Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Sociology

PDF

Selected Works

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 104

Full-Text Articles in Science and Technology Studies

Animal Pain And The Social Role Of Science, Leslie Irvine Sep 2019

Animal Pain And The Social Role Of Science, Leslie Irvine

Leslie Irvine, PhD

Assuming that all animals are sentient would mean ending their use in most scientific research. This does not necessarily imply an unscientific or anti-scientific stance. Examining the social role of science reveals its considerable investment in preserving the status quo, including the continued use of animal subjects. From this perspective, the use of animal subjects is a custom that science could move beyond, rather than a methodological requirement that it must defend.


Algorithmic Legal Reasoning As Racializing Assemblage, Ezekiel J. Dixon-Román, Ama Nyame-Mensah, Allison R. Russell Dec 2017

Algorithmic Legal Reasoning As Racializing Assemblage, Ezekiel J. Dixon-Román, Ama Nyame-Mensah, Allison R. Russell

Ezekiel J Dixon-Román

This paper critically examines the use of predictive analytics in U.S. criminal justice policy and practice, with a particular focus on the ways in which these technological practices are reproducing and reinforcing structural relations of difference. Adopting a new materialist lens, which posits algorithms as more-than-human ontologies, the paper explores the process by which algorithms become racializing assemblages through their encounters with administrative data generated at various stages of criminal justice, and guided by choices made by decision makers and researchers. It addresses the following questions: In what ways do the algorithms become part of a larger sociotechnical apparatus of …


Intermediary’S Technology Satisfaction And Performance In Chhattisgarh Public Distribution System: Research Note, Varun Chhabra, Prashant Rajan, Shweta Chopra Dec 2015

Intermediary’S Technology Satisfaction And Performance In Chhattisgarh Public Distribution System: Research Note, Varun Chhabra, Prashant Rajan, Shweta Chopra

Prashant Rajan

Centralized online real-time electronic Public Distribution System (COREPDS) is one of the various technological and administrative reforms introduced by state government of Chhattisgarh to empower beneficiary. COREPDS allows the beneficiary to choose fair price shop where they can purchase subsidized commodities. Salespersons’ working in the fair price shops are the primary operators of point-of-sale (POS) devices introduced in COREPDS. The fact that adoption of Information and Communications Technology (ICT) is mandatory in egovernance makes it important to study technology satisfaction. In this research note, we propose to investigate the relationship between fair price shop performance after the implementation of point-of-sale …


Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross Aug 2015

Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross

George K. Thiruvathukal

This presentation discusses how to address 21st Century employment challenges by dismantling gender-specific barriers to entry. We take an interdisciplinary approach by focusing on areas such as education, public policy, culture, and media (among others).


Expectations For Methodology And Translation Of Animal Research: A Survey Of Health Care Workers, Ari Joffe, Meredith Bara, Natalie Anton, Nathan Nobis May 2015

Expectations For Methodology And Translation Of Animal Research: A Survey Of Health Care Workers, Ari Joffe, Meredith Bara, Natalie Anton, Nathan Nobis

Nathan M. Nobis, PhD

Background: Health care workers (HCW) often perform, promote, and advocate use of public funds for animal research (AR); therefore, an awareness of the empirical costs and benefits of animal research is an important issue for HCW. We aim to determine what health-care-workers consider should be acceptable standards of AR methodology and translation rate to humans. Methods: After development and validation, an e-mail survey was sent to all pediatricians and pediatric intensive care unit nurses and respiratory-therapists (RTs) affiliated with a Canadian University. We presented questions about demographics, methodology of AR, and expectations from AR. Responses of pediatricians and nurses/RTs were …


Creativity In Scientific Teams: Unpacking Novelty And Impact, You-Na Lee, John P. Walsh, Jian Wang Mar 2015

Creativity In Scientific Teams: Unpacking Novelty And Impact, You-Na Lee, John P. Walsh, Jian Wang

Jian Wang

The increasing dominance of team science highlights the importance of understanding the effects of team composition on the creativity of research results. In this paper, we analyze the effect of team size, and field and task variety on creativity. Furthermore, we unpack two facets of creativity in science: novelty and impact. We find that increasing team size has an inverted-U shaped relation with novelty. We also find that the size–novelty relationship is largely due to the relation between size and team field or task variety, consistent with the information processing perspective. On the other hand, team size has a continually …


Scientific Teams: Self-Assembly, Fluidness, And Interdependence, Jian Wang, Diana Hicks Jan 2015

Scientific Teams: Self-Assembly, Fluidness, And Interdependence, Jian Wang, Diana Hicks

Jian Wang

Science is increasingly produced in collaborative teams, but collaborative teams in science are self-assembled and fluid. Such characteristics call for a network approach to account for external activities responsible for team product but taking place beyond closed team boundaries in the open network. Given such characteristics of collaborative teams in science, we empirically test the interdependence between collaborative teams in the same network. Specifically, using fixed effects Poisson models and panel data of 1310 American scientists’ life-time publication histories, we demonstrate knowledge spillovers from new collaborators to other teams not involving these new collaborators. Our findings have important implications for …


Student Collaboration Online In A Critical Thinking Course, Bob Schoenberg Apr 2014

Student Collaboration Online In A Critical Thinking Course, Bob Schoenberg

Bob Schoenberg

This article identifies several benefits of student online collaboration and describes a number of collaborative tools that can be used without charge. The author also shares with readers several different strategies for promoting collaboration, including some of his personal tips and suggestions, based on his experience of teaching an online course on Critical Thinking at UMass Boston. The author argues that online education offers many opportunities for students to learn a variety of subjects, think critically and work collaboratively. However, for online faculty to be effective in their teaching they need training and experience.


Unpacking The Matthew Effect In Citations, Jian Wang Mar 2014

Unpacking The Matthew Effect In Citations, Jian Wang

Jian Wang

One problem confronting the use of citation-based metrics in science studies and research evaluations is the Matthew effect. This paper reviews the role of citations in science and decomposes the Matthew effect in citations into three components: networking, prestige, and appropriateness. The networking and prestige effects challenge the validity of citation-based metrics, but the appropriateness effect does not. Using panel data of 1,279 solo-authored papers’ citation histories and fixed effects models, we test these three effects controlling for unobserved paper characteristics. We find no evidence of retroactive networking effect and only weak evidence of prestige effect (very small and not …


The Umass Boston Bachelors Of Science In Information Technology, Deborah Boisvert, Ricardo Checchi, William Campbell, Jean-Pierre Kuilboer, Roger Blake, Robert Cohen, Oscar Gutierrez Feb 2014

The Umass Boston Bachelors Of Science In Information Technology, Deborah Boisvert, Ricardo Checchi, William Campbell, Jean-Pierre Kuilboer, Roger Blake, Robert Cohen, Oscar Gutierrez

Roger H. Blake

The BSIT is a 21st Century degree that supports and extends the BATEC vision of curriculum – advanced in content and pedagogy, regionally-coordinated, and industry-linked. Every exercise assigned throughout the BSIT emphasizes collaboration, competence, and outcomes assessment. Faculty and business partners regularly participate in professional and curriculum development to ensure the program’s continued industry relevance.


Usos E Significados Da Tecnologia Na Academia, João Monteiro Matos Jan 2014

Usos E Significados Da Tecnologia Na Academia, João Monteiro Matos

João Monteiro Matos

This study seeks to understand how the academic population – professors and researchers perceives, uses, and interacts with new information and communication technologies (ICT) in their everyday working practices. The main goal is to understand whether these new technologies can be an indicator of different scientific cultures, using the metaphor of the “two cultures” introduced by Charles Snow (1963).

I make use of this metaphor to examine differences and specificities of two scientific communities: the natural sciences and the social sciences community at two institutions of the University of Lisbon.

This research follows a mixed methods strategy, combining the application …


Trumping Communitarianism: Crime Control And Forensic Dna Typing And Databasing In Singapore, Victor Toom Jan 2014

Trumping Communitarianism: Crime Control And Forensic Dna Typing And Databasing In Singapore, Victor Toom

victor toom

Liberalism and communitarianism have figured prominently in discussions of how to govern forensic DNA practices (forensic DNA typing and databasing). Despite the prominence of these two political philosophies and their underlying values, no studies have looked at the governance of forensic DNA practices in a nondemocratic country governed by a communitarian logic. To fill this lacuna in the literature, this article considers Singapore as an authoritarian state governed by a communitarian philosophy. The article highlights basic innovations and technologies of forensic DNA practices and articulates a liberal democratic version of “biolegality” as described by Michael Lynch and Ruth McNally. It …


Participatory Visual & Digital Methods, Aline Gubrium, Krista Harper Apr 2013

Participatory Visual & Digital Methods, Aline Gubrium, Krista Harper

Krista M. Harper

Table of contents and introduction of Participatory Visual and Digital Methods by Aline Gubrium and Krista Harper. Available in paperback, hardcover, and e-book editions from Left Coast Press .


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce Nov 2012

Social Construction Of Safety In Uas Technology In Concrete Settings: Some Military Cases Studied, Gwendolyn C.H. Bakx, James M. Nyce

Gwendolyn C.H. Bakx

Unmanned aerial systems (UASs) in general and UAS safety in particular have so far received little attention in the science, technology and society (STS) literature. This paper therefore reports on sev- eral (military) cases of this relatively new technology, focusing specifi cally on issues of safety. Quite often, safety of technology is considered the result of a rational process – one of a series of rational, often calculative, linear steps. The paper’s results suggest that establishing safety in military UASs is very much a social process. Approaching (military) UAS safety from this perspective could perhaps be complementary to more analytical …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Addressing Plagiarism In A Digital Age, Eleanor Kutz, Wayne Rhodes, Stephen Sutherland, Vivian Zamel Aug 2012

Addressing Plagiarism In A Digital Age, Eleanor Kutz, Wayne Rhodes, Stephen Sutherland, Vivian Zamel

Eleanor Kutz

Four faculty members from UMass Boston's English Department explore possible ways of addressing the issue of plagiarism with their students as easy access to materials on the Internet is making it easier then ever to draw on others’ words, with or without appropriate documentation. Approaching faculty concerns from four complementary perspectives, the authors make the case for 1) recasting our understanding of plagiarism in terms of influence, borrowing, and remixing of the sort that is central to musical and artistic creation, 2) examining how students might develop greater awareness of the ways in which they are working with sources in …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …


The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael Mar 2012

The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael

Professor Katina Michael

Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …