80,252 research outputs found

    Startup communities: notes on the sociality of tech-entrepreneurs in Manchester

    Get PDF
    In this contribution I explore the conflicting moralities and practices of technology entrepreneurship through the lenses of Mary Douglas’ Grid-Group Cultural Theory. Starting from the distinction between communitarian, individualistic and hierarchical culture, I explore my empirical material drawn from ethnographic fieldwork in Manchester, UK. In particular, I describe the sociality of young male tech-entrepreneurs at networking events, ‘coffices’ and coworkspaces around an urban ‘creative quarter’. I argue that ‘startup communities’ simultaneously encourage individualistic market-competition, contribute to feelings of local group-belonging and are narrative constructions promoted by entrepreneurs, corporations and the State.Universidad de Sevill

    The state of peer-to-peer network simulators

    Get PDF
    Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate and extend existing work. We look at the landscape of simulators for research in peer-to-peer (P2P) networks by conducting a survey of a combined total of over 280 papers from before and after 2007 (the year of the last survey in this area), and comment on the large quantity of research using bespoke, closed-source simulators. We propose a set of criteria that P2P simulators should meet, and poll the P2P research community for their agreement. We aim to drive the community towards performing their experiments on simulators that allow for others to validate their results

    Anonymous Networking amidst Eavesdroppers

    Full text link
    The problem of security against timing based traffic analysis in wireless networks is considered in this work. An analytical measure of anonymity in eavesdropped networks is proposed using the information theoretic concept of equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any given level of anonymity. The network performance is measured by the achievable relay rates from the sources to destinations under latency and medium access constraints. In particular, analytical results are presented for two scenarios: For a two-hop network with maximum anonymity, achievable rate regions for a general m x 1 relay are characterized when nodes generate independent Poisson transmission schedules. The rate regions are presented for both strict and average delay constraints on traffic flow through the relay. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A selective independent scheduling strategy is designed for this purpose, and using the analytical results for the two-hop network, the achievable throughput is characterized as a function of the anonymity level. The throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information theoretic rate-distortion function

    Web 2.0 technologies for learning: the current landscape – opportunities, challenges and tensions

    Get PDF
    This is the first report from research commissioned by Becta into Web 2.0 technologies for learning at Key Stages 3 and 4. This report describes findings from an additional literature review of the then current landscape concerning learner use of Web 2.0 technologies and the implications for teachers, schools, local authorities and policy makers

    THE USAGE OF INDIVIDUAL PRIVACY SETTINGS ON SOCIAL NETWORKING SITES - DRAWING DESIRED DIGITAL IMAGES OF ONESELF

    Get PDF
    Social networking sites (SNS) such as Facebook have created a new way for individuals to share personal data and interact with each other on the Internet. The disclosure of this personal data is directly tied to the existing relationships of individuals within an SNS. Individual privacy settings allow a selective disclosure of personal data to specific connected individuals. In this paper, we present first empirical insights of a grounded theory study, based on 37 qualitative interviews with Facebook users, which reveal factors that drive, or generally influence, the use of these individual privacy settings on SNS. By investigating this privacy protection behaviour towards connected individuals, so-called friends in Facebook\u27s terminology, we add new perspectives to existing theories of information privacy protection \u27individuals\u27 privacy protection behaviour in non-anonymous online environments. We have developed a conceptual model showing that the motivation to use individual privacy settings depends on a complex interplay between different factors. As important drivers, motives for using SNS, existing relationships and context of personal data disclosure have been identified. Building on those insights further allows development or improvement of general privacy controls for individuals interacting with each other on the Internet

    When Cost-Efficient Technologies Meet Politics: A Case Study of Radical Wireless Network Implementation

    Get PDF
    Cost efficiency has been a dominant perspective in the traditional IT literature. However, in complex technology and business environment, the widely recognized cost efficient assumption of information technology has been increasingly challenged. Drawing from a case study of wireless network implementation situated in a politically sensitive workplace, this paper provided practice insights for IT managers in today’s networked economy. More specifically, stories experienced in the case study illustrated that despite well-calculated cost efficiency of wireless network infrastructure, the radical implementation process in the case organization encountered enormous challenges and opposition due to the fact that administrators failed to consider various stakeholders’ positions and interests. Eventually, the implementation objectives and outcome were considerably undermined. Implications from this empirical case research reemphasized the significance of understanding political forces situated in any business environment where different stakeholders hold conflicting interests. Lessons learned from the case story further encouraged IT managers and policy makers to better strategize emerging information technology in general and wireless networks in particular as the whole global society and business environment are increasingly facing an emerging wireless world

    The lesbian, gay, bisexual and transgender community online: discussions of bullying and self-disclosure in YouTube videos

    Get PDF
    Computer-mediated communication has become a popular platform for identity construction and experimentation as well as social interaction for those who identify as lesbian, gay, bisexual or transgender (LGBT). The creation of user-generated videos has allowed content creators to share experiences on LGBT topics. With bullying becoming more common amongst LGBT youth, it is important to obtain a greater understanding of this phenomenon. In our study, we report on the analysis of 151 YouTube videos which were identified as having LGBT- and bullying-related content. The analysis reveals how content creators openly disclose personal information about themselves and their experiences in a non-anonymous rhetoric with an unknown public. These disclosures could indicate a desire to seek friendship, support and provide empathy
    corecore