410,643 research outputs found

    Lurching Toward Chernobyl: Dysfunctions of Real-Time Computation

    Get PDF
    Cognitive biological structures, social organizations, and computing machines operating in real time are subject to Rate Distortion Theorem constraints driven by the homology between information source uncertainty and free energy density. This exposes the unitary structure/environment system to a relentless entropic torrent compounded by sudden large deviations causing increased distortion between intent and impact, particularly as demands escalate. The phase transitions characteristic of information phenomena suggest that, rather than graceful decay under increasing load, these structures will undergo punctuated degradation akin to spontaneous symmetry breaking in physical systems. Rate distortion problems, that also affect internal structural dynamics, can become synergistic with limitations equivalent to the inattentional blindness of natural cognitive process. These mechanisms, and their interactions, are unlikely to scale well, so that, depending on architecture, enlarging the structure or its duties may lead to a crossover point at which added resources must be almost entirely devoted to ensuring system stability -- a form of allometric scaling familiar from biological examples. This suggests a critical need to tune architecture to problem type and system demand. A real-time computational structure and its environment are a unitary phenomenon, and environments are usually idiosyncratic. Thus the resulting path dependence in the development of pathology could often require an individualized approach to remediation more akin to an arduous psychiatric intervention than to the traditional engineering or medical quick fix. Failure to recognize the depth of these problems seems likely to produce a relentless chain of the Chernobyl-like failures that are necessary, bot often insufficient, for remediation under our system

    Implementation Failure and System Developer Values: Assumptions, 7[tuisms and Empirical Evidence

    Get PDF
    In the information systems literature the incidence of implementation failures has increasingly been attributed to excessive attention to technical and economic issues, and an absence of concern about the social, political, and psychological (individual) aspects of the system being developed. On an intuitive level this has been explained by assuming a techno-economic value orientation of the system developer This paper presents empirical evidence in support of the assumption of the dominance of technical and economic values in system developers. The basis of this evidence is a field study of developer values. These values were measured by adapting a value measurement methodology developed by England (1967). This methodology determines the behavioral relevance of values by classifying them from operative (most likely to govern behavior) to non-relevant (values having no impact on behavior). The study results show that technical and economic values are the most operative of system developer values. In the social, political, psychological domain, systemic values, and the values relating to the organization and functioning of the development project were found to be operative. However, the study found that the developers considered user job satisfaction related values mostly non-relevant

    Social impact of information technology : implications for a tertiary institute

    Get PDF
    Tertiary educational institutes have had many Information Systems developed and implemented for the use of students and lecturers. The problem is that more often than not, the impacts of Information Systems on social communities of organisations have not been taken into account, or insufficient attention has been paid to them. The social impact of Information Systems are rarely taken into account when systems are being designed or implemented, and as a result lead to many Information System failures. This research explores the issues of the interface between information systems and society, and addresses the social impact of these systems. A thorough investigation of the Information Systems and users of those systems at the University of South Africa has been undertaken in this study Details regarding certain social impact of Information Systems will be discussed. This research proposes a set of guidelines to help ensure that the social impacts of tertiary institutes’ Information Systems are taken into account in the design and implementation of these systems, thereby increasing the chance of success of those systems. Those who stand to benefit from information contained in this study include various tertiary institutes’ faculties of Information Systems and Technology, the departments responsible for the development of those Information Systems, users of those systems, and the social community encompassing those systems.Graduate School of Business LeadershipM.B.L

    Passenger-Centric Metrics for Air Transportation Leveraging Mobile Phone and Twitter Data

    Get PDF
    International audienceThis paper aims at presenting a detailed analysis of domestic air passengers behavior during a major air-traffic disturbance, from two complementary passenger-centric perspective: a passenger mobility perspective and a passenger social media perspective. By leveraging over 5 billion records of mobile phone location data per day from a major carrier in the United States, passenger mobility can be reliably analyzed, no matter which airline the passengers fly on or which airport they fly to and from. Such information is currently unavailable to the major aviation stakeholders at such scale and can be used to establish performance benchmarks from a passenger's perspective. Combining it with a Twitter analysis provides a more detailed and passenger-focused analysis than the traditional flight-centric measurements used to evaluate the overall system performance. More generally, these two passenger-centric analysis could be implemented in real-time for a daily evaluation of the Air Transportation System, enabling a faster analysis of the impact of major disruptions, whether due to meteorological conditions or system failures

    The swine flu pandemics in Portugal through newspaper humour

    Get PDF
    Using semiotic and discourse analysis methodologies to uncover denotative and connotative meanings in journalism production, following Roland Barthes’s work, our research analyzed newspaper humour published in one Portuguese newspaper about the global build-up of the swine flu (H1N1) scare of 2009-2010. Results demonstrate that humour was much quicker than traditional journalistic templates to assign responsibilities and depict failures in the crisis management system, precociously suggesting that the pandemic could be just another moral panic similar to the bird flu of 2005. Through humour, newspapers stressed the cyclic nature of health risks, reducing the impact of dramatic information on the audience. It is therefore suggested that the sociological analysis of a media outlet in the context of a complex and emotional case such as the 2009-2010 pandemic implies its deconstruction layer by layer in order to obtain a clear picture of the mechanisms of social construction of reality.info:eu-repo/semantics/publishedVersio

    Portrayals of Child Abuse Scandals in the Media in Australia and England: Impacts on Practice, Policy, and Systems

    Get PDF
    This article describes how the media have played a key role in placing the issue of child maltreatment and the problems associated with child protection high on public and political agendas over the last 50 years. It also describes how the influence of the media is far from unambiguous. Although the media has been crucial in bringing the problems into the open, it often does so in particular ways. In being so concerned with scandals and tragedies ∗ Correspondence concerning this article should be addressed to Bob Lonne, School of Public Health and Social Work, Queensland University of Technology, Victoria Park Road, Kelvin Grove, Queensland 4059, Australia. Electronic mail may be sent to [email protected]. in a variety of institutionalized and community settings, the media have portrayed the nature of child maltreatment in ways which deflect attention from many of its core characteristics and causes. A focus on the media is important because of the power the media have to help transform the private into the public, but at the same time, to undermine trust, reputation, and legitimacy of the professionals working in the field. This concern is key for those working in the child protection field and has been a source of tension in public policy in both Australia and England for many years

    Design and initial validation of the Raster method for telecom service availability risk assessment

    Get PDF
    Crisis organisations depend on telecommunication services; unavailability of these services reduces the effectiveness of crisis response. Crisis organisations should therefore be aware of availability risks, and need a suitable risk assessment method. Such a method needs to be aware of the exceptional circumstances in which crisis organisations operate, and of the commercial structure of modern telecom services. We found that existing risk assessment methods are unsuitable for this problem domain. Hence, crisis organisations do not perform any risk assessment, trust their supplier, or rely on service level agreements, which are not meaningful during crisis situations. We have therefore developed a new risk assessment method, which we call RASTER. We have tested RASTER using a case study at the crisis organisation of a government agency, and improved the method based on the analysis of case results. Our initial validation suggests that the method can yield practical results

    Validating the Right to Counsel

    Get PDF
    This Essay, written as part of a Symposium celebrating the 50th Anniversary of Gideon v. Wainwright, focuses on the elaboration of the Gideon right in the context of ineffective assistance of counsel litigation. First, I describe how ineffective assistance of counsel claims came to dominate and define federal habeas corpus litigation, changing the structure of state post-conviction rules in reaction to the new prominence of ineffective assistance of counsel claims at the federal level, expanding to consider assistance of counsel during plea bargaining, and raising complex questions for post-conviction courts. Despite the ubiquity of ineffective assistance of counsel claims, the constitutional test is shot through with a prejudice analysis, as well as with a set of strong substantive blinders: judgments that only certain types of failures by counsel will be regulated. Second, I ask whether the approach towards judging effectiveness of defense counsel could be “validated” by social science evidence, or at least be better informed by it. The bar has increasingly engaged with science and social science to provide improved standards for effective defense representation. In turn, social scientists might more closely study the effectiveness of defense lawyering across stages of the criminal process. Over time, this work may help to validate the right to counsel

    Framework and evaluation schedule for the inspection of services for the Children and Family Court Advisory and Support Service (Cafcass)

    Get PDF

    Beyond Title VII: Rethinking Race, Ex-Offender Status, and Employment Discrimination in the Information Age

    Get PDF
    More than sixty-five million people in the United States—more than one in four adults—have had some involvement with the criminal justice system that will appear on a criminal history report. A rapidly expanding, for-profit industry has developed to collect these records and compile them into electronic databases, offering employers an inexpensive and readily accessible means of screening prospective employees. Nine out of ten employers now inquire into the criminal history of job candidates, systematically denying individuals with a criminal record any opportunity to gain work experience or build their job qualifications. This is so despite the fact that many individuals with criminal records have never been convicted of a crime, as one-third of felony arrests never result in conviction. And criminal records databases routinely contain significant errors, including false positive identifications and sealed or expunged information. The negative impact of employers’ reliance on criminal records databases falls most heavily on Black and Latino populations, as studies show that the stigma of having a criminal record is significantly more damaging for racial minorities than for Whites. This criminal record “penalty” limits profoundly the chance of achieving gainful employment, creating new and vexing problems for regulators, employers, and minorities with criminal records. Our existing regulatory apparatus, which is grounded in Title VII of the Civil Rights Act of 1964 and the Fair Credit Reporting Act, is ill-equipped to resolve this emerging dilemma because it fails to address systematic information failures and the problem of stigma. This Article, therefore, proposes a new framework drawn from core aspects of anti-discrimination laws that govern health law, notably the Americans with Disabilities Act, and the Genetic Information Nondiscrimination Act. These laws were designed to regulate the flow of information that may form the basis of an adverse employment decision, seeking to prevent discrimination preemptively. More fundamentally, they conceptualize discrimination through the lens of social stigma, which is critical to understanding and prophylactically curbing the particular discrimination that results from dual criminal record and minority status. This health law framework attends to the interests of minorities with criminal records, allows for more robust enforcement of existing laws, and enables employers to make appropriate and equitable hiring decisions, without engaging in invidious discrimination or contributing to the establishment of a new, and potentially enduring, underclass
    corecore