Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Selected Works

Discipline
Keyword
Publication
File Type

Articles 1 - 16 of 16

Full-Text Articles in Science and Technology Studies

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


666 Or 616 (Rev. 13,18), M. G. Michael Oct 2008

666 Or 616 (Rev. 13,18), M. G. Michael

M. G. Michael

No abstract provided.


The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael Oct 2008

The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael

M. G. Michael

No abstract provided.


A Climate Of Trust: Perceptions Of Legitimate Authority In A Volunteer Computing Project, Peter Darch, Annamaria Carusi, Marina Jirotka Aug 2008

A Climate Of Trust: Perceptions Of Legitimate Authority In A Volunteer Computing Project, Peter Darch, Annamaria Carusi, Marina Jirotka

Peter Darch

Volunteer computing projects are computationally-intensive scientific research projects which seek to meet their need for data processing capacity by asking members of the public to download and process project data on their personal computers. This paper presents findings from a study of the interactions in an online forum of participants in such a project, climateprediction.net. It focuses upon the beliefs of one group of participants, who have been identified as particularly critical to the success of volunteer computing projects, about the organizational policies of climateprediction.net and what are appropriate and inappropriate ways for other participants to behave in the forums.


A Climate Of Trust: Perceptions Of Legitimate Authority In A Volunteer Computing Project, Peter Darch, Annamaria Carusi, Marina Jirotka Aug 2008

A Climate Of Trust: Perceptions Of Legitimate Authority In A Volunteer Computing Project, Peter Darch, Annamaria Carusi, Marina Jirotka

Peter Darch

Volunteer computing projects are computationally-intensive scientific research projects which seek to meet their need for data processing capacity by asking members of the public to download and process project data on their personal computers. This paper presents findings from a study of the interactions in an online forum of participants in such a project, climateprediction.net. It focuses upon the beliefs of one group of participants, who have been identified as particularly critical to the success of volunteer computing projects, about the organizational policies of climateprediction.net and what are appropriate and inappropriate ways for other participants to behave in the forums.


The Corporate Assault On Democracy, Sharon Beder May 2008

The Corporate Assault On Democracy, Sharon Beder

Sharon Beder

The revolutionary shift that we are witnessing at the beginning of the 21st Century from democracy to corporate rule is as significant as the shift from monarchy to democracy, which ushered in the modern age of nation states. It represents a wholesale change in cultural values and aspirations.


Electricity: The Global Impact Of Power Reforms, Sharon Beder May 2008

Electricity: The Global Impact Of Power Reforms, Sharon Beder

Sharon Beder

Dozens of governments have embarked on the pathway to electricity deregulation and privatisation since the mid-1990s. It has become the accepted wisdom amongst governments and opinion leaders despite the consequent price rises and disasters that have followed in its wake: the series of blackouts that have been experienced from Buenos Aires to Auckland; the government bailouts of electricity companies that have been necessary in California and Britain; the need for electricity rationing in Brazil; and the fact that it has become too expensive for millions of people from India to South Africa.


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael May 2008

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

M. G. Michael

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael May 2008

Historical Lessons On Id Technology And The Consequences Of An Unchecked Trajectory, Katina Michael, M G. Michael

M. G. Michael

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto-ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.


Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael May 2008

Privacy, Value And Control Issues In Four Mobile Business Applications, Benjamin D. Renegar, Katina Michael, M G. Michael

M. G. Michael

This paper presents four case studies that explore the adoption and acceptance of mobile technologies and services within the context of the privacy-value-control (PVC) trichotomy. The technologies studied include: the mobile phone, electronic toll payment tags, e-passports, and loyalty card programs. The study shows that despite the potential barriers to adoption in each of the depicted cases, the applications were embraced with great success soon after their introduction. An understanding of why these mobile innovations succeeded in spite of the concerns surrounding them will serve to help practitioners understand other issues currently plaguing emerging technologies like radio-frequency identification (RFID) tags …


Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten Mar 2008

Reverse Auctions And Universal Telecommunications Service: Lessons From Global Experience, Scott J. Wallsten

Scott J. Wallsten

The United States now spends around $7 billion on universal service programs—subsidies intended to ensure that the entire country has access to telecommunications services. Most of this money supports telecommunications service in “high cost” (primarily rural) areas, and the High Cost fund is growing quickly. In response to this growth, policymakers are considering using reverse auctions, or bids for the minimum subsidy, as a way to reduce expenditures. While the U.S. has not yet distributed funds for universal service programs using reverse auctions, the method has been used widely. First, reverse auctions are akin to standard government procurement procedures, which …


Environment And Development In Uganda: Understanding The Global Influence On Domestic Policy, Christopher Gore Dec 2007

Environment And Development In Uganda: Understanding The Global Influence On Domestic Policy, Christopher Gore

Christopher D Gore

No abstract provided.


Healthy Urban Food Production And Local Government, Christopher Gore Dec 2007

Healthy Urban Food Production And Local Government, Christopher Gore

Christopher D Gore

No abstract provided.


Electricity And Privatization In Uganda: The Origins Of Crisis And Problems With Response, Christopher Gore Dec 2007

Electricity And Privatization In Uganda: The Origins Of Crisis And Problems With Response, Christopher Gore

Christopher D Gore

No abstract provided.


UbiquitäRes Computing Und Seine Auswirkungen Auf Die Industriearbeit, Ralf Lindner, Michael Friedewald Dec 2007

UbiquitäRes Computing Und Seine Auswirkungen Auf Die Industriearbeit, Ralf Lindner, Michael Friedewald

Michael Friedewald

Ubiquitäres Computing (UbiComp) bezeichnet eine alles durchdringende Informatisierung und Ver- netzung u.a. auch im Arbeitsleben. Es fügt sich in der industriellen Fertigung in die seit langem zu beobachtenden Trends der Rationalisierung und Flexibilisierung ein, beschleunigen diese und ver- stärken zum Teil deren Auswirkungen auf innerbetriebliche Prozesse. Mit Blick auf Tätigkeitsprofile und Qualifikationsanforderungen sind zwei gegenläufigen Folgen von UbiComp zu erwarten: Einer- seits werden bestimmte Tätigkeiten in der industriellen Fertigung eine qualitative Anreicherung und Erweiterung erfahren, während andererseits erweiterte Möglichkeiten zur Automatisierung von einfa- chen Kontroll-, Überwachungs- und anderen manuellen Tätigkeiten bestehen. Für die Mehrzahl der verbleibenden Beschäftigten in der industriellen …