Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Sociology (3)
- Engineering (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- American Politics (1)
-
- Anthropology (1)
- Business (1)
- Communication (1)
- Computer Law (1)
- Computer Sciences (1)
- Criminology (1)
- Critical and Cultural Studies (1)
- International Relations (1)
- International and Area Studies (1)
- Internet Law (1)
- Law (1)
- Law and Society (1)
- Medical Humanities (1)
- Medical Specialties (1)
- Medicine and Health (1)
- Medicine and Health Sciences (1)
- Oncology (1)
- Other Engineering (1)
- Other International and Area Studies (1)
- Peace and Conflict Studies (1)
- Pediatrics (1)
- Physical Sciences and Mathematics (1)
- Politics and Social Change (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Science and Technology Studies
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Secrecy and Society
State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …
Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe
Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe
Secrecy and Society
Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …
When Worlds Collide: Boundary Management Of Adolescent And Young Adult Childhood Cancer Survivors And Caregivers, Elizabeth A. Ankrah, Arpita Bhattacharya, Lissamarie Donjuan, Franceli L. Cibrian, Anamara Ritt-Olson, Joel Milam, Lilibeth Torno, Gillian R. Hayes
When Worlds Collide: Boundary Management Of Adolescent And Young Adult Childhood Cancer Survivors And Caregivers, Elizabeth A. Ankrah, Arpita Bhattacharya, Lissamarie Donjuan, Franceli L. Cibrian, Anamara Ritt-Olson, Joel Milam, Lilibeth Torno, Gillian R. Hayes
Engineering Faculty Articles and Research
Adolescent and young adult childhood cancer survivors experience health complications, late or long-term biomedical complications, as well as economic and psychosocial challenges that can have a lifelong impact on their quality-of-life. As childhood cancer survivors transition into adulthood, they must learn to balance their identity development with demands of everyday life and the near- and long-term consequences of their cancer experience, all of which have implications for the ways they use existing technologies and the design of novel technologies. In this study, we interviewed 24 childhood cancer survivors and six caregivers about their cancer survivorship experiences. The results of our …
Disclosure-Protected Inference With Linked Microdata Using A Remote Analysis Server, James Chipperfield
Disclosure-Protected Inference With Linked Microdata Using A Remote Analysis Server, James Chipperfield
Faculty of Engineering and Information Sciences - Papers: Part A
Large amounts of microdata are collected by data custodians in the form of censuses and administrative records. Often, data custodians will collect different information on the same individual. Many important questions can be answered by linking microdata collected by different data custodians. For this reason, there is very strong demand from analysts, within government, business, and universities, for linked microdata. However, many data custodians are legally obliged to ensure the risk of disclosing information about a person or organisation is acceptably low. Different authors have considered the problem of how to facilitate reliable statistical inference from analysis of linked microdata …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …