96,164 research outputs found
Exploring ‘events’ as an information systems research methodology
This paper builds upon existing research and commentary from a variety of disciplinary sources including Information Systems, Organisational and Management Studies, and the Social Sciences that focus upon the meaning, significance and impact of ‘events’ in both an
organisational and a social sense. The aim of this paper is to define how the examination of the event is an appropriate, viable and useful Information Systems methodology. Our argument is that focusing on the ‘event’ enables the researcher to more clearly observe and capture the complexity, multiplicity and mundaneity of everyday lived experience. The use and notion of ‘event’ has the potential to reduce the methodological dilemmas associated
with the micromanagement of the research process – an inherent danger of traditional and ‘virtual' ethnographic approaches. Similarly, this paper addresses the over-emphasis upon managerialist, structured and time-fixated praxis that is currently symptomatic of Information Systems research. All of these concerns are pivotal points of critique found within eventoriented literature. An examination of event-related theory within interpretative disciplines directs the focus of this paper towards the more specific realm of the ‘event scene’. The notion of the ‘event scene’ originated in the action based (and anti-academy) imperatives of the Situationists and emerged in an academic sense as critical situational analysis. Event scenes are a focus for contemporary critical theory where they are utilised as a means of representing theoried
inquiry in order to loosen the restrictions that historical and temporally bound analysis imposes upon most interpretative approaches. The use of event scenes as the framework for critiquing established conceptual assumptions is exemplified by their use in CTheory. In this
journal's version and articulation of the event scene poetry, commentary, multi-vocal narrative and other techniques are legitimated as academic forms. These various forms of multi-dimensional expression are drawn upon to enrich the understandings of the ‘event’, to
extricate its meaning and to provide a sense of the moment from which the point of analysis stems. The objective of this paper is to advocate how Information Systems research can (or should) utilize an event scene oriented methodology
Zapotec Language Activism And Talking Dictionaries
Online dictionaries have become a key tool for some indigenous communities to promote and preserve their languages, often in collaboration with linguists. They can provide a pathway for crossing the digital divide and for establishing a first-ever presence on the internet. Many questions around digital lexicography have been explored, although primarily in relation to large and well-resourced languages. Lexical projects on small and under-resourced languages can provide an opportunity to examine these questions from a different perspective and to raise new questions (Mosel, 2011). In this paper, linguists, technical experts, and Zapotec language activists, who have worked together in Mexico and the United States to create a multimedia platform to showcase and preserve lexical, cultural, and environmental knowledge, share their experience and insight in creating trilingual online Talking Dictionaries in several Zapotec languages. These dictionaries sit opposite from big data mining and illustrate the value of dictionary projects based on small corpora, including having the flexibility to make design decisions to maximize community impact and elevate the status of marginalized languages
To Share or Not to Share in Client-Side Encrypted Clouds
With the advent of cloud computing, a number of cloud providers have arisen
to provide Storage-as-a-Service (SaaS) offerings to both regular consumers and
business organizations. SaaS (different than Software-as-a-Service in this
context) refers to an architectural model in which a cloud provider provides
digital storage on their own infrastructure. Three models exist amongst SaaS
providers for protecting the confidentiality data stored in the cloud: 1) no
encryption (data is stored in plain text), 2) server-side encryption (data is
encrypted once uploaded), and 3) client-side encryption (data is encrypted
prior to upload). This paper seeks to identify weaknesses in the third model,
as it claims to offer 100% user data confidentiality throughout all data
transactions (e.g., upload, download, sharing) through a combination of Network
Traffic Analysis, Source Code Decompilation, and Source Code Disassembly. The
weaknesses we uncovered primarily center around the fact that the cloud
providers we evaluated were each operating in a Certificate Authority capacity
to facilitate data sharing. In this capacity, they assume the role of both
certificate issuer and certificate authorizer as denoted in a Public-Key
Infrastructure (PKI) scheme - which gives them the ability to view user data
contradicting their claims of 100% data confidentiality. We have collated our
analysis and findings in this paper and explore some potential solutions to
address these weaknesses in these sharing methods. The solutions proposed are a
combination of best practices associated with the use of PKI and other
cryptographic primitives generally accepted for protecting the confidentiality
of shared information
Recommended from our members
Collaborative yet independent: Information practices in the physical sciences
In many ways, the physical sciences are at the forefront of using digital tools and methods to work with information and data. However, the fields and disciplines that make up the physical sciences are by no means uniform, and physical scientists find, use, and disseminate information in a variety of ways. This report examines information practices in the physical sciences across seven cases, and demonstrates the richly varied ways in which physical scientists work, collaborate, and share information and data.
This report details seven case studies in the physical sciences. For each case, qualitative interviews and focus groups were used to understand the domain. Quantitative data gathered from a survey of participants highlights different information strategies employed across the cases, and identifies important software used for research.
Finally, conclusions from across the cases are drawn, and recommendations are made. This report is the third in a series commissioned by the Research Information Network (RIN), each looking at information practices in a specific domain (life sciences, humanities, and physical sciences). The aim is to understand how researchers within a range of disciplines find and use information, and in particular how that has changed with the introduction of new technologies
Recommended from our members
Monitoring food marketing to children: A joint Nordic monitoring protocol for marketing of foods and beverages high in fat, salt and sugar (HFSS) towards children and young people
The protocol describes methods for how to monitor marketing of foods and beverages high in fat, salt and sugar towards children and young people at a given time as cross-sectional studies, as well as allowing for monitoring of trends. The data provided could also be used for evaluation purposes, for instance providing relevant data for evaluating regulation practices and schemes in the respective countries; to study advertising and marketing practices, contents and forms over time. In addition to being a tool for monitoring purposes within each country, the protocol will also enable comparisons between the Nordic countries by establishing a joint understanding on how each marketing channel should be monitored. The protocol has been developed as a Nordic project between representatives and experts from Iceland, Finland, Sweden, Denmark and Norway together with international experts
From ”Sapienza” to “Sapienza, State Archives in Rome”. A looping effect bringing back to the original source communication and culture by innovative and low cost 3D surveying, imaging systems and GIS applications
Applicazione di tecnologie mensorie integrate Low Cost,web GIS,applicazione di tecniche di Computational photography per la comunicazione e condivisione dei dati, sistemi di Cloud computing.Archiviazione Grandi DatiHigh Quality survey models, realized by multiple Low Cost methods and technologies, as a container to sharing Cultural and Archival Heritage, this is the aim guiding our research, here described in its primary applications. The SAPIENZA building, a XVI century masterpiece that represented the first unified headquarters of University in Rome, plays since year 1936, when the University moved to its newly edified campus, the role of the main venue for the State Archives. By the collaboration of a group of students of the Architecture Faculty, some integrated survey methods were applied on the monument with success. The beginning was the topographic survey, creating a reference on ground and along the monument for the upcoming applications, a GNNS RTK survey followed georeferencing points on the internal courtyard. Dense stereo matching photogrammetry is nowadays an accepted method for generating 3D survey models, accurate and scalable; it often substitutes 3D laser scanning for its low cost, so that it became our choice. Some 360°shots were planned for creating panoramic views of the double portico from the courtyard, plus additional single shots of some lateral spans and of pillars facing the court, as a single operation with a double finality: to create linked panotours with hotspots to web-linked databases, and 3D textured and georeferenced surface models, allowing to study the harmonic proportions of the classical architectural order. The use of free web Gis platforms, to load the work in Google Earth and the realization of low cost 3D prototypes of some representative parts, has been even performed
Becoming Lean pocket guide
This pocket guide aims to give an overview of what Lean is on a conceptual level, explain how Lean fits into the Higher Education setting, detail how Lean is being applied in the University, and give ideas about how Lean can be implemented in other areas of the University.Publisher PD
Facilitating pupil thinking about information literacy
Whilst information literacy is frequently taught through the imposition on learners of an established framework, this paper suggests a different approach by taking a lead from James Herring’s ideas. Specifically, it provides guidance to school-based information professionals who would like to encourage their pupils to devise their own flexible, information literacy models which are unique to them. Drawing on existing material in information science and wider thought, it proposes areas for coverage and considers how information professionals may support the dynamic process of model construction. It is recommended that those who are intent on facilitating the creation of personal information literacy models help pupils to identify the roles they take on in their lives, to reflect on the information needs that result, to ascertain the information they require in particular situations, to explore their information-seeking activities, to consider means by which information can be captured and to give thought as to how the information they have accessed may be used. This framework is, however, by no means rigid and readers are, of course, free to make their own adjustments
- …