Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Science and Technology Studies

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens Aug 2023

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens

Secrecy and Society

State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …


Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe Aug 2023

Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe

Secrecy and Society

Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …


When Worlds Collide: Boundary Management Of Adolescent And Young Adult Childhood Cancer Survivors And Caregivers, Elizabeth A. Ankrah, Arpita Bhattacharya, Lissamarie Donjuan, Franceli L. Cibrian, Anamara Ritt-Olson, Joel Milam, Lilibeth Torno, Gillian R. Hayes Apr 2022

When Worlds Collide: Boundary Management Of Adolescent And Young Adult Childhood Cancer Survivors And Caregivers, Elizabeth A. Ankrah, Arpita Bhattacharya, Lissamarie Donjuan, Franceli L. Cibrian, Anamara Ritt-Olson, Joel Milam, Lilibeth Torno, Gillian R. Hayes

Engineering Faculty Articles and Research

Adolescent and young adult childhood cancer survivors experience health complications, late or long-term biomedical complications, as well as economic and psychosocial challenges that can have a lifelong impact on their quality-of-life. As childhood cancer survivors transition into adulthood, they must learn to balance their identity development with demands of everyday life and the near- and long-term consequences of their cancer experience, all of which have implications for the ways they use existing technologies and the design of novel technologies. In this study, we interviewed 24 childhood cancer survivors and six caregivers about their cancer survivorship experiences. The results of our …


Disclosure-Protected Inference With Linked Microdata Using A Remote Analysis Server, James Chipperfield Jan 2014

Disclosure-Protected Inference With Linked Microdata Using A Remote Analysis Server, James Chipperfield

Faculty of Engineering and Information Sciences - Papers: Part A

Large amounts of microdata are collected by data custodians in the form of censuses and administrative records. Often, data custodians will collect different information on the same individual. Many important questions can be answered by linking microdata collected by different data custodians. For this reason, there is very strong demand from analysts, within government, business, and universities, for linked microdata. However, many data custodians are legally obliged to ensure the risk of disclosing information about a person or organisation is acceptably low. Different authors have considered the problem of how to facilitate reliable statistical inference from analysis of linked microdata …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …