8,275 research outputs found

    Book Review: What's in a Name?

    Get PDF
    In the spring of 1998, the U.S. government told the Internet: Govern yourself. This unfocused order - a blandishment, really, expressed as an awkward "statement of policy" by the Department of Commerce, carrying no direct force of law - came about because the management of obscure but critical centralized Internet functions was at a political crossroads. This essay reviews Milton Mueller's book Ruling the Root, and the ways in which it accounts for what happened both before and after that crossroads

    What's in a Name? Name Choice, Agency, and Identity

    Get PDF
    This qualitative study addresses name choice among Chinese/Chinese-heritage students at two Ontario universities by asking if identity perception impacts the decision to maintain/change a name and who has agency in these naming choices. Ten out of the 11 participants opted for name change. Six participants attributed English name change to their teachers/education system in China; four asserted full agency in name choice; five were told to choose an English name, but selected their own; and two participants claimed no agency in either change or choice. Based on a grounded theory analysis, social and cultural capital (Bourdieu, 1992), Chinese naming habitus within a Canadian field (Bourdieu, 1984), and agency emerged as strong themes. Through these themes, participants’ negotiation of the third space (Bhabha, 1994) became apparent. This study suggests a need for teachers to gain cultural onomastic awareness so as to respect naming choices and agency of students in Canadian classrooms

    What's in a Name? Understanding Profile Name Reuse on Twitter

    Get PDF
    Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their corresponding user accounts. In fact, Twitter allows users to change their profile name, and afterwards makes the old profile names available for other users to take. In this paper, we provide a large-scale study of the phenomenon of profile name reuse on Twitter. We show that this phenomenon is not uncommon, investigate the dynamics of profile name reuse, and characterize the accounts that are involved in it. We find that many of these accounts adopt abandoned profile names for questionable purposes, such as spreading malicious content, and using the profile name's popularity for search engine optimization. Finally, we show that this problem is not unique to Twitter (as other popular online social networks also release profile names) and argue that the risks involved with profile-name reuse outnumber the advantages provided by this feature

    Publishing and sharing sensitive data

    Get PDF
    Sensitive data has often been excluded from discussions about data publication and sharing. It was believed that sharing sensitive data is not ethical or that it is too difficult to do safely. This opinion has changed with greater understanding and use of methods to ‘de-sensitise’ (i.e., confidentialise) data; that is, modify the data to remove information so that participants or subjects are no longer identifiable, and the capacity to grant ‘conditional access’ to data. Requirements of publishers and funding bodies for researchers to publish and share their data have also seen sensitive data sharing increase. This guide outlines best practice for the publication and sharing of sensitive research data in the Australian context. The Guide follows the sequence of steps that are necessary for publishing and sharing sensitive data, as outlined in the ‘Publishing and Sharing Sensitive Data Decision Tree’. It provides the detail and context to the steps in this Decision Tree. References for further reading are provided for those that are interested. By following the sections below, and steps within, you will be able to make clear, lawful, and ethical decisions about sharing your data safely. It can be done in most cases! How the Guide interacts with your institutional policies This Guide is not intended to override institutional policies on data management or publication. Most researchers operate within the policies of their institution and/or funding arrangement and must, therefore, ensure their decisions about data publication align with these policies. This is particularly relevant for Intellectual Property, and sometimes, your classification of sensitive data (e.g., NSW Government Department of Environment & Heritage, Sensitive Data Species Policy) or selection of data repository. The Guide indicates the steps at which you should check your institutional policies

    The Scottish school leavers cohort: linkage of education data to routinely collected records for mortality, hospital discharge and offspring birth characteristics

    Get PDF
    Purpose: The Scottish school leavers cohort provides population-wide prospective follow-up of local authority secondary school leavers in Scotland through linkage of comprehensive education data with hospital and mortality records. It considers educational attainment as a proxy for socioeconomic position in young adulthood and enables the study of associations and causal relationships between educational attainment and health outcomes in young adulthood. Participants: Education data for 284 621 individuals who left a local authority secondary school during 2006/2007–2010/2011 were linked with birth, death and hospital records, including general/acute and mental health inpatient and day case records. Individuals were followed up from date of school leaving until September 2012. Age range during follow-up was 15 years to 24 years. Findings: to date Education data included all formal school qualifications attained by date of school leaving; sociodemographic information; indicators of student needs, educational or non-educational support received and special school unit attendance; attendance, absence and exclusions over time and school leaver destination. Area-based measures of school and home deprivation were provided. Health data included dates of admission/discharge from hospital; principal/secondary diagnoses; maternal-related, birth-related and baby-related variables and, where relevant, date and cause of death. This paper presents crude rates for all-cause and cause-specific deaths and general/acute and psychiatric hospital admissions as well as birth outcomes for children of female cohort members. Future plans: This study is the first in Scotland to link education and health data for the population of local authority secondary school leavers and provides access to a large, representative cohort with the ability to study rare health outcomes. There is the potential to study health outcomes over the life course through linkage with future hospital and death records for cohort members. The cohort may also be expanded by adding data from future school leavers. There is scope for linkage to the Prescribing Information System and the Scottish Primary Care Information Resource

    To Denominate and Characterize in the Context of Information Systems

    Get PDF
    The aim of the paper is to discuss the distinction between characterisation (classification) and denomination (naming, identifying) in the context of information systems (IS). The paper has a special focus on the design of identifiers, i.e. terms used for identifying individual phenomenon. The reason for this is that the distinction between denomination and characterisation is especially important when designing identifiers. Identifiers e.g. article numbers, telephone numbers, e-mail addresses and personal numbers, constitute an important part of the information infrastructure of companies and society as a whole, and therefore it is crucial that these terms are well designed. The paper illustrates that who designs, assigns and withdraws electronic identifiers is a significant economic and policy issue both within companies and for society as a whole, with farther reaching consequences than often perceived at first glanc

    A View from Elsewhere

    Get PDF
    This report provides an overview of activities carried out during Michaelmas Term, Autumn 2009, as part of a Cambridge University Library Arcadia Project Fellowship on "Rapid Innovation in the Library". The approach taken during the project was to look for opportunities for "quick wins" in the current library setting that could be used to illustrate potential (and tangible) benefits from engaging with current and emerging technologies and changing trends in user behaviour. Where possible, the work built on work undertaken as part of the previous Arcadia projects.The Arcadia Programme has been funded by a generous grant from the Arcadia Fund. http://www.arcadiafund.org.uk
    corecore