69,621 research outputs found

    When Cost-Efficient Technologies Meet Politics: A Case Study of Radical Wireless Network Implementation

    Get PDF
    Cost efficiency has been a dominant perspective in the traditional IT literature. However, in complex technology and business environment, the widely recognized cost efficient assumption of information technology has been increasingly challenged. Drawing from a case study of wireless network implementation situated in a politically sensitive workplace, this paper provided practice insights for IT managers in today’s networked economy. More specifically, stories experienced in the case study illustrated that despite well-calculated cost efficiency of wireless network infrastructure, the radical implementation process in the case organization encountered enormous challenges and opposition due to the fact that administrators failed to consider various stakeholders’ positions and interests. Eventually, the implementation objectives and outcome were considerably undermined. Implications from this empirical case research reemphasized the significance of understanding political forces situated in any business environment where different stakeholders hold conflicting interests. Lessons learned from the case story further encouraged IT managers and policy makers to better strategize emerging information technology in general and wireless networks in particular as the whole global society and business environment are increasingly facing an emerging wireless world

    Biometric surveillance in schools : cause for concern or case for curriculum?

    Get PDF
    This article critically examines the draft consultation paper issued by the Scottish Government to local authorities on the use of biometric technologies in schools in September 2008 (see http://www.scotland.gov.uk/Publications/2008/09/08135019/0). Coming at a time when a number of schools are considering using biometric systems to register and confirm the identity of pupils in a number of settings (cashless catering systems, automated registration of pupils' arrival in school and school library automation), this guidance is undoubtedly welcome. The present focus seems to be on using fingerprints, but as the guidance acknowledges, the debate in future may encompass iris prints, voice prints and facial recognition systems, which are already in use in non-educational settings. The article notes broader developments in school surveillance in Scotland and in the rest of the UK and argues that serious attention must be given to the educational considerations which arise. Schools must prepare pupils for life in the newly emergent 'surveillance society', not by uncritically habituating them to the surveillance systems installed in their schools, but by critically engaging them in thought about the way surveillance technologies work in the wider world, the various rationales given to them, and the implications - in terms of privacy, safety and inclusion - of being a 'surveilled subject'

    Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier

    Full text link
    As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property. Two parallel developments in academic data collection are converging: (1) open access requirements, whereby researchers must provide access to their data as a condition of obtaining grant funding or publishing results in journals; and (2) the vast accumulation of 'grey data' about individuals in their daily activities of research, teaching, learning, services, and administration. The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities are exploiting these data for research, learning analytics, faculty evaluation, strategic decisions, and other sensitive matters. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them. The privacy frontier facing research universities spans open access practices, uses and misuses of data, public records requests, cyber risk, and curating data for privacy protection. This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201

    Secrecy in Educational Practices: Enacting Nested Black Boxes in Cheating and Deception Detection Systems

    Get PDF
    This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations. Many of these systems are developed and implemented by third-party corporate entities who claim practices to be proprietary and secret. The outsourcers involved in these efforts have provided one level of secrecy and educational administrators involved yet another level, thus constructing nested black boxes. Also discussed in this paper is the “paranoid style” of administration, often supported by the surveillance and construction of rosters of potential non-conformists, such as alleged cheaters and speech code violators. The educational technologies described in this article are increasingly applied to workplace practices, with young people being trained in what is deemed acceptable conduct. Secrecy can serve to alter the character of relationships within the educational institutions involved as well as inside the workplaces in which the approaches are increasingly being integrated

    Strategies and challenges to facilitate situated learning in virtual worlds post-Second Life

    Get PDF
    Virtual worlds can establish a stimulating environment to support a situated learning approach in which students simulate a task within a safe environment. While in previous years Second Life played a major role in providing such a virtual environment, there are now more and more alternative—often OpenSim-based—solutions deployed within the educational community. By drawing parallels to social networks, we discuss two aspects: how to link individually hosted virtual worlds together in order to implement context for immersion and how to identify and avoid “fake” avatars so people behind these avatars can be held accountable for their actions

    Do librarians have a shared set of values? A comparative study of 36 codes of ethics based on Gorman's Enduring Values

    Get PDF
    Thirty-six ethical codes from national professional associations were studied, the aim to test whether librarians have global shared values or if political and cultural contexts have significantly influenced the codes' content. Gorman's eight core values of stewardship, service, intellectual freedom, rationalism, literacy and learning, equity of access to recorded knowledge and information, privacy and democracy were used as a benchmark. A quantitative analysis was carried out of which values each code contained. The codes were further qualitatively analysed, to examine how each value was expressed. It was found that on average codes featured five of Gorman's eight values. The most popular values were: service, privacy, equity of access, stewardship and intellectual freedom. The least popular value was rationalism, across all codes. Some codes omitted certain values because of their specific focus, such as the Native American code. Codes varied in how values were expressed, for example some codes limited principles by law, while some did not. Expression of stewardship and democracy was found to be stronger in countries which have recently experienced conflict or colonialism. The relationship between the profession and the state was another area of variation. Countries in the Asia-Pacific put more emphasis on the power of the State

    Comparative Philosophies in Intercultural Information Ethics

    Get PDF
    The following review explores Intercultural Information Ethics in terms of comparative philosophy, supporting IIE as the most relevant and significant development of the field of Information Ethics. The focus of the review is threefold. First, it will review the core presumption of the field of IIE, that being the demand for an intermission in the pursuit of a founding philosophy for IE in order to first address the philosophical biases of IE by western philosophy. Second, a history of the various philosophical streams of IIE will be outlined, including its literature and pioneering contributors. Lastly, a new synthesis of comparative philosophies in IIE will be offered, looking towards a future evolution of the field. Examining the interchange between contemporary information ethicists regarding the discipline of IIE, the review first outlines the previously established presumptions of the field of IIE that posit the need for an IE as grounded in western sensibilities. The author then addresses the implications of the foregoing presumption from several non-western viewpoints, arguing that IIE does in fact find roots in non-western philosophies as established in the concluding synthesis of western and eastern philosophical traditions

    Smartphones

    Get PDF
    Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones
    • …
    corecore