Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (70)
- Communication Technology and New Media (69)
- Physical Sciences and Mathematics (66)
- Computer Sciences (61)
- Life Sciences (60)
-
- Bioinformatics (58)
- Databases and Information Systems (58)
- OS and Networks (58)
- Engineering (52)
- Public Affairs, Public Policy and Public Administration (25)
- Policy Design, Analysis, and Evaluation (14)
- Public Policy (14)
- Arts and Humanities (12)
- Business (11)
- Economics (11)
- Science and Technology Policy (10)
- Sociology (10)
- Technology and Innovation (9)
- Library and Information Science (8)
- Law (7)
- Religion (7)
- Education (6)
- Industrial Organization (5)
- Philosophy (5)
- Political Science (5)
- Intellectual Property Law (4)
- Urban Studies and Planning (4)
- Anthropology (3)
- Institution
-
- Wright State University (58)
- University of Wollongong (51)
- SelectedWorks (23)
- University of Massachusetts Amherst (22)
- Selected Works (10)
-
- University of Pittsburgh School of Law (4)
- Western Kentucky University (4)
- College of DuPage (3)
- Eastern Illinois University (3)
- Embry-Riddle Aeronautical University (3)
- Center for the Blue Economy (2)
- George Fox University (2)
- East Tennessee State University (1)
- Eastern Michigan University (1)
- Emory University School of Law (1)
- Illinois Math and Science Academy (1)
- Kennesaw State University (1)
- Montclair State University (1)
- Seton Hall University (1)
- Syracuse University (1)
- University of Nevada, Las Vegas (1)
- University of Pennsylvania Carey Law School (1)
- University of Puget Sound (1)
- Keyword
-
- Ethics (16)
- Analysis (7)
- Technology (6)
- Telecommunications (6)
- Coal (5)
-
- Iterative (5)
- Linear (5)
- Performance (5)
- Privacy (5)
- Detection (4)
- Evolution (4)
- Mines (4)
- RDF (4)
- SSW (4)
- Semantic Sensor Web (4)
- Semantic Web (4)
- Underground (4)
- Gas (3)
- Government (3)
- Innovation Studies / Estudios sobre Innovación (3)
- Low (3)
- Multi (3)
- Participatory design (3)
- Regulation (3)
- Science (3)
- Science and Innovacion Policy / Políticas de Ciencia e Innovación (3)
- Systems (3)
- Ubiquitous Computing (3)
- Antitrust (2)
- Approach (2)
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (49)
- Kno.e.sis Publications (47)
- International Dimensions of Ethics Education in Science and Engineering (14)
- Computer Science and Engineering Faculty Publications (11)
- Manuel Fernández-Esquinas (6)
-
- M. G. Michael (5)
- Scott J. Wallsten (5)
- Articles (4)
- Michael Friedewald (4)
- DLTS Faculty Publications (3)
- Ethics in Science and Engineering National Clearinghouse (3)
- Library Scholarship (3)
- Masters Theses (3)
- National Center for Digital Government (3)
- Philip Shapira (3)
- Publications (3)
- Sarah E. Vieweg (3)
- All Faculty Scholarship (2)
- Sharon Beder (2)
- The Christian Librarian (2)
- Applied Aviation Sciences - Daytona Beach (1)
- Applied Human Sciences (1)
- BEADS: Journal of the Society of Bead Researchers (1)
- Department of English Faculty Scholarship and Creative Works (1)
- Electronic Theses and Dissertations (1)
- Faculty Articles (1)
- Faculty of Commerce - Papers (Archive) (1)
- Faculty of Engineering and Information Sciences - Papers: Part B (1)
- Jane E. Fountain (1)
- Library Faculty Publications (1)
- Publication Type
Articles 61 - 90 of 196
Full-Text Articles in Science and Technology Studies
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
M. G. Michael
This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …
Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael
Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael
M. G. Michael
This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.
Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael
Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael
M. G. Michael
This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …
Sa-Rest: Using Semantics To Empower Restful Services And Smashups With Better Interoperability And Mediation, Karthik Gomadam, Amit P. Sheth
Sa-Rest: Using Semantics To Empower Restful Services And Smashups With Better Interoperability And Mediation, Karthik Gomadam, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
California Ocean And Coastal Investment Study Final Report, Kildow
California Ocean And Coastal Investment Study Final Report, Kildow
Publications
The National Ocean Economics Program (NOEP), in cooperation with the California Coastal Conservancy and the Ocean Protection Council (OPC), completed this study to provide an inventory of state expenditures for the coast and ocean for fiscal years 2005-06 (FY 2006) and 2006-07 (FY 2007). The purpose of the study is to understand where current public investments are being made and whether further investments need to occur to be consistent with the OPC Strategic Plan as well as those of various state programs.
Dynamic And Agile Soa Using Sawsdl, Karthik Gomadam, Kunal Verma, Amit P. Sheth
Dynamic And Agile Soa Using Sawsdl, Karthik Gomadam, Kunal Verma, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Perry, Amit P. Sheth
A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Perry, Amit P. Sheth
Kno.e.sis Publications
Spatial and temporal data are critical components in many applications. This is especially true in analytical applications ranging from scientific discovery to national security and criminal investigation. The analytical process often requires uncovering and analyzing complex thematic relationships between disparate people, places and events. Fundamentally new query operators based on the graph structure of Semantic Web data models, such as semantic associations, are proving useful for this purpose. However, these analysis mechanisms are primarily intended for thematic relationships. In this paper, we describe a framework built around the RDF data model for analysis of thematic, spatial and temporal relationships between …
Refining Search Terms For Nanotechnology, Alan L. Porter, Jan Youtie, Philip Shapira, David J. Schoeneck
Refining Search Terms For Nanotechnology, Alan L. Porter, Jan Youtie, Philip Shapira, David J. Schoeneck
Philip Shapira
The ability to delineate the boundaries of an emerging technology is central to obtaining an understanding of the technology’s research paths and commercialization prospects. Nowhere is this more relevant than in the case of nanotechnology (hereafter identified as “nano”) given its current rapid growth and multidisciplinary nature. (Under the rubric of nanotechnology, we also include nanoscience and nanoengineering.) Past efforts have utilized several strategies, including simple term search for the prefix nano, complex lexical and citation-based approaches, and bootstrapping techniques. This research introduces a modularized Boolean approach to defining nanotechnology which has been applied to several research and patenting databases. …
Understanding International Broadband Comparisons, Scott J. Wallsten
Understanding International Broadband Comparisons, Scott J. Wallsten
Scott J. Wallsten
No abstract provided.
Gesellschaftliche Herausforderungen Durch „Intelligente Umgebungen“, Michael Friedewald, Ralf Lindner
Gesellschaftliche Herausforderungen Durch „Intelligente Umgebungen“, Michael Friedewald, Ralf Lindner
Michael Friedewald
Mit der umfassenden drahtlosen Vernetzung und Computerisierung von Alltagsgegenständen und Umgebungen werden nicht nur neuartige Anwendungen möglich, sondern auch zahlreiche Risiken erzeugt. Soll Ambient Intelligence (AmI) ein Erfolg werden, ist es erforderlich, angemessene Maß- nahmen zu ergreifen, um Privatsphäre, Sicherheit oder Vertrauen in den jeweiligen Anwendungskontexten zu gewährleisten. Dabei besteht die Herausforderung darin, frühzeitig Vorkehrungen gegen Risiken zu entwickeln, die noch nicht manifest sind. Im Rahmen des EU-Projekts „Safeguards in a World of Ambient Intelligence“ wurden Szenarien entwickelt, mit deren Hilfe poten- zielle Risiken in einer frühen Phase der Technikentwicklung identifiziert wurden. Der Beitrag skizziert die angewandte Szenarienmethode, präsentiert die …
Public Lecture: "Government's Role In Broadband", Sharon Gillet
Public Lecture: "Government's Role In Broadband", Sharon Gillet
Rural Broadband Research Group
In this talk Commissioner Gillett will focus on the different roles government plays in achieving universal broadband. She will relate her public sector experience to her academic understanding of this issue by reflecting on her 2006 paper on municipal wireless broadband through the lenses of her experience as a member of Boston’s wireless task force, and her first year of service as the Commonwealth’s Telecommunications and Cable Commissioner.
Ws3: International Workshop On Context-Enabled Source And Service Selection, Integration And Adaptation, Quan Z. Sheng, Ullas Nambiar, Amit P. Sheth, Biplav Srivastava, Zakaria Maamr, Said Elnaffar
Ws3: International Workshop On Context-Enabled Source And Service Selection, Integration And Adaptation, Quan Z. Sheng, Ullas Nambiar, Amit P. Sheth, Biplav Srivastava, Zakaria Maamr, Said Elnaffar
Kno.e.sis Publications
This write-up provides a summary of the International Workshop on Context enabled Source and Service Selection, Integration and Adaptation (CSSSIA 2008), organized in conjunction with WWW2008, at Beijing, China on April 22nd 2008. We outline the motivation for organizing the work-shop, briefly describe the organizational details and program of the workshop, and summarize each of the papers accepted by the workshop. More information about the workshop can be found at http://www.cs.adelaide.edu.au/∼csssia08/.
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava
Ethics in Science and Engineering National Clearinghouse
Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …
Rdb2rdf: Incorporating Domain Semantics In Structured Data, Satya S. Sahoo
Rdb2rdf: Incorporating Domain Semantics In Structured Data, Satya S. Sahoo
Kno.e.sis Publications
No abstract provided.
The New Middle-Class, Technology And Modernity In Seelampur, Sreela Sarkar
The New Middle-Class, Technology And Modernity In Seelampur, Sreela Sarkar
National Center for Digital Government
From introduction: My paper studies a globally acclaimed experiment in computer literacy and cultural capital in Seelampur, located on the Delhi-Uttar Pradesh state border. In late 2003, Datamation, a prominent private, Delhi based Information Technology firm, with partial funding from UNESCO and the Delhi state government, established computer literacy and e-commerce development projects in Zaffarabad in Seelampur. Seelampur is a diverse community but like the rest of the area, Zaffarabad is largely a settlement of informal working class Muslims. State violence and dominant middle-class interests have historically colluded to create Seelampur. During the National Emergency years in 1975-1977, residents of …
Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall
Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall
Publications & Research
In her keynote address at the 2008 NCSSSMST Professional Conference, Dr. Stephanie Pace Marshall addresses what work can be done with the collective resources of its Consortium members which beg to be shared and connected--and also explores what the source of "...our Blessed Unrest that will give us the courage to become unreasonable advocates for our children and for STEM transformation?"
Reminiscences: Impact Of Textiles And Apparel Technology On Our Lives, Ann Beth Presley, Martha C. Jenkins
Reminiscences: Impact Of Textiles And Apparel Technology On Our Lives, Ann Beth Presley, Martha C. Jenkins
Applied Human Sciences
Women's perceptions of technological changes in textiles and apparel and how the changes have affected daily life were examined using the transmissive reminiscence technique. Technological advances do contribute to use of less time and effort and offer a greater variety of products, but the products often have a shorter life expectancy or are kept in inventory for a shorter time because it is more expedient to replace rather than repair or recycle textile and clothing items. Care must be taken to cultivate cohesive relationships within the family and teach values that were once inherent in textiles/ apparel tasks. Otherwise advances …
The Making Of A Social Librarian: How Blogs, Wikis And Facebook Have Changed One Librarian And Her Job, Jennifer Kelley
The Making Of A Social Librarian: How Blogs, Wikis And Facebook Have Changed One Librarian And Her Job, Jennifer Kelley
Library Scholarship
This paper explores the evolution of the author’s identity as a librarian, from a tech-ignorant/tech-phobic library school graduate to a librarian teaching faculty, staff, students, community members and administrators the value of collaborative software.
According to Technorati, the blog search engine, there are 244 blogs that primarily concern themselves with libraries and so-called 2.0 technologies. The blogs range from the well known Tame the Web and Shifted Librarian to library students attempting to sort out the deluge of information on blogs, wikis, RSS feeds, social networking services and how these applications and services help, hinder, harm or haunt libraries and …
Oai/Pmh Metadata Conformance To Dlf/Aquifer Mods Guidelines, Colin J. Koteles
Oai/Pmh Metadata Conformance To Dlf/Aquifer Mods Guidelines, Colin J. Koteles
Library Scholarship
The DLF/Aquifer Implementation Guidelines for Shareable MODS Records were created to facilitate the creation of rich, sharable metadata for use in aggregated digital humanities collections. While guideline creators recognize most data providers do not meet criteria set forth in this document, this study attempts to quantify current levels of conformance to the base requirements set forth by DLF/Aquifer MODS guidelines. By analyzing collections for which MODS records are currently available to OAI-PMH service providers, predictions can be made as to both the nature and extent of future normalization processes required by service providers and the nature and extent of training …
Artist Ranking Through Analysis Of On-Line Community Comments, Julia Grace, Daniel Gruhl, Kevin Haas, Meenakshi Nagarajan, Christine Robson, Nachiketa Sahoo
Artist Ranking Through Analysis Of On-Line Community Comments, Julia Grace, Daniel Gruhl, Kevin Haas, Meenakshi Nagarajan, Christine Robson, Nachiketa Sahoo
Kno.e.sis Publications
We describe an approach to measure the popularity of music tracks, albums and artists by analyzing the comments of music listeners in social networking online communities such as MySpace. This measure of popularity appears to be more accurate than the traditional measure based on album sales figures, as demonstrated by our focus group study. We faced many challenges in our attempt to generate a popularity ranking from the user comments on social networking sites, e.g., broken English sentences, comment spam, etc. We discuss the steps we took to overcome these challenges and describe an end to end system for generating …
Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten
Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten
Scott J. Wallsten
The United States now spends around $7 billion on universal service programs—subsidies intended to ensure that the entire country has access to telecommunications services. Most of this money supports telecommunications service in “high cost” (primarily rural) areas, and the High Cost fund is growing quickly. In response to this growth, policymakers are considering using reverse auctions, or bids for the minimum subsidy, as a way to reduce expenditures. While the U.S. has not yet distributed funds for universal service programs using reverse auctions, the method has been used widely. First, reverse auctions are akin to standard government procurement procedures, which …
Chapter One: Beneath The Spanish Moss: The World Of The Root Doctor, Jack G. Montgomery Jr.
Chapter One: Beneath The Spanish Moss: The World Of The Root Doctor, Jack G. Montgomery Jr.
DLTS Faculty Publications
The spiritual practice of the Shaman is most likely the oldest spiritual tradition on Earth. Shamanism is a way in which humanity has sought a psychic connection to the world of healing, life and death, as well as a sense of social and individual balance. It is a complex psychological grammar that allows the Shaman to function in both the conventional and an alternative "spirit" view of reality. Shamanisn has been a part of American culture since the colonial settlement and continues today despite technology and modern scientific rationalism. This chapter is a brief social history of the African-American shamanic …
On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler
On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.
On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler
On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler
Applied Aviation Sciences - Daytona Beach
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.
The Illusion Of Security, David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta
The Illusion Of Security, David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta
Michael Friedewald
No abstract provided.
Traveling The Semantic Web Through Space, Time, And Theme, Amit P. Sheth, Matthew Perry
Traveling The Semantic Web Through Space, Time, And Theme, Amit P. Sheth, Matthew Perry
Kno.e.sis Publications
In this installment of Semantics and Services, we further develop the idea of spatial, temporal, and thematic (STT) processing of semantic Web data and describe the Web infrastructure needed to support it. Starting from Ramesh Jain's vision of the EventWeb as a view of what's possible with a Web that better accommodates all three dimensions of event-related information (thematic, spatial, and temporal), we outline the architecture needed to support it and current research that aims to realize it.
Semantic Sensor Web, Amit P. Sheth, Cory Andrew Henson
Semantic Sensor Web, Amit P. Sheth, Cory Andrew Henson
Kno.e.sis Publications
No abstract provided.
The Network Society From Knowledge To Policy
Approximate Owl Instance Retrieval With Screech, Pascal Hitzler, Markus Krotzsch, Sebastian Rudolph, Tuvshintur Tserendorj
Approximate Owl Instance Retrieval With Screech, Pascal Hitzler, Markus Krotzsch, Sebastian Rudolph, Tuvshintur Tserendorj
Computer Science and Engineering Faculty Publications
With the increasing interest in expressive ontologies for the Semantic Web, it is critical to develop scalable and efficient ontology reasoning techniques that can properly cope with very high data volumes. For certain application domains, approximate reasoning solutions, which trade soundness or completeness for increased reasoning speed, will help to deal with the high computational complexities which state of the art ontology reasoning tools have to face. In this paper, we present a comprehensive overview of the SCREECH approach to approximate instance retrieval with OWL ontologies, which is based on the KAON2 algorithms, facilitating a compilation of OWL DL TBoxes …
Module 1.2: International Accountability, M.J. Peterson
Module 1.2: International Accountability, M.J. Peterson
International Dimensions of Ethics Education in Science and Engineering
International-level mechanisms that hold researchers, research institutes, firms, or others accountable to society are often misunderstood or ignored in current science and engineering curricula. This module will discuss accountability in terms of innovation, self-regulation, scientific unions, corporate pressures, public and private standards, and corporation-specific campaigns and social movements.