) the variation in meaning associated with the idea of IT research and (2) the awareness structures through which participants experience variation in ways of seeing the object and territories of IT research. An Outcome Space represents the interrelation between different ways of seeing the territory. Eight ways of seeing IT research, its objects and territories, were found: The Technology Conception, The Information Conception, The Information and Technology Conception, The Communication Conception, The Ubiquitous Conception, The Sanctioned Conception, The Dialectic Conception and The Constructed Conception. These are described in detail and illustrated with participants’ quotes. Finally, some recommendations for further research are made

    Hydrodynamic Processes in Massive Stars

    Full text link
    The hydrodynamic processes operating within stellar interiors are far richer than represented by the best stellar evolution model available. Although it is now widely understood, through astrophysical simulation and relevant terrestrial experiment, that many of the basic assumptions which underlie our treatments of stellar evolution are flawed, we lack a suitable, comprehensive replacement. This is due to a deficiency in our fundamental understanding of the transport and mixing properties of a turbulent, reactive, magnetized plasma; a deficiency in knowledge which stems from the richness and variety of solutions which characterize the inherently non-linear set of governing equations. The exponential increase in availability of computing resources, however, is ushering in a new era of understanding complex hydrodynamic flows; and although this field is still in its formative stages, the sophistication already achieved is leading to a dramatic paradigm shift in how we model astrophysical fluid dynamics. We highlight here some recent results from a series of multi-dimensional stellar interior calculations which are part of a program designed to improve our one-dimensional treatment of massive star evolution and stellar evolution in general.Comment: 10 pages, 4 figures, IAUS 252 Conference Proceeding (Sanya) - "The Art of Modeling Stars in the 21st Century

    Poetical potentials: the value of poems in social impact education

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.For the technologist it is easy to remain in safe technological enclaves with a bespoke language, a community of like minds and a familiar knowledge base. However, progress requires pushing the boundaries, thinking beyond the traditional and the ordinary, and questioning accepted norms. It requires opening of minds. It may surprise the reader that poetry can offer the key to unlock the closed mind. This potential is explored through a variety of poems dealing, in a novel manner, with the social impact of technology

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control
    • 

    corecore