9,648 research outputs found

    Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production

    Get PDF
    In studying topics in cyber conflict and cyber-security governance, scholars must askā€”arguably more so than has been the case with any other emergent research agendaā€”where the epistemological and ontological value of different methods lies. This article describes the unique, dual methodological challenges inherent in the multifaceted program on global cyber-security and asks how problematic they are for scholarly efforts to construct knowledge about digital dynamics in world affairs. I argue that any answer to this question will vary depending on how one perceives the social science enterprise. While traditional dualistic perspectives on social science imply unique challenges for researcher, a monistic perspective of Weberian objectivity does not. Regardless of oneā€™s perspective, however, the most important steps to be taken at the level of the research program are clearly those focused on constructing the trappings of community. To this end, I outline steps that might be taken to develop a range of community-building and -supporting mechanisms that can simultaneously support a micro-foundational approach to research and expose community elements to one another. Doing this stands to better opportunities for the production of knowledge and direct researchers towards fruitful avenues whilst shortening gaps between the ivory tower and the real world

    An Investigation of Cyberinfrastructure Adoption in University Libraries

    Get PDF
    This study aims to understand factors that affect university librariesā€™ adoption of cyberinfrastructure for big data sharing and reuse. A cyberinfrastructure adoption model which contains 10 factors has been developed based on the technology-organization-environment (TOE) framework and the literature regarding tradeoffs of applying cyberinfrastructure. This paper describes the proposed cyberinfrastructure adoption model and explains the survey in-struments. The next steps of the study are also presented

    Network of excellence in internet science: D13.2.1 Internet science ā€“ going forward: internet science roadmap (preliminary version)

    No full text

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologiesā€”nuclear, biological, cyberā€”that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    Will e-Science Be Open Science?

    Get PDF
    This contribution examines various aspects of ā€œopennessā€ in research, and seeks to gauge the degree to which contemporary ā€œe-scienceā€ practices are congruent with ā€œopen science.ā€ Norms and practices of openness are vital for the work of modern scientific communities, but concerns about the growth of stronger technical and institutional restraints on access to research tools, data, and information recently have attracted noticeā€”in part because of their implications for the effective utilization of advanced digital infrastructures and information technologies in research collaborations. Our discussion clarifies the conceptual differences between e-science and open science, and reports findings from a preliminary look at practices in U.K. e-science projects. Both parts serve to emphasize that it is unwarranted to presume that the development of e-science necessarily promotes global open science collaboration. Since there is evident need for further empirical research to establish where, when, and to the extent ā€œopennessā€ and "e-ness" in scientific and engineering research may be expected to advance hand-in-hand, we outline a framework within which such a program of studies might be undertaken.e-Science, Open Science, Engineering Reserach

    Assessing regional digital competence: Digital futures and strategic planning implications

    Get PDF
    Understanding strategic decisions aimed at addressing regional economic issues is of increasing interest among scholars and policy makers today. Thus, studies that proffer effective strategies to address digital futures concerns from social and policy perspectives are timely. In light of this, this research uses strengths, weaknesses, opportunities and threats (SWOT) analysis tool to frame a regional strategy for digital futures to enhance place-specific digital connectivity and socio-economic progress. Focus group discussions and a structured questionnaire were conducted to examine a SWOT for a digital economy strategy in the Southern Downs Region in Queensland, Australia. The findings show that while the proposed regional strategies for digital futures are susceptible to internal and external forces, strategic planning makes them manageable. The studyā€™s findings also reveal that adaptive strategic planning can help regulate the effects of internal and external factors that shape individual and organisational responses to digital transformation, and that these factors promote regional competitiveness

    Evaluation of the Level of Adoption of Information and Communication Technology Resources and the Usage of Alternative Sources in Obtaining Information by Researchers of a Federal Research Institute in Nigeria

    Get PDF
    There is an increasing interest in studying the level of adoption of information and communication technology (ICT) resources by researchers of various disciplines with the effective adoption of ICTs having a proven record of significant academic, social, economic and environmental benefits. The aim of the study was to evaluate the level of adoption of ICT resources and the usage of alternatives in obtaining research information by researchers of a federal research institute in Nigeria. The research was carried out at the Federal Institute of Industrial Research Oshodi (FIIRO) Nigeria. A questionnaire was distributed to 165 researchers of the institute but usable returns totaled 114 (67%). This study revealed that FIIRO researchers utilized varying ICT resources and they had a good level of ICT competency in adopting ICT resources available to them as they carry out their work. Additionally, the institute lacked the ICT infrastructure for FIIRO researchers to fully adopt ICTs. The institute did not have internet connectivity. Considering this gap, researchers used alternative sources in the form of mobile devices, personally-provided laptops/desktops (with personal internet subscription) and internet-providing business centers (cybercafĆ©s) outside the institutionā€™s premises to access information for their research. The study recommended that FIIRO management should provide adequate number of computers for researchers and unhindered internet connectivity for easy access to research information. This paper emanates from the doctoral thesis submitted at the University of South Africa, titled Information Needs and Information Seeking Behavior of Researchers in an industrial research institute in Nigeria
    • ā€¦
    corecore