7,636 research outputs found
Recommended from our members
Reading "all about" computerization: five common genres of social analysis
This paper examines unstated, but critical, social assumptions which underlie analyses of computerization. It focuses on the popular, professional and scholarly literature which claims to describe the actual nature of computerization, the character of computer use, and the social choices and changes that result from computerization. This literature can be usefully segmented five ideal type genres: utopian, anti-utopian, social realism, social theory, and analytical reduction. Each genre is characterized and illustrated. The strengths and weaknesses of each genre are described. In the 1990s, there will be a large market for social analyses of computerization. Utopian analyses are most likely to domĂnate the popular and professional discourse. The empirically oriented accounts of social realism, social theory and analytical reduction, are likely to be much less common and also less commonly seen and read by computer professionals and policymakers. These genres are relatively subtle, portray a more ambiguous world, and have less rhetorical power to capture the imagination of readers. Even though they are more scientific, these empirically anchored genres don't seem to appeal to many scientists and engineers. It is ironic that computing -- often portrayed as an instrument of knowledge -- is primarily the subject of discourses whose knowledge claims are most suspect. Conversely, the discourses whose claims as valid knowledge are strongest seems to have much less appeal in the mass media and technological communities
Development of security in wireless sensor network using IPv6
The Wireless Sensor Networks (WSNs) is one of core technologies expected
to become a potential basis of future ever-present networks. WSN consists of
multiple low cost sensor nodes, which could either, have a fixed location or
randomly deployed that can communicate with each other for monitoring
environments, medical systems, home network, industry automation and so on.
However, most of the application scenarios require connectivity between WSNs and
the Internet. Though WSN is typically not IP-enabled, connection to the IP network
makes it easy to monitor sensors everywhere in the world. One of the purposes of
the research work is to incorporate the IPv6 with WSNs, where IPv6 offers a larger
address space. Therefore each of the sensor nodes will have their own IP address
compare to IPv4, which has limited address space.The main objective of this
research is to implement security in WSNs. Sensor networks are typically
characterized by limited power supplies, low bandwidth, small memory sizes and
limited energy. In addition, unlike traditional networks, sensor nodes are often
deployed in accessible areas, presenting the added risk of physical attack. This leads
to a very demanding environment in providing security. The research proposed XOR
encryption algorithm that possesses built-in and enhanced security measure. The
encryption and decryption of the payload secure the data's of the packet transfer.
Other than that the XOR encryption is meant to realize the real time routing where
the packets will be delivered within their end-to-end deadlines.XOR encryption
security has been implemented in the 61owpan/IPv6 stack for TinyOS 2.1. TinyOS
2.1 an embedded operating system commonly used in wireless sensor networks. The
hardware platforms used in this project, the TelosB motes, the 802.15.4 wireless communication standard and the TinyOS 2.1 operating syste
Recommended from our members
More information, better jobs? : occupational stratification and labor market segmentation in the United States' information labor force
This article examines the mix of good and bad jobs in the restructuring of United States' labor markets for information work between 1900 and 1980. ls the information sector still growing relative to other occupational sectors? What is the relative proportion of good to bad jobs in the information sector today? ls the mix of good bad jobs within the information sector changing over time? To answer these questions, we examine changes in the relative size of the information sector's labor markers and changes in five occupational strata within it - professional, semiprofessional, supervisory and upper-level sales personnel, clerks, and blue-collar workers.The information occupations mushroomed in size from 17% of the United States workforce in 1900 to over 50% in 1980. Information sector jobs vary widely in quality. Few information sector jobs are fully professional, and clerical jobs form the largest single occupational stratum. When we examined the growth of the various strata between 1900 and 1980, we found that clerical jobs became more dominant, not less dominant. But this distribution has been masked by the steady growth of information sector jobs in the highly professional and semiprofessional strata, as well as clerical jobs. The occupational stratum between clerks and semiprofessionals - the supervisory and upper-level sales workers - has steadily declined in relative size.Two lower strata - clerks and sales and supervisory workers - account for 55% of the jobs in the information sector. Our data suggest that information labor markets are divided into relatively impermeable segments. As the information sector expanded, it took on many characteristics of the overall economy. It includes a mix of jobs that are diverse in their pay, status, and power. Its internal divisions reflect patterns of segmentation that have developed elsewhere in the society - a dual labor market. Overall, the information sector has become sufficiently large that it is not an alternative to the dominant social order - it simply reproduces many of its features
In Digital We Trust: The computerisation of retail finance in Western Europe and North America
This paper tells of the contents of a forthcoming volume, which offers a new and original approach to the study of technological change in retail finance. Most business history studies of businesses for the last 50 years note the emergence of computers and computer applications, but they do not analyze their role in shaping business practices and organizations. In this book we look directly at the processes of mechanisation and computerisation of retail financial services, throughout the 20th Century while articulating an international comparison. We bring together young, well established and independent historians, who come from different traditions (that is, economic, business, accounting, geography and political histories as well as historians of technology). Contributors look at stand alone and comparative case studies from different parts of the world (namely Britain, Denmark, France, Germany, Netherlands, Spain, Sweden, Mexico and the USA). The outcome is a rich survey of the broad literature examining different aspects of the technological and business histories of retail financial markets from a variety of perspectives.Retail finance, automation, Western Europe (Germany, UK, Spain, Netherlands, Sweden), North America (USA, Mexico)
PRIMA â Privacy research through the perspective of a multidisciplinary mash up
Based on a summary description of privacy protection research within three fields of inquiry, viz. social sciences, legal science, and computer and systems sciences, we discuss multidisciplinary approaches with regard to the difficulties and the risks that they entail as well as their possible advantages. The latter include the identification of relevant perspectives of privacy, increased expressiveness in the formulation of research goals, opportunities for improved research methods, and a boost in the utility of invested research efforts
Data, ideology, and the developing critical program of social informatics
The rapidly shifting ideological terrain of computing has a profound impact on Social Informatics's critical and empirical analysis of computerization movements. As these movements incorporate many of the past critiques concerning social fit and situational context leveled against them by Social Informatics research, more subtle and more deeply ingrained modes of ideological practice have risen to support movements of computerization. Among these, the current emphasis on the promises of data and data analytics presents the most obvious ideological challenge. In order to reorient Social Informatics in relation to these new ideological challenges, Louis Althusser's theory of ideology is discussed, with its implications for Social Informatics considered. Among these implications, a changed relationship between Social Informatics's critical stance and its reliance on empirical methods is advanced. Addressed at a fundamental level, the practice of Social Informatics comes to be reoriented in a more distinctly reflective and ethical direction
Mitigating risk in computerized bureaucracy
This paper presents an important aspect of the pragmatic dimensions of mitigating the risks that stem from computerized bureaucracy, and thereby, preserving the organizational integrity of a firm. A case study is used to provide valuable insights into the mechanics of such mitigation. The case refers to the problematic implementation and use of a computerized reservation system in a large budget hotel in London, United Kingdom. Following the empirical findings, Ciborraâs notions of bricolage, improvisation and tinkering are examined as practical and useful ways of addressing the downsides of computerized bureaucracy
Public Libraries: techno trends and collective memory
By public library I mean here a library providing some kind of universal access to its assets, one whose readership isnât exclusively tied and restricted to a particular organization â including the generally called public libraries, but also many specialized libraries, such as the academic of the open kind. Despite all efforts, public libraries continue to face strong barriers to their participation in the information society. Participants of the World Meeting on the Future of the ISIS Software recognized that âthe ISIS Software Family has a unique technological concept and developmental mission to cope with Information Storage and Retrieval Systems (ISRS), particularly for developing countries where the technology is widely known and used; that the ISIS Software Family has now fully embraced the Free and Open Source Software approach and the support of UNICODE structures to be fully open and multilingualâ (Rio Declaration 2008), restating thus the persistent relevance of this software family.
OSS (Coar 2006) is defined as software whose source code is freely available, therefore allowing for free inspection and/or utilization, i.e., it is available for study and use by everyone without any payment or any other barrier to access. the lack of technical skill in libraries, a situation that libraries share with much of the public and cultural sectors. The study of OSS ILS, and of the their adaptation to the needs of specific public libraries may be the solution to this. Library Management Systems) that enhances digital archive interoperability between a diverse range of libraries
- âŠ