Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (113)
- University of Massachusetts Boston (13)
- Kansas State University Libraries (8)
- University of Central Florida (8)
- Old Dominion University (7)
-
- University of New Hampshire (6)
- California Polytechnic State University, San Luis Obispo (3)
- University of South Florida (3)
- Embry-Riddle Aeronautical University (2)
- San Jose State University (2)
- University of Rhode Island (2)
- Wilfrid Laurier University (2)
- Association of Arab Universities (1)
- Claremont Colleges (1)
- Clemson University (1)
- George Fox University (1)
- Illinois State University (1)
- Jacksonville State University (1)
- Kennesaw State University (1)
- Marshall University (1)
- Mississippi State University (1)
- Penn State Dickinson Law (1)
- Rochester Institute of Technology (1)
- The Beryl Institute (1)
- The Catholic University of America, Columbus School of Law (1)
- The University of Akron (1)
- The University of Maine (1)
- The University of San Francisco (1)
- UIC School of Law (1)
- University of San Diego (1)
- Keyword
-
- Technology (15)
- ToC (10)
- Information technology (5)
- Privacy (5)
- Table (5)
-
- Contents (4)
- Cybersecurity (4)
- Editor (4)
- Internet (4)
- News (4)
- Reporting (4)
- Social Media (4)
- Social media (4)
- TAM (4)
- Tanzania (4)
- Trust (4)
- AI (3)
- Artificial intelligence (3)
- Attitude (3)
- Data mining (3)
- Digital Transformation (3)
- Digital transformation (3)
- Hazard (3)
- Healthcare (3)
- Information (3)
- Innovation (3)
- International (3)
- Machine learning (3)
- Newscasting (3)
- Peril (3)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (113)
- Trotter Review (13)
- Human-Machine Communication (8)
- Journal of Applied Communications (6)
- RISK: Health, Safety & Environment (1990-2002) (6)
-
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (5)
- Military Cyber Affairs (2)
- The Journal of Sociotechnical Critique (2)
- sprinkle: an undergraduate journal of feminist and queer studies (2)
- Bridges: An Undergraduate Journal of Contemporary Connections (1)
- Catholic University Journal of Law and Technology (1)
- Compass: An Undergraduate Journal of American Political Ideas (1)
- Critical Humanities (1)
- Dickinson Law Review (2017-Present) (1)
- Emancipations: A Journal of Critical Social Analysis (1)
- Feminist Pedagogy (1)
- Genocide Studies and Prevention: An International Journal (1)
- Health Behavior Research (1)
- International Bulletin of Political Psychology (1)
- International Journal for Business Education (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Interdisciplinary Perspectives and Scholarship (1)
- Journal of International Agricultural and Extension Education (1)
- Journal of Media Literacy Education (1)
- Journal of Science Education for Students with Disabilities (1)
- Journal of Technology in Counselor Education and Supervision (1)
- Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث (1)
- LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University (1)
- Maine Policy Review (1)
- Markets, Globalization & Development Review (1)
Articles 1 - 30 of 187
Full-Text Articles in Science and Technology Studies
Interprofessional Collaboration As A Feminist Pedagogy: A Call For The Unsettling Of Care In Health Professions Education, Ivana Guarrasi, Rhonda Cornell, Sally Clemenson
Interprofessional Collaboration As A Feminist Pedagogy: A Call For The Unsettling Of Care In Health Professions Education, Ivana Guarrasi, Rhonda Cornell, Sally Clemenson
Feminist Pedagogy
No abstract provided.
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Genocide Studies and Prevention: An International Journal
Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).
Machine Ex Machina: A Framework Decentering The Human In Ai Design Praxis, Cait Lackey, Zizi Papacharissi
Machine Ex Machina: A Framework Decentering The Human In Ai Design Praxis, Cait Lackey, Zizi Papacharissi
Human-Machine Communication
Artificial intelligence (AI) design typically incorporates intelligence in a manner that is affirmatory of the superiority of human forms of intelligence. In this paper, we draw from relevant research and theory to propose a social-ecological design praxis of machine inclusivity that rejects the presumption of primacy afforded to human-centered AI. We provide new perspectives for how human-machine communication (HMC) scholarship can be synergistically combined with modern neuroscience’s integrated information theory (IIT) of consciousness. We propose an integrated theoretical framework with five design practice recommendations to guide how we might think about responsible and conscious AI environments of the future: symbiotic …
Exploring Cultural, Health, And Technology Intersections: A Focus On Migrant Experiences, Merna Mina, Sahij Gill
Exploring Cultural, Health, And Technology Intersections: A Focus On Migrant Experiences, Merna Mina, Sahij Gill
Bridges: An Undergraduate Journal of Contemporary Connections
Despite the plethora of theories and frameworks addressing culture, health, and technology adoption, there remains a notable absence of a unifying theory that comprehensively encompasses all three aspects, particularly concerning newcomers. The Health Belief Model, for example, underscores individual perceptions and attitudes toward health yet fails to consider the intricate interplay between cultural factors and technology adoption among immigrant populations. The Healthy Immigrant Effect, which posits that immigrants often exhibit better health outcomes than native-born individuals, does not mention the role of technology on health outcomes. Acculturation theories, while shedding light on the adaptation process, often fall short of explaining …
The Drivers Of Academic Novelty In Digital Capitalism: Job Insecurity, Mental Illness And Time Poverty, Adalberto Fernandes
The Drivers Of Academic Novelty In Digital Capitalism: Job Insecurity, Mental Illness And Time Poverty, Adalberto Fernandes
Emancipations: A Journal of Critical Social Analysis
The present-day digital capitalist academy increases novel academic results by leveraging factors such as precarious academic employment, time poverty, and mental illness. This paradigm reveals a confluence that turns seemingly negative aspects into productive elements. The consequence of this hypothesis is that by enhancing work, time and mental health conditions, there may be a reduction in the number of novelties, with an enhancement of academic's role as producers of truth.
Smoothing Out Smart Tech’S Rough Edges: Imperfect Automation And The Human Fix, Christian Katzenbach, Christian Pentzold, Paloma Viejo Otero
Smoothing Out Smart Tech’S Rough Edges: Imperfect Automation And The Human Fix, Christian Katzenbach, Christian Pentzold, Paloma Viejo Otero
Human-Machine Communication
In this article, we take issue with an idea of autonomous and efficient automation that is upheld through the paradoxical conjunction of a flawed vision of the technological fix and the under-acknowledged human work required to fill in the gaps between machines and users. Our argument is based on two case studies that sit at opposite tails of automation processes: the front end of self-service checkouts and the back end of content moderation. This juxtaposition allows us to surface three themes on how the hype around automation is enabled by human interventions: the ad-hoc sociality in situated practices of automation, …
From Polygraphs To Truth Machines: Artificial Intelligence In Lie Detection, Jo Ann Oravec
From Polygraphs To Truth Machines: Artificial Intelligence In Lie Detection, Jo Ann Oravec
Critical Humanities
The proliferation of artificial intelligence (AI)-enhanced lie detection tools in business, educational, community, and governmental contexts signals a new era of deception detection. With these AI developments, collections of intimate biometric information such as facial and retinal data, keystroke patterns, brain scans, and physiological changes in the cardiovascular system are combined with personal profiles to produce analyses of a subject’s supposed veracity. This article explores some early lie detection technologies (such as the polygraph) and discusses the influences that lie detection initiatives have had in human interactions through the decades. It addresses the empirical issues of whether specific AI technologies …
Taking Flight Or Taking A Pass? Exploring Factors Influencing Consumer Willingness To Pay For Evtol Travel, David C. Ison
Taking Flight Or Taking A Pass? Exploring Factors Influencing Consumer Willingness To Pay For Evtol Travel, David C. Ison
International Journal of Aviation, Aeronautics, and Aerospace
The Advanced Air Mobility (AAM) industry is experiencing significant growth due to technological advancements and increasing demand for efficient travel experiences. The market is expected to reach $45 billion by 2030, with major players like Joby, Archer, Beta, and Wisk dominating. This study aimed to assess public willingness to pay for AAM services using eVTOLs, using Amazon's Mechanical Turk platform. The survey yielded a response rate of 85.8%, with 1,622 completed surveys. The study found that younger urban consumers were more willing to pay higher prices for AAM electric vertical takeoff and landing (eVTOL) aircraft trips than older participants, possibly …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar
What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar
Journal of International Technology and Information Management
This paper describes the approach and lessons learned from a co-creation process with Dutch development NGOs to create a practical and easy-to-use assessment tool for practitioners to assess the organisation's maturity level of digital transformation. For this study, we applied a design science research methodology, specifically a six-step co-creation approach suitable for developing maturity models. The digital maturity assessment tool (quick scan) created is a domain- specific digital transformation maturity tool for development NGOs rather than a generally applicable tool. This artefact was evaluated using an eight-point Requirements framework for the development of digital maturity assessment tools. By developing a …
Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa
Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa
Journal of International Technology and Information Management
Developing quality agile healthcare information systems requires understanding regulatory compliance and evolving healthcare needs through activities tailored within agile scrum roles. Agile scrum, a widely adopted philosophy, offers significant advantages in managing software development processes. This research explores how activities within the agile scrum roles are tailored to agile healthcare information systems development within the Nigerian context. This study adopted a qualitative case study methodology and interviewed 12 agile practitioners developing healthcare information systems within Nigeria using semi-structured open-ended interview guide questions. The practitioners were selected based on a snowballing process, a sunset of purposive sampling techniques from our network …
What’S Trust Got To Do With It? Exploring Agricultural Science Podcast Producers’, Guests’, And Listeners’ Perceptions And Levels Of Trust In Science, Jacqueline Aenlle, Jamie Loizzo, J.C. Bunch, Lisa K. Lundy, Kevin M. Folta
What’S Trust Got To Do With It? Exploring Agricultural Science Podcast Producers’, Guests’, And Listeners’ Perceptions And Levels Of Trust In Science, Jacqueline Aenlle, Jamie Loizzo, J.C. Bunch, Lisa K. Lundy, Kevin M. Folta
Journal of Applied Communications
Little research to this point has examined food, agricultural, natural resource, and human science (FANRHS) podcast creation, the trustworthiness of the information presented, and the credibility of the individuals speaking on the podcast. The purpose of this study was to explore the level of trust in science of FANRHS podcast producers, guests, and listeners. The study followed an explanatory sequential mixed-method design beginning with an online survey instrument to measure trust in science and later, semi-structured interviews to further explore participants’ perceptions of trust and trust in science. Results showed participants had moderate to moderately high levels of trust in …
Review Of "Faith And Fake News: A Guide To Consuming Information Wisely", Katherine J. Graber
Review Of "Faith And Fake News: A Guide To Consuming Information Wisely", Katherine J. Graber
The Christian Librarian
No abstract provided.
Harnessing The Power Of Storytelling And Storylistening: Fostering Challenging Conversations In Coastal Communities, Holly E. Parker Phd
Harnessing The Power Of Storytelling And Storylistening: Fostering Challenging Conversations In Coastal Communities, Holly E. Parker Phd
Maine Policy Review
As sustainability practitioners we often spend our time in vibrant echo chambers. We’re invigorated by debates about how to support just and sustainable communities and environments. But what happens outside that echo chamber? What happens when we meet a neighbor, a colleague or a decisionmaker who doesn’t share our urgency for action? Do we go it alone as we seek to make change? Or do we need to build new, unexpected partnerships? In a time when technology and political and social divisiveness make it easy to dismiss the other, it is vital that we build pathways to understanding opposing points …
Ensuring Responsible And Transparent Use Of Generative Ai In Extension, Paul A. Hill, Lendel K. Narine
Ensuring Responsible And Transparent Use Of Generative Ai In Extension, Paul A. Hill, Lendel K. Narine
The Journal of Extension
Generative artificial intelligence (AI) systems capable of generating human-like text, images, and ideas from existing data based on user-defined prompts, will inevitably impact Extension, including increasing efficiency, productivity, and performing tasks previously exclusive to humans. There are ethical and risk-related considerations surrounding the use of generative AI, including concerns about bias and unintended consequences. It is important for Extension to consider these implications and take steps to ensure that generative AI is used in a responsible and transparent manner. Extension must ensure that educators and staff have the necessary knowledge and skills to effectively utilize and integrate this technology.
Lgbtq People Of Color And Digital Spaces Of Empowerment, Eden Bonjo
Lgbtq People Of Color And Digital Spaces Of Empowerment, Eden Bonjo
sprinkle: an undergraduate journal of feminist and queer studies
In recent history, the internet has been considered a place where disembodied users can escape the limitations of their corporeal bodies. But in the contemporary moment, the digital and the physical worlds have become mutually constitutive. What happens when a politics of race, sexuality, and gender is centered in an analysis of digital activity? LGBTQ people of color use strategies to navigate marginalizing social dynamics of power both offline and online. This negotiation is important because of how integral the internet has become to everyday life. In the age of social media, cultural production has become the business of the …
Where Do Smallholder Farmers Get Their Information? An Exploration Of The Sources Of Agricultural Information In Northwest Cambodia., Presley Nickens, David Ader, Jean Pierre Enriquez, Ricky Bates, Tom Gill, Sovanneary Huot, Lyda Hok, Srean Pao
Where Do Smallholder Farmers Get Their Information? An Exploration Of The Sources Of Agricultural Information In Northwest Cambodia., Presley Nickens, David Ader, Jean Pierre Enriquez, Ricky Bates, Tom Gill, Sovanneary Huot, Lyda Hok, Srean Pao
Journal of International Agricultural and Extension Education
A significant emphasis on scaling up food security efforts is needed to achieve Sustainable Development Goal 2 (Zero Hunger) by 2030. Scaling up sustainable intensification efforts for Cambodian smallholder farmers is key since they face greater exposure to the uncertainties of climate change, globalizing markets, and rural-to-urban migration. One way to increase the effectiveness of efforts and the scaling up of sustainable intensification technologies is through improving access to information about production and marketing technologies. This study aimed to identify sources of information about sustainable technologies available to smallholders and barriers that may be preventing adoption. Information was gathered from …
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Secrecy and Society
State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …
Valenced Media Effects On Robot-Related Attitudes And Mental Models: A Parasocial Contact Approach, Jan-Philipp Stein, Jaime Banks
Valenced Media Effects On Robot-Related Attitudes And Mental Models: A Parasocial Contact Approach, Jan-Philipp Stein, Jaime Banks
Human-Machine Communication
Despite rapid advancements in robotics, most people still only come into contact with robots via mass media. Consequently, robot-related attitudes are often discussed as the result of habituation and cultivation processes, as they unfold during repeated media exposure. In this paper, we introduce parasocial contact theory to this line of research— arguing that it better acknowledges interpersonal and intergroup dynamics found in modern human–robot interactions. Moreover, conceptualizing mediated robot encounters as parasocial contact integrates both qualitative and quantitative aspects into one comprehensive approach. A multi-method experiment offers empirical support for our arguments: Although many elements of participants’ beliefs and attitudes …
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi
International Journal for Business Education
The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …
A Field Test Of Popular Chatbots’ Responses To Questions Concerning Negative Body Image, Ruopeng An, Christopher W. Byron Jr., Chen Chen, Xiaoling Xiang
A Field Test Of Popular Chatbots’ Responses To Questions Concerning Negative Body Image, Ruopeng An, Christopher W. Byron Jr., Chen Chen, Xiaoling Xiang
Health Behavior Research
Background: Chatbots are computer programs, often built upon large artificial intelligence models, that employ dialogue systems to enable online, natural language conversations with users via text, speech, or both. Body image, broadly defined as a combination of thoughts and feelings about one’s physical appearance, has been implicated in many risk behaviors and health problems, especially among adolescents and young adults. Little is known about how chatbots respond to questions about body image.
Methods: This study assessed the responses of 14 widely-used chatbots (eight companion and six therapeutic chatbots) to ten body image-related questions developed upon validated instruments. Chatbots’ responses were …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Journal of International Technology and Information Management
The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Journal of International Technology and Information Management
This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …
Gender Ambiguity In Voice-Based Assistants: Gender Perception And Influences Of Context, Sandra Mooshammer, Katrin Etzrodt
Gender Ambiguity In Voice-Based Assistants: Gender Perception And Influences Of Context, Sandra Mooshammer, Katrin Etzrodt
Human-Machine Communication
Recently emerging synthetic acoustically gender-ambiguous voices could contribute to dissolving the still prevailing genderism. Yet, are we indeed perceiving these voices as “unassignable”? Or are we trying to assimilate them into existing genders? To investigate the perceived ambiguity, we conducted an explorative 3 (male, female, ambiguous voice) × 3 (male, female, ambiguous topic) experiment. We found that, although participants perceived the gender-ambiguous voice as ambiguous, they used a profoundly wide range of the scale, indicating tendencies toward a gender. We uncovered a mild dissolve of gender roles. Neither the listener’s gender nor the personal gender stereotypes impacted the perception. However, …
A Tide Of Technical Trends: Technology Competence Among Licensed Counselors, Brittany G. Suggs, Mary Sanderfer Stull, Spencer R. Baker, Kathie T. Erwin, David M. Savinsky
A Tide Of Technical Trends: Technology Competence Among Licensed Counselors, Brittany G. Suggs, Mary Sanderfer Stull, Spencer R. Baker, Kathie T. Erwin, David M. Savinsky
Journal of Technology in Counselor Education and Supervision
The inclusion of technology in mental health care can revolutionize the accessibility, affordability, and effectiveness of counseling services, while furnishing practical solutions to reduce mental health disparities and meet widening care demands. Steered by the Coalition for Technology in Behavioral Science (CTiBS) telebehavioral health (TBH) competencies, this study employed a descriptive survey design to investigate licensed counselors’ (LCs’) perceived technology competence in mental health care. The following research question steered the study’s exploration: What is the nature of perceived technology competence among LCs? The overarching hypothesis speculated that LCs’ exposure, familiarity, and current utilization of various mental health technologies would …
Summoning Laplace’S Demon: The Erosion Of Meaningful Voter Choice In An Era Of Algorithms?, Stephen Bork
Summoning Laplace’S Demon: The Erosion Of Meaningful Voter Choice In An Era Of Algorithms?, Stephen Bork
Compass: An Undergraduate Journal of American Political Ideas
Precise individual microtargeting threatens to remake the political landscape as thoroughly as it has remade marketing. This paper explores the observed uses to date of political microtargeting as well as the many difficulties, some inherent to politics, of measuring its effects. Considering the philosophical difficulties of predictively removing human choice, it then assesses the observed risks of and some potential remedies to the current trajectory and finds that free electoral choice is not doomed to be written out of the system.
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …