4,376 research outputs found

    The Contemporary Tax Journal Volume 6, No. 1 – Summer/Fall 2016

    Get PDF

    Developing a Framework for Stigmergic Human Collaboration with Technology Tools: Cases in Emergency Response

    Get PDF
    Information and Communications Technologies (ICTs), particularly social media and geographic information systems (GIS), have become a transformational force in emergency response. Social media enables ad hoc collaboration, providing timely, useful information dissemination and sharing, and helping to overcome limitations of time and place. Geographic information systems increase the level of situation awareness, serving geospatial data using interactive maps, animations, and computer generated imagery derived from sophisticated global remote sensing systems. Digital workspaces bring these technologies together and contribute to meeting ad hoc and formal emergency response challenges through their affordances of situation awareness and mass collaboration. Distributed ICTs that enable ad hoc emergency response via digital workspaces have arguably made traditional top-down system deployments less relevant in certain situations, including emergency response (Merrill, 2009; Heylighen, 2007a, b). Heylighen (2014, 2007a, b) theorizes that human cognitive stigmergy explains some self-organizing characteristics of ad hoc systems. Elliott (2007) identifies cognitive stigmergy as a factor in mass collaborations supported by digital workspaces. Stigmergy, a term from biology, refers to the phenomenon of self-organizing systems with agents that coordinate via perceived changes in the environment rather than direct communication. In the present research, ad hoc emergency response is examined through the lens of human cognitive stigmergy. The basic assertion is that ICTs and stigmergy together make possible highly effective ad hoc collaborations in circumstances where more typical collaborative methods break down. The research is organized into three essays: an in-depth analysis of the development and deployment of the Ushahidi emergency response software platform, a comparison of the emergency response ICTs used for emergency response during Hurricanes Katrina and Sandy, and a process model developed from the case studies and relevant academic literature is described

    Revisiting Piggyback Prototyping: Examining Benefits and Tradeoffs in Extending Existing Social Computing Systems

    Full text link
    The CSCW community has a history of designing, implementing, and evaluating novel social interactions in technology, but the process requires significant technical effort for uncertain value. We discuss the opportunities and applications of "piggyback prototyping", building and evaluating new ideas for social computing on top of existing ones, expanding on its potential to contribute design recommendations. Drawing on about 50 papers which use the method, we critically examine the intellectual and technical benefits it provides, such as ecological validity and leveraging well-tested features, as well as research-product and ethical tensions it imposes, such as limits to customization and violation of participant privacy. We discuss considerations for future researchers deciding whether to use piggyback prototyping and point to new research agendas which can reduce the burden of implementing the method.Comment: To appear at the 25th ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW '22

    Stick or Twist – The raise of blockchain applications in marketing management

    Get PDF
    The adoption of blockchain technology by companies can change the way they interact with stakeholders, redefining communication strategies and other marketing processes. In this study, we investigated the relevance of blockchain applications for marketing management from the perspective of marketing-related professionals. Answers about blockchain technology application in the marketing arena were collected from the social platform Quora. The data were analyzed through text mining and Spearman’s correlation coefficient to assess the degree of association, inherent intensity, and the association significance between the variables payments, supply chain, loyalty programs, digital marketing, credential management, and marketing management, using Quora-specific metrics, namely, upvotes, shares, and views. The results posit blockchain technology as being an asset for marketing, with greater relevance in supply chain and internal management among marketing operations. Professionals will be able to potentially improve internal management systems and marketing campaigns, which will enhance companies’ competitive advantage.info:eu-repo/semantics/publishedVersio

    Youth and Digital Media: From Credibility to Information Quality

    Get PDF
    Building upon a process-and context-oriented information quality framework, this paper seeks to map and explore what we know about the ways in which young users of age 18 and under search for information online, how they evaluate information, and how their related practices of content creation, levels of new literacies, general digital media usage, and social patterns affect these activities. A review of selected literature at the intersection of digital media, youth, and information quality -- primarily works from library and information science, sociology, education, and selected ethnographic studies -- reveals patterns in youth's information-seeking behavior, but also highlights the importance of contextual and demographic factors both for search and evaluation. Looking at the phenomenon from an information-learning and educational perspective, the literature shows that youth develop competencies for personal goals that sometimes do not transfer to school, and are sometimes not appropriate for school. Thus far, educational initiatives to educate youth about search, evaluation, or creation have depended greatly on the local circumstances for their success or failure

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Information and Communication Technologies in Tourism 2021

    Get PDF
    This open access book is the proceedings of the International Federation for IT and Travel & Tourism (IFITT)’s 28th Annual International eTourism Conference, which assembles the latest research presented at the ENTER21@yourplace virtual conference January 19–22, 2021. This book advances the current knowledge base of information and communication technologies and tourism in the areas of social media and sharing economy, technology including AI-driven technologies, research related to destination management and innovations, COVID-19 repercussions, and others. Readers will find a wealth of state-of-the-art insights, ideas, and case studies on how information and communication technologies can be applied in travel and tourism as we encounter new opportunities and challenges in an unpredictable world

    Public Services 2.0: The Impact of Social Computing on Public Services

    Get PDF
    This report presents the findings of the study on "Public Services 2.0: The Impact of Social Computing on Public Services" conducted by TNO and DTI on behalf of IPTS from 2008 to 2009. The report gives an overview of the main trends of Social Computing, in the wider context of an evolving public sector, and in relation to relevant government trends and normative policy visions on future public services within and across EU Member States. It then provides an exhaustive literature review of research and practice in the area of Social Computing and identifies its key impact areas in the public sector. The report goes on to discuss four case studies of Social Computing-enabled communities in different areas: education (Connexions), health (Doctors.net.uk), inclusion (PatientsLikeMe) and governance (Wikileaks). This is followed by the findings of a scenario-building exercise in which two alternative scenarios were developed and related future opportunities and risks discussed. Additionally, the report presents the results of a cross-case analysis and an ad-hoc online survey which identifies the level of usage, the general characteristics and the key drivers of Social Computing for public services. The report concludes with a summary of research challenges and policy-relevant recommendations. Evidence from the study indicates that Social Computing technologies, applications and values have already been adopted in many areas of government activity. Social Computing affects several aspects of public service, related to both the front office (citizen-government relations) and the back office activities of public administrations. Social Computing is leading to new forms of ICT-enabled participation, capable of enhancing usersÂż social awareness and involvement. Social Computing is also transforming relationships and ways of working within and between public sector organisations and opens the way to innovative service delivery mechanisms.JRC.J.4-Information Societ

    Information and Communication Technologies in Tourism 2022

    Get PDF
    This open access book presents the proceedings of the International Federation for IT and Travel & Tourism (IFITT)’s 29th Annual International eTourism Conference, which assembles the latest research presented at the ENTER2022 conference, which will be held on January 11–14, 2022. The book provides an extensive overview of how information and communication technologies can be used to develop tourism and hospitality. It covers the latest research on various topics within the field, including augmented and virtual reality, website development, social media use, e-learning, big data, analytics, and recommendation systems. The readers will gain insights and ideas on how information and communication technologies can be used in tourism and hospitality. Academics working in the eTourism field, as well as students and practitioners, will find up-to-date information on the status of research
    • …
    corecore