2,048 research outputs found

    Electronic Forms-Based Computing for Evidentiary Analysis

    Get PDF
    The paperwork associated with evidentiary collection and analysis is a highly repetitive and time-consuming process which often involves duplication of work and can frequently result in documentary errors. Electronic entry of evidencerelated information can facilitate greater accuracy and less time spent on data entry. This manuscript describes a general framework for the implementation of an electronic tablet-based system for evidentiary processing. This framework is then utilized in the design and implementation of an electronic tablet-based evidentiary input prototype system developed for use by forensic laboratories which serves as a verification of the proposed framework. The manuscript concludes with a discussion of implications and recommendations for the implementation and use of tablet-based computing for evidence analysis

    A Cross-National Examination of Expected Correlation of Computer Ethical Perceptions and User Computer Attitudes

    Get PDF
    This study examined computer ethical perceptions and computer use attitudes among three differing groups consisting of nationalities from the United States, Singapore and Hong Kong. The purpose of the study was to determine if computer attitudes have a moderating effect on the perceptions of computer ethical use across multiple cultural backgrounds. Evidence supporting this claim would add additional insight into previously discovered differences. This study found limited support for the suggested hypotheses, but confirmed fundamental cultural differences. Future research should examine other variables to determine if significant effects can be determined from unexamined variable

    Does Technology Thwart Gender Stereotypes? An Impression Formation-Based Examination of the Differential Influence of Technology across Gender and Messages

    Get PDF
    This research examines the relationship between gender, message sentiment, and technology use on the way that observers form impressions of others. Building on impression formation and gender stereotype research and theory, we develop a two-study research methodology for examining how impressions of technology users are formed. The results of our two studies indicate that technology use is an important component in impression formation, significantly inhibiting the effects of gender stereotyping, such that women and men are not evaluated differently based on their apparent competency in using technology nor on the content of their messaging. Our findings indicate that the use of technology subverts both the male and female stereotypes that observers normally engage

    PROCESS-CONTROL EFFECTS FOR TEAM-BASEDCOMPUTER-MEDIATED DECISION ANALYSES

    Get PDF
    As the evolution of research in Group Support Systems (GSS) continues, focus must begin to shift away from the concentration of GSS groups versus non-GSS groups, and begin to direct scrutiny toward the examination of the group dynamics that influence the experience of the teams that use GSS. The literature has clearly established that GSS improves the quality of certain decisions. The new challenge is to discover what processes within GSS are responsible for decision improvement and how they interact with other group processes extant in work situation

    Urban geography of digital networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 2003.Includes bibliographical references.This dissertation examines the development of digital network infrastructure in the world's great cities at the turn of the 20th century. Drawing upon the concept of cities as information systems and techniques of communications geography, it analyzes how the physical components of digital networks were deployed in major urban areas during the 1990s. It finds that historical processes and pre-existing differences between places shaped the evolution of this infrastructure at multiple spatial scales; global, metropolitan, and neighborhood. As a result, rather than bringing about the "death of distance", digital network infrastructure actually reinforced many of the pre-existing differences between connected and disconnected places. With the telecom bust of 2000-2002, these differences were likely to persist for a decade or more. Yet just as the development of wired digital network infrastructure slowed, wireless technologies emerged as a more flexible, intuitive, and efficient form of connecting users to networks in everyday urban settings. As a result, an untethered model for digital networks emerged which combining the capacity and security of wired networks over long distances with the flexibility and mobility of wireless networks over short distances. This new hybrid infrastructure provided the technology needed to begin widespread experimentation with the creation of digitally mediated spaces, such as New York City's Bryant Park Wireless Network.by Anthony M. Townsend.Ph.D

    Considerations for an Effective Telecommunications-Use Policy

    Get PDF
    Recent changes in federal telecommunications legislation have underscored the importance of an up-to-date and effective telecommunications-use policy in business organizations. With the proliferation of the Internet, intranets, and email as commonplace business tools, the potential for misuse and subsequent liability has become an increasing concern. Even though the recent Supreme Court decision struck down the obscenity provisions of the Communications Decency Act (CDA), it left intact legislation that effectively mandates development of a sound telecommunications-use policy. In addition to potential liability for systems misuse, organizations have also had to address issues of individual employee privacy within the new systems. This technical expansion, coupled with the information privacy issues, has created a large gray area in organizational policy-making. What exactly should an organization formalize as a standing operational policy for day-to-day use of its telecommunications systems? As is evident, without a specific policy that addresses systems use, there can be no expectation of ethical and responsible use on the part of either an organization or an individual employee

    The Threat of Long-Arm Jurisdiction to Electronic Commerce

    Get PDF
    Unfortunately for those whose businesses rely on the Internet, an increasing amount of legal conflict is also arising in reaction to this new business medium. As attorneys and the courts attempt to sort out the Internet’s legal status quo, both are considering such pressing substantive issues as electronic contracts, privacy, trademark, copyright, defamation, computer crimes, censorship, and taxation. It is imperative that information system professionals become aware of how evolving Internet law will affect the medium they are charged with administrating. An informed IS community is also much more capable of mounting legal and political challenges to law that might thwart continued development of e-commerce
    • …
    corecore