Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Science and Technology Studies
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Faculty of Engineering and Information Sciences - Papers: Part A
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents' perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p =.000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents' country of residence. Countries under study included Australia, India, the UK and US. The country contributing …
A Social Network Model For Understanding Technology Use For Knowledge-Intensive Workers, Kon Shing Kenneth Chung
A Social Network Model For Understanding Technology Use For Knowledge-Intensive Workers, Kon Shing Kenneth Chung
Faculty of Engineering and Information Sciences - Papers: Part A
This chapter presents a theoretical model based on social network theories and the social influence model for understanding how knowledge professionals utilise technology. In particular, the association between egocentric network properties (structure, position and tie) and information and communication technology (ICT) use of individuals in knowledge-intensive and geographically dispersed settings is explored. A novel triangulation methodology is adopted where in-depth interviews and observation techniques were utilised to develop constructs for the conceptual model which were then vetted by domain-level experts. A reliable and validated social network-based questionnaire survey is also developed to operationalise the model. Results show that task-level ICT …