Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

PDF

Discipline
Institution
Keyword
Publication
Publication Type

Articles 61 - 90 of 196

Full-Text Articles in Science and Technology Studies

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

M. G. Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael May 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

M. G. Michael

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


Sa-Rest: Using Semantics To Empower Restful Services And Smashups With Better Interoperability And Mediation, Karthik Gomadam, Amit P. Sheth May 2008

Sa-Rest: Using Semantics To Empower Restful Services And Smashups With Better Interoperability And Mediation, Karthik Gomadam, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


California Ocean And Coastal Investment Study Final Report, Kildow May 2008

California Ocean And Coastal Investment Study Final Report, Kildow

Publications

The National Ocean Economics Program (NOEP), in cooperation with the California Coastal Conservancy and the Ocean Protection Council (OPC), completed this study to provide an inventory of state expenditures for the coast and ocean for fiscal years 2005-06 (FY 2006) and 2006-07 (FY 2007). The purpose of the study is to understand where current public investments are being made and whether further investments need to occur to be consistent with the OPC Strategic Plan as well as those of various state programs.


Dynamic And Agile Soa Using Sawsdl, Karthik Gomadam, Kunal Verma, Amit P. Sheth May 2008

Dynamic And Agile Soa Using Sawsdl, Karthik Gomadam, Kunal Verma, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Perry, Amit P. Sheth May 2008

A Framework To Support Spatial, Temporal And Thematic Analytics Over Semantic Web Data, Matthew Perry, Amit P. Sheth

Kno.e.sis Publications

Spatial and temporal data are critical components in many applications. This is especially true in analytical applications ranging from scientific discovery to national security and criminal investigation. The analytical process often requires uncovering and analyzing complex thematic relationships between disparate people, places and events. Fundamentally new query operators based on the graph structure of Semantic Web data models, such as semantic associations, are proving useful for this purpose. However, these analysis mechanisms are primarily intended for thematic relationships. In this paper, we describe a framework built around the RDF data model for analysis of thematic, spatial and temporal relationships between …


Refining Search Terms For Nanotechnology, Alan L. Porter, Jan Youtie, Philip Shapira, David J. Schoeneck May 2008

Refining Search Terms For Nanotechnology, Alan L. Porter, Jan Youtie, Philip Shapira, David J. Schoeneck

Philip Shapira

The ability to delineate the boundaries of an emerging technology is central to obtaining an understanding of the technology’s research paths and commercialization prospects. Nowhere is this more relevant than in the case of nanotechnology (hereafter identified as “nano”) given its current rapid growth and multidisciplinary nature. (Under the rubric of nanotechnology, we also include nanoscience and nanoengineering.) Past efforts have utilized several strategies, including simple term search for the prefix nano, complex lexical and citation-based approaches, and bootstrapping techniques. This research introduces a modularized Boolean approach to defining nanotechnology which has been applied to several research and patenting databases. …


Understanding International Broadband Comparisons, Scott J. Wallsten May 2008

Understanding International Broadband Comparisons, Scott J. Wallsten

Scott J. Wallsten

No abstract provided.


Gesellschaftliche Herausforderungen Durch „Intelligente Umgebungen“, Michael Friedewald, Ralf Lindner May 2008

Gesellschaftliche Herausforderungen Durch „Intelligente Umgebungen“, Michael Friedewald, Ralf Lindner

Michael Friedewald

Mit der umfassenden drahtlosen Vernetzung und Computerisierung von Alltagsgegenständen und Umgebungen werden nicht nur neuartige Anwendungen möglich, sondern auch zahlreiche Risiken erzeugt. Soll Ambient Intelligence (AmI) ein Erfolg werden, ist es erforderlich, angemessene Maß- nahmen zu ergreifen, um Privatsphäre, Sicherheit oder Vertrauen in den jeweiligen Anwendungskontexten zu gewährleisten. Dabei besteht die Herausforderung darin, frühzeitig Vorkehrungen gegen Risiken zu entwickeln, die noch nicht manifest sind. Im Rahmen des EU-Projekts „Safeguards in a World of Ambient Intelligence“ wurden Szenarien entwickelt, mit deren Hilfe poten- zielle Risiken in einer frühen Phase der Technikentwicklung identifiziert wurden. Der Beitrag skizziert die angewandte Szenarienmethode, präsentiert die …


Public Lecture: "Government's Role In Broadband", Sharon Gillet Apr 2008

Public Lecture: "Government's Role In Broadband", Sharon Gillet

Rural Broadband Research Group

In this talk Commissioner Gillett will focus on the different roles government plays in achieving universal broadband. She will relate her public sector experience to her academic understanding of this issue by reflecting on her 2006 paper on municipal wireless broadband through the lenses of her experience as a member of Boston’s wireless task force, and her first year of service as the Commonwealth’s Telecommunications and Cable Commissioner.


Ws3: International Workshop On Context-Enabled Source And Service Selection, Integration And Adaptation, Quan Z. Sheng, Ullas Nambiar, Amit P. Sheth, Biplav Srivastava, Zakaria Maamr, Said Elnaffar Apr 2008

Ws3: International Workshop On Context-Enabled Source And Service Selection, Integration And Adaptation, Quan Z. Sheng, Ullas Nambiar, Amit P. Sheth, Biplav Srivastava, Zakaria Maamr, Said Elnaffar

Kno.e.sis Publications

This write-up provides a summary of the International Workshop on Context enabled Source and Service Selection, Integration and Adaptation (CSSSIA 2008), organized in conjunction with WWW2008, at Beijing, China on April 22nd 2008. We outline the motivation for organizing the work-shop, briefly describe the organizational details and program of the workshop, and summarize each of the papers accepted by the workshop. More information about the workshop can be found at http://www.cs.adelaide.edu.au/∼csssia08/.


Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava Apr 2008

Participatory Privacy In Urban Sensing, Katie Shilton, Jeffrey A. Burke, Deborah Estrin, Mark Hansen, Mani B. Srivastava

Ethics in Science and Engineering National Clearinghouse

Urban sensing systems that use mobile phones enable individuals and communities to collect and share data with unprecedented speed, accuracy and granularity. But employing mobile handsets as sensor nodes poses new challenges for privacy, data security, and ethics. To address these challenges, CENS is developing design principles based upon understanding privacy regulation as a participatory process. This paper briefly reviews related literature and introduces the concept of participatory privacy regulation. PPR reframes negotiations of social context as an important part of participation in sensing-supported research. It engages participants in ethical decision-making and the meaningful negotiation of personal boundaries and …


Rdb2rdf: Incorporating Domain Semantics In Structured Data, Satya S. Sahoo Apr 2008

Rdb2rdf: Incorporating Domain Semantics In Structured Data, Satya S. Sahoo

Kno.e.sis Publications

No abstract provided.


The New Middle-Class, Technology And Modernity In Seelampur, Sreela Sarkar Apr 2008

The New Middle-Class, Technology And Modernity In Seelampur, Sreela Sarkar

National Center for Digital Government

From introduction: My paper studies a globally acclaimed experiment in computer literacy and cultural capital in Seelampur, located on the Delhi-Uttar Pradesh state border. In late 2003, Datamation, a prominent private, Delhi based Information Technology firm, with partial funding from UNESCO and the Delhi state government, established computer literacy and e-commerce development projects in Zaffarabad in Seelampur. Seelampur is a diverse community but like the rest of the area, Zaffarabad is largely a settlement of informal working class Muslims. State violence and dominant middle-class interests have historically colluded to create Seelampur. During the National Emergency years in 1975-1977, residents of …


Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall Apr 2008

Blessed Unrest: The Power Of Unreasonable People To Change The World, Stephanie Pace Marshall

Publications & Research

In her keynote address at the 2008 NCSSSMST Professional Conference, Dr. Stephanie Pace Marshall addresses what work can be done with the collective resources of its Consortium members which beg to be shared and connected--and also explores what the source of "...our Blessed Unrest that will give us the courage to become unreasonable advocates for our children and for STEM transformation?"


Reminiscences: Impact Of Textiles And Apparel Technology On Our Lives, Ann Beth Presley, Martha C. Jenkins Apr 2008

Reminiscences: Impact Of Textiles And Apparel Technology On Our Lives, Ann Beth Presley, Martha C. Jenkins

Applied Human Sciences

Women's perceptions of technological changes in textiles and apparel and how the changes have affected daily life were examined using the transmissive reminiscence technique. Technological advances do contribute to use of less time and effort and offer a greater variety of products, but the products often have a shorter life expectancy or are kept in inventory for a shorter time because it is more expedient to replace rather than repair or recycle textile and clothing items. Care must be taken to cultivate cohesive relationships within the family and teach values that were once inherent in textiles/ apparel tasks. Otherwise advances …


The Making Of A Social Librarian: How Blogs, Wikis And Facebook Have Changed One Librarian And Her Job, Jennifer Kelley Apr 2008

The Making Of A Social Librarian: How Blogs, Wikis And Facebook Have Changed One Librarian And Her Job, Jennifer Kelley

Library Scholarship

This paper explores the evolution of the author’s identity as a librarian, from a tech-ignorant/tech-phobic library school graduate to a librarian teaching faculty, staff, students, community members and administrators the value of collaborative software.

According to Technorati, the blog search engine, there are 244 blogs that primarily concern themselves with libraries and so-called 2.0 technologies. The blogs range from the well known Tame the Web and Shifted Librarian to library students attempting to sort out the deluge of information on blogs, wikis, RSS feeds, social networking services and how these applications and services help, hinder, harm or haunt libraries and …


Oai/Pmh Metadata Conformance To Dlf/Aquifer Mods Guidelines, Colin J. Koteles Apr 2008

Oai/Pmh Metadata Conformance To Dlf/Aquifer Mods Guidelines, Colin J. Koteles

Library Scholarship

The DLF/Aquifer Implementation Guidelines for Shareable MODS Records were created to facilitate the creation of rich, sharable metadata for use in aggregated digital humanities collections. While guideline creators recognize most data providers do not meet criteria set forth in this document, this study attempts to quantify current levels of conformance to the base requirements set forth by DLF/Aquifer MODS guidelines. By analyzing collections for which MODS records are currently available to OAI-PMH service providers, predictions can be made as to both the nature and extent of future normalization processes required by service providers and the nature and extent of training …


Artist Ranking Through Analysis Of On-Line Community Comments, Julia Grace, Daniel Gruhl, Kevin Haas, Meenakshi Nagarajan, Christine Robson, Nachiketa Sahoo Apr 2008

Artist Ranking Through Analysis Of On-Line Community Comments, Julia Grace, Daniel Gruhl, Kevin Haas, Meenakshi Nagarajan, Christine Robson, Nachiketa Sahoo

Kno.e.sis Publications

We describe an approach to measure the popularity of music tracks, albums and artists by analyzing the comments of music listeners in social networking online communities such as MySpace. This measure of popularity appears to be more accurate than the traditional measure based on album sales figures, as demonstrated by our focus group study. We faced many challenges in our attempt to generate a popularity ranking from the user comments on social networking sites, e.g., broken English sentences, comment spam, etc. We discuss the steps we took to overcome these challenges and describe an end to end system for generating …


Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten Mar 2008

Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten

Scott J. Wallsten

The United States now spends around $7 billion on universal service programs—subsidies intended to ensure that the entire country has access to telecommunications services. Most of this money supports telecommunications service in “high cost” (primarily rural) areas, and the High Cost fund is growing quickly. In response to this growth, policymakers are considering using reverse auctions, or bids for the minimum subsidy, as a way to reduce expenditures. While the U.S. has not yet distributed funds for universal service programs using reverse auctions, the method has been used widely. First, reverse auctions are akin to standard government procurement procedures, which …


Chapter One: Beneath The Spanish Moss: The World Of The Root Doctor, Jack G. Montgomery Jr. Mar 2008

Chapter One: Beneath The Spanish Moss: The World Of The Root Doctor, Jack G. Montgomery Jr.

DLTS Faculty Publications

The spiritual practice of the Shaman is most likely the oldest spiritual tradition on Earth. Shamanism is a way in which humanity has sought a psychic connection to the world of healing, life and death, as well as a sense of social and individual balance. It is a complex psychological grammar that allows the Shaman to function in both the conventional and an alternative "spirit" view of reality. Shamanisn has been a part of American culture since the colonial settlement and continues today despite technology and modern scientific rationalism. This chapter is a brief social history of the African-American shamanic …


On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler Mar 2008

On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.


On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler Mar 2008

On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.


The Illusion Of Security, David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta Mar 2008

The Illusion Of Security, David Wright, Michael Friedewald, Wim Schreurs, Michiel Verlinden, Serge Gutwirth, Yves Punie, Ioannis Maghiros, Elena Vildjiounaite, Petteri Alahuhta

Michael Friedewald

No abstract provided.


Traveling The Semantic Web Through Space, Time, And Theme, Amit P. Sheth, Matthew Perry Mar 2008

Traveling The Semantic Web Through Space, Time, And Theme, Amit P. Sheth, Matthew Perry

Kno.e.sis Publications

In this installment of Semantics and Services, we further develop the idea of spatial, temporal, and thematic (STT) processing of semantic Web data and describe the Web infrastructure needed to support it. Starting from Ramesh Jain's vision of the EventWeb as a view of what's possible with a Web that better accommodates all three dimensions of event-related information (thematic, spatial, and temporal), we outline the architecture needed to support it and current research that aims to realize it.


Semantic Sensor Web, Amit P. Sheth, Cory Andrew Henson Feb 2008

Semantic Sensor Web, Amit P. Sheth, Cory Andrew Henson

Kno.e.sis Publications

No abstract provided.


The Network Society From Knowledge To Policy Feb 2008

The Network Society From Knowledge To Policy

Jane E. Fountain

No abstract provided.


Approximate Owl Instance Retrieval With Screech, Pascal Hitzler, Markus Krotzsch, Sebastian Rudolph, Tuvshintur Tserendorj Feb 2008

Approximate Owl Instance Retrieval With Screech, Pascal Hitzler, Markus Krotzsch, Sebastian Rudolph, Tuvshintur Tserendorj

Computer Science and Engineering Faculty Publications

With the increasing interest in expressive ontologies for the Semantic Web, it is critical to develop scalable and efficient ontology reasoning techniques that can properly cope with very high data volumes. For certain application domains, approximate reasoning solutions, which trade soundness or completeness for increased reasoning speed, will help to deal with the high computational complexities which state of the art ontology reasoning tools have to face. In this paper, we present a comprehensive overview of the SCREECH approach to approximate instance retrieval with OWL ontologies, which is based on the KAON2 algorithms, facilitating a compilation of OWL DL TBoxes …


Module 1.2: International Accountability, M.J. Peterson Feb 2008

Module 1.2: International Accountability, M.J. Peterson

International Dimensions of Ethics Education in Science and Engineering

International-level mechanisms that hold researchers, research institutes, firms, or others accountable to society are often misunderstood or ignored in current science and engineering curricula. This module will discuss accountability in terms of innovation, self-regulation, scientific unions, corporate pressures, public and private standards, and corporation-specific campaigns and social movements.