24,337 research outputs found

    Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure

    Full text link
    Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data? What is the relationship between big data and knowledge? Can we find a mapping from big data into knowledge space? What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management? What is the relationship between big data and science paradigm? What is the nature and fundamental challenge of big data computing? A multi-dimensional perspective is presented toward a methodology of big data computing.Comment: 59 page

    Social Software, Groups, and Governance

    Get PDF
    Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. Such a framework may be organized along three dimensions by which groups arise and sustain themselves: regulating places, things, and stories

    Digital Image Access & Retrieval

    Get PDF
    The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio

    Final report of work-with-IT: the JISC study into evolution of working practices

    Get PDF
    Technology is increasingly being used to underpin business processes across teaching and learning, research, knowledge exchange and business support activities in both HE and FE. The introduction of technology has a significant impact on the working practices of staff, often requiring them to work in a radically different way. Change in any situation can be unsettling and problematic and, where not effectively managed, can lead to poor service or functionality and disenfranchised staff. These issues can have a direct impact on institutional effectiveness, reputation and the resulting student experience. The Work-with-IT project, based at the University of Strathclyde, sought to examine changes to working practices across HE and FE, the impact on staff roles and relationships and the new skills sets that are required to meet these changes

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Naujos technologijos kaip galimas katalizatorius demokratizuojant miestų paveldo išsaugojimo praktiką: 3D skenavimo ir dirbtinio intelekto atvejis

    Get PDF
     The conflict between heritage protection and urban infrastructure development rationales creates a context for inclusion, participation and dialogue of different heritage-related communities. However, developed in the pre-computer age of administrative practice, are often incapable, partially or completely, to accommodate the ‘new-era’ community oriented participatory practices. In this article, authors discuss the mutual effects of IT in the process of democratization of urban heritage preservation. The authors create and argue the conceptual model of distributed ledger technologies (DLT) in participatory UHP. The model demonstrates how technologies can become catalysts for democratization in situations when the regulatory and administrative change (on its own) is too inert. The article hypothesizes that novel technological developments which aim at or have the potential for increasing community involvement and democratization of administrative practice, exert their effects directly through technology-based participatory practices.Prieštaravimas tarp paveldosaugos ir miestų infrastruktūros plėtros sukuria ne tik įtampas, bet ir sąlygas įvairių su paveldu susijusių bendruomenių įtraukčiai, dalyvavimui ir dialogui. Tačiau dauguma paveldosaugos administravimo praktikų ir jas taikančių institucijų, atsiradę laikais, kai dar nebuvo kompiuterio, sunkiai prisitaiko prie skaitmeninių technologijų paskatintų pokyčių bei galimybių, orientuotų į bendruomenių dalyvavimą sprendimų priėmime. Šiame straipsnyje autoriai aptaria abipusį IT poveikį miestų paveldo išsaugojimo demokratizavimo procese. Straipsnyje daroma prielaida, kad nauji technologiniai sprendimai, kuriais gali būti didinamas bendruomenės įsitraukimas yra svarbus įrankis demokratizuojant paveldosaugos administracines praktikas. Autoriai sukūrė ir pagrindžia koncepcinį paskirstytų duomenų technologijų modelį ir jo taikymą dalyvaujamajame miestų paveldo išsaugojime. Modelis parodo, kaip technologijos gali tapti demokratizacijos katalizatoriais tais atvejais, kai reguliavimo ir administraciniai pokyčiai (savaime) yra pernelyg inertiški
    corecore