Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Science and Technology Studies

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens Jun 2015

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens

Robert Hoppe

The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps ...


Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong Jun 2015

Understanding The Relationships Of User-Selected Music In Video Games, Memphis Wong

Liberal Arts and Engineering Studies

Music has been an integral part of video games in its contribution to users' gameplay experiences. Varying from simple sound effects to elaborate scores, music helps shape the reactive environment of each video game. In particular, video games that generate unique levels and scenarios based on music has become more popular as its own genre. Games such as Audiosurf take this further, with having the game revolve entirely around levels generated to custom tracks. The aim of this study is to analyze the impact of such games, when it allows a user to select his or her own music.


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices ...


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to ...


Cyber Espionage Or Cyberwar?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyberwar?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

Faculty Scholarship at Penn Law

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two ...


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.