Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Administration (1)
- Aviation (1)
- Business (1)
- College (1)
- Computers (1)
-
- Critique (1)
- Data (1)
- Data Feminism (1)
- Digital environment (1)
- Digital-technology (1)
- Ecomimics (1)
- Education (1)
- Engineering (1)
- Estate (1)
- Hacking. I. INTRODUCTION (1)
- Management (1)
- Medicine (1)
- NYC (1)
- Open Data (1)
- Personality (1)
- Platform capitalism (1)
- Politics (1)
- Research (1)
- Schools (1)
- Science (1)
- Security (1)
- Shooting (1)
- Social media (1)
- Social memory (1)
- Sports (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Business Intelligence
Phantom Shootings, Allan Ambris
Phantom Shootings, Allan Ambris
Dissertations, Theses, and Capstone Projects
This capstone is a website designed to critique NYC Open Data reporting with respect to shootings through a series of visualizations and discoveries. The NYPD Shooting Incidents datasets (Historic and Year to Date) introduce themselves to the user by claiming to be a “list of every shooting incident that occurred in NYC.” The supplied documentation reveals that this is not the case.
After understanding the supporting materials, there are still undisclosed truths. My exploration of the data revealed that a single victim may be represented across multiple entries. Additionally, multiple victims may be represented by a single entry. It is …
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D
School of Computing: Faculty Publications
Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …
Human-Machine Communication: Complete Volume. Volume 2
Human-Machine Communication: Complete Volume. Volume 2
Human-Machine Communication
This is the complete volume of HMC Volume 2.
Good Game, Greyory Blake
Good Game, Greyory Blake
Theses and Dissertations
This thesis and its corresponding art installation, Lessons from Ziggy, attempts to deconstruct the variables prevalent within several complex systems, analyze their transformations, and propose a methodology for reasserting the soap box within the display pedestal. In this text, there are several key and specific examples of the transformation of various signifiers (i.e. media-bred fear’s transformation into a political tactic of surveillance, contemporary freneticism’s transformation into complacency, and community’s transformation into nationalism as a state weapon). In this essay, all of these concepts are contextualized within the exponential growth of new technologies. That is to say, all of these semiotic …
Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr
Digital Engagement: Personality Is The Context Of The Text, Diane C. Spencer-Scarr
Proceedings from the Document Academy
This paper examines digital-technology as a tool and an environment with the individuals’ personality at the intersection of the two: Its impact on social memory and the unbound document. With the ubiquitous embedding of digital networked technology in society and the emergence of the unbounded document, humans increasingly obtain information by grasping snippets of decontextualized text sourced through non-human entities from globally dispersed databases that have stripped out context. Then in a Kafkian way humans’ have to build from the middle to make sense of the information snippets. The paper explores how the inherent nature of the individual can be …