7,390 research outputs found

    Towards a cyberinfrastructure for enhanced scientific

    Get PDF
    Scientific and technological collaboration is more and more coming to be seen as critically dependent upon effective access to, and sharing of digital research data, and of the information tools that facilitate data being structured for efficient storage, search, retrieval, display and higher level analysis. A February 2003 report to the U.S. NSF Directorate of Computer and Information System Engineering urged that funding be provided for a major enhancement of computer and network technologies, thereby creating a cyberinfrastructure whose facilities would support and transform the conduct of scientific and engineering research. The argument of this paper is that engineering breakthroughs alone will not be enough to achieve such an outcome; success in realizing the cyberinfrastructure’s potential, if it is achieved, will more likely to be the resultant of a nexus of interrelated social, legal and technical transformations. The socio-institutional elements of a new infrastructure supporting collaboration that is to say, its supposedly “softer” parts -- are every bit as complicated as the hardware and computer software, and, indeed, may prove much harder to devise and implement. The roots of this latter class of challenges facing “e- Science” will be seen to lie in the micro- and meso-level incentive structures created by the existing legal and administrative regimes. Although a number of these same conditions and circumstances appear to be equally significant obstacles to commercial provision of Grid services in interorganizational contexts, the domain of publicly supported scientific collaboration is held to be the more hospitable environment in which to experiment with a variety of new approaches to solving these problems. The paper concludes by proposing several “solution modalities,” including some that also could be made applicable for fields of information-intensive collaboration in business and finance that must regularly transcends organizational boundaries.

    Towards a cyberinfrastructure for enhanced scientific

    Get PDF
    A new generation of information and communication infrastructures, including advanced Internet computing and Grid technologies, promises to enable more direct and shared access to more widely distributed computing resources than was previously possible. Scientific and technological collaboration, consequently, is more and more coming to be seen as critically dependent upon effective access to, and sharing of digital research data, and of the information tools that facilitate data being structured for efficient storage, search, retrieval, display and higher level analysis. A recent (February 2003) report to the U.S. NSF Directorate of Computer and Information System Engineering urged that funding be provided for a major enhancement of computer and network technologies, thereby creating a cyberinfrastructure whose facilities would support and transform the conduct of scientific and engineering research. The articulation of this programmatic vision reflects a widely shared expectation that solving the technical engineering problems associated with the advanced hardware and software systems of the cyberinfrastructure will yield revolutionary payoffs by empowering individual researchers and increasing the scale, scope and flexibility of collective research enterprises. The argument of this paper, however, is that engineering breakthroughs alone will not be enough to achieve such an outcome; success in realizing the cyberinfrastructure’s potential, if it is achieved, will more likely to be the resultant of a nexus of interrelated social, legal and technical transformations. The socio-institutional elements of a new infrastructure supporting collaboration – that is to say, its supposedly “softer” parts -- are every bit as complicated as the hardware and computer software, and, indeed, may prove much harder to devise and implement. The roots of this latter class of challenges facing “e-Science” will be seen to lie in the micro- and meso-level incentive structures created by the existing legal and administrative regimes. Although a number of these same conditions and circumstances appear to be equally significant obstacles to commercial provision of Grid services in interorganizational contexts, the domain of publicly supported scientific collaboration is held to be the more hospitable environment in which to experiment with a variety of new approaches to solving these problems. The paper concludes by proposing several “solution modalities,” including some that also could be made applicable for fields of information-intensive collaboration in business and finance that must regularly transcends organizational boundaries.

    Privacy Is Not Dead: Expressively Using Law to Push Back Against Corporate Deregulators and Meaningfully Protect Data Privacy Rights

    Full text link
    When the European Union’s (EU) General Data Protection Regulation (GDPR) passed in 2016, it represented the world’s first major comprehensive data privacy law and kicked off a conversation about how we think about the right to privacy in the modern age. The law granted a broad range of rights to EU citizens, including a right to have companies delete data they collect about you, a right not to have your personal information sold, and a range of other rights all geared towards individual autonomy over personal data. All the while, platform companies like Facebook (Meta), Apple, and Amazon have taken advantage of a phenomenon called spontaneous deregulation to outrun legislation designed to regulate data privacy. Spontaneous deregulators take advantage of the inherent gap between the speed at which technology advances and the comparatively languid pace at which legislatures try to keep up. The deregulators do this through co-opting discourses about privacy and pitching a selfregulatory system in which they are entrusted with personal data that they have an inherent profit motive to capitalize on. In today’s economy, data is eminently valuable—trusting a system of deregulation creates unacceptable conflicts of interest at best and a predatory system of data mining at worst. This Note advocates for robust privacy legislation that takes full advantage of the expressive function of the law—the aspect of lawmaking that shapes and protects valuable social norms— to meaningfully protect individual data privacy rights from corporate deregulators. By placing social values and human rights at the forefront, expressive law makes it more difficult for deregulators to obfuscate the purposes and messaging of privacy

    A Comparison of the Models and Methods of Surveillance in East Germany and Northern Ireland and Their Relevance to Modern-day Securitization of Society

    Get PDF
    Despite increasing awareness of the rise in societal surveillance as a result of leaks by former NSA whistleblower Edward Snowden and subsequent revelations from Wikileaks, the damage of pervasive surveillance practices on the individual and on communities has yet to be measured. As John Gilliom has argued, ‘until we are able to generate sufficient research to make plausible sense of how differently situated people – welfare mothers, prisoners, students, middle-class professionals – speak of and respond to their various surveillance settings, we will be unable to devise a meaningful account of what surveillance is’ (2006, 126). Before we can examine the impact and influence of surveillance on these or other segments of society, we must examine the pervasive nature of general surveillance techniques. The objective of this paper is to consider in detail the historical techniques of government surveillance on communities in Northern Ireland (NI) and the former East Germany (GDR). By looking at these two models of surveillance societies, we can begin to compare and contrast the differences in strategies used in a democracy and a dictatorship. Using these two examples of two heavily surveilled communities, taking a detailed look at five techniques in particular, we gain insight into the implantation of surveillance practices used by different political model structures. The aim is to explore the similarities and differences in strategies used in both states, allowing us to assess the trajectory of future surveillance tactics and its relevance in the securitization of society today

    A Design Theory for Digital Platforms Supporting Online Communities: A Multiple Case Study

    Get PDF
    This research proposes and validates a design theory for digital platforms that support online communities (DPsOC). It addresses ways in which digital platforms can effectively support social interactions in online communities. Drawing upon prior literature on IS design theory, online communities, and platforms, we derive an initial set of propositions for designing effective DPsOC. Our overarching proposition is that three components of digital platform architecture (core, interface, and complements) should collectively support the mix of the three distinct types of social interaction structures of online community (information sharing, collaboration, and collective action). We validate the initial propositions and generate additional insights by conducting an in-depth analysis of an European digital platform for elderly care assistance. We further validate the propositions by analyzing three widely used digital platforms, including Twitter, Wikipedia, and Liquidfeedback, and we derive additional propositions and insights that can guide DPsOC design. We discuss the implications of this research for research and practice

    Playing out diplomacy : Gamified realization of future skills and discipline-specific theory

    Get PDF
    Future horizons, shaped by unpredictable ecosystems and exponential automation, require discipline-specific as well as transdisciplinary skills to navigate. In the context of political science education, negotiation simulations, for example in the form of board games, can aid in developing both. As a plausibility probe for wider investigations, we set out to research whether an International Relations course concept utilizing the classical board game Diplomacy with pedagogically altered rules and gaming conditions enhances students’ (n = 23) understanding of discipline-specific knowledge and future skills. We utilized a conceptual pre-post measure as well as free-form learning diaries to investigate development in participants’ conceptual understanding and future skills along the course. The results tentatively suggest quantifiable and qualitatively observable changes in the discipline-specific conceptual, as well as more broad-based competence level. The gamified learning environment provided students with an activating and engaging learning environment that better acquainted them not only with discipline-specific theory, but more importantly, also with skills regarded important for their future.Peer reviewe

    Fostering Distributed Business Logic in Open Collaborative Networks: an integrated approach based on semantic and swarm coordination

    Get PDF
    Given the great opportunities provided by Open Collaborative Networks (OCNs), their success depends on the effective integration of composite business logic at all stages. However, a dilemma between cooperation and competition is often found in environments where the access to business knowledge can provide absolute advantages over the competition. Indeed, although it is apparent that business logic should be automated for an effective integration, chain participants at all segments are often highly protective of their own knowledge. In this paper, we propose a solution to this problem by outlining a novel approach with a supporting architectural view. In our approach, business rules are modeled via semantic web and their execution is coordinated by a workflow model. Each company’s rule can be kept as private, and the business rules can be combined together to achieve goals with defined interdependencies and responsibilities in the workflow. The use of a workflow model allows assembling business facts together while protecting data source. We propose a privacy-preserving perturbation technique which is based on digital stigmergy. Stigmergy is a processing schema based on the principle of self-aggregation of marks produced by data. Stigmergy allows protecting data privacy, because only marks are involved in aggregation, in place of actual data values, without explicit data modeling. This paper discusses the proposed approach and examines its characteristics through actual scenarios

    Preliminary specification and design documentation for software components to achieve catallaxy in computational systems

    Get PDF
    This Report is about the preliminary specifications and design documentation for software components to achieve Catallaxy in computational systems. -- Die Arbeit beschreibt die Spezifikation und das Design von Softwarekomponenten, um das Konzept der Katallaxie in Grid Systemen umzusetzen. Eine EinfĂŒhrung ordnet das Konzept der Katallaxie in bestehende Grid Taxonomien ein und stellt grundlegende Komponenten vor. Anschließend werden diese Komponenten auf ihre Anwendbarkeit in bestehenden Application Layer Netzwerken untersucht.Grid Computing
    • 

    corecore