Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

University of South Florida

Discipline
Keyword
Publication Year
Publication

Articles 1 - 9 of 9

Full-Text Articles in Science and Technology Studies

An Introduction To A Framework For Sustainability Thinking, Jeremy Van Antwerp, Matthew Kuperus Heun Jul 2022

An Introduction To A Framework For Sustainability Thinking, Jeremy Van Antwerp, Matthew Kuperus Heun

Numeracy

Van Antwerp, Jeremy and Matthew Kuperus Heun. 2022. A Framework for Sustainability Thinking: A Student’s Introduction to Global Sustainability Challenges; (Springer, Cham) 275 pp. ISBN 978-3-0317-9184-0.

A Framework for Sustainability Thinking: A Student’s Introduction to Global Sustainability Challenges presents basic information related to sustainability challenges in the context of a cognitive framework that allows students to evaluate problems and potential solutions from a quantitative perspective. Moreover, numerous end-of-chapter discussion questions and project ideas examine moral, ethical, and worldview aspects of sustainability choices and tradeoffs between different approaches to sustainability.


Measuring Numeracy: Validity And The Programme For The International Assessment Of Adult Competencies (Piaac), Samuel L. Tunstall Jul 2020

Measuring Numeracy: Validity And The Programme For The International Assessment Of Adult Competencies (Piaac), Samuel L. Tunstall

Numeracy

A tension raised in recent scholarship is that between numeracy as a social practice and numeracy as a functional skill set. Such frameworks for conceptualizing numeracy pose a challenge to assessment because what individuals do with numeracy is not the same as what individuals can do (or express) in an assessment setting. This study builds on work related to numeracy assessment through a validity examination of a portion of a well-known assessment: the OECD’s Programme for the International Assessment of Adult Competencies (PIAAC). In following a path set out by standards for assessment, I ask: What does the PIAAC numeracy …


Emergent Model For Community Engagement: Developing Courses And Programs, Barbara S. Spector, Cyndy S. Leard Jun 2020

Emergent Model For Community Engagement: Developing Courses And Programs, Barbara S. Spector, Cyndy S. Leard

Journal of Global Education and Research

This retrospective emergent design qualitative evaluation study documents the development of a unique model for community engagement and engaged scholarship in higher education. The primary novel aspect of the model is participatory involvement of both the target audience for the program and representatives of various stakeholder groups who initiated, conceptualized, tested, assessed, and evaluated the courses and program with the professor. Members of the target audience and stakeholder groups also recruited participants, contributed to refining the courses and program to meet the needs of the stakeholder groups, and contributed to redesigning courses for online learning. The model emerged while developing …


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …


Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall Jan 2018

Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall

Numeracy

Cathy O’Neil. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy (New York, NY: Crown) 272 pp. ISBN 978-0553418811.

Accessible to a wide readership, Cathy O’Neil’s Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy provides a lucid yet alarming account of the extensive reach of mathematical models in influencing all of our lives. With a particular eye towards social justice, O’Neil not only warns modelers to be cognizant of the effects of their work on real people—especially vulnerable groups who have less power to fight back—but also encourages laypersons to take initiative …


Beyond The Protective Effect: Towards A Theory Of Harm For Information Communication Technologies In Mass Atrocity Response, Kristin Bergtora Sandvik, Nathaniel A. Raymond May 2017

Beyond The Protective Effect: Towards A Theory Of Harm For Information Communication Technologies In Mass Atrocity Response, Kristin Bergtora Sandvik, Nathaniel A. Raymond

Genocide Studies and Prevention: An International Journal

Information Communication Technologies (ICTs) are now being employed as a standard part of mass atrocity response, evidence collection, and research by non-governmental organizations, governments, and the private sector. Deployment of these tools and techniques occur for a variety of stated reasons, most notably the ostensible goal of “protecting” vulnerable populations. However, these often experimental applications of ICTs and digital data are occurring in the absence of agreed normative frameworks and accepted theory to guide their ethical and responsible use. This article surveys the current state-of-the-art of ICT use in mass atrocity response and research to identify harms and hazards inherent …


Querying The Ethics Of Data Collection As A Community Of Research And Practice The Movement Toward The “Liberalism Of Fear” To Protect The Vulnerable, Colette Mazzucelli, Anna Visvizi May 2017

Querying The Ethics Of Data Collection As A Community Of Research And Practice The Movement Toward The “Liberalism Of Fear” To Protect The Vulnerable, Colette Mazzucelli, Anna Visvizi

Genocide Studies and Prevention: An International Journal

No abstract provided.


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …


Documenting Mass Rape: Medical Evidence Collection Techniques As Humanitarian Technology, Jaimie Morse Oct 2014

Documenting Mass Rape: Medical Evidence Collection Techniques As Humanitarian Technology, Jaimie Morse

Genocide Studies and Prevention: An International Journal


Aim: Emerging global networks of human rights activists, doctors, and nurses have advocated for increased collection of medical evidence in conflict-affected countries to corroborate allegations of sexual violence and facilitate prosecution in international and domestic courts. Such initiatives are part of broader shifts in human rights advocacy to document human rights violations using rigorous, standardized methodologies. In this paper, I consider three principal forms of medical evidence to document sexual violence and their use in these settings: the patient medical record, the medical certificate, and the sexual assault medical forensic exam (commonly known as the “rape kit”).

Methods: Combining archival …