Of Key Terms

Total Page:16

File Type:pdf, Size:1020Kb

Of Key Terms 1 Index of Key Terms Symbols active audience 2977 2.5 Generation Wireless Service (2.5G) 390 database 2881 learning 372 server page (ASP) 144, 517, 1406, 2474 A server page (ASP) scripting 684 A/VE 1897 server page (ASP) aggregator 145 absorptive capacity 1044, 2518 X control 2312 abstract activities 2006, 3089 dimension 2820 activity diagram 329 windows toolkit (AWT) 1668 actor 41, 45, 2006, 2953 academic administration 1707 actor-network theory (ANT) 41, 46, 2011 acceptable use policy (AUP) 2028 actual level of awareness 572 access actuary 172 board standards 884 adaptability 97 control list (ACL) 1523 adaptive accessibility 884, 1819, 1287 algorithm 2595 data quality 1921 feedback 2329 accessible 3083 filter 2595 technology 2919 learning 3064 Web design 884 adaptor 2418 accommodations 2212 added value 2307 accountability 1418 ADDIE 1347 accountable identification 994 adding value 2752 accounting performance measures 176 addressable anit 869 accreditation 901 ADISSA 1115 acculturation 2850 administrative accuracy 2109 and institutional support 1000 ACF 2192 tasks 2792 ACID properties 589, 938 adoption 1188, 2518, 2966 ACS 2984 advanced action 572, 2881 information technology structure 1995 research 297 Internet applications 863 theory 122 advisory agents 80 actionable information 1910 affect-based trust 1869 action-oriented formal specification language affective 1210 complexity 1029 activation function 2098 computing 1056, 1185 activation-emotion space 1185 or relationship conflict 2915 Copyright © 2005, Idea Group Inc., distributing in print or electronic forms without written permission of IGI is prohibited. Index of Key Terms affordances 259 synchronization 3100 agent 92, 97, 815, 938, 1204, 1606, 1792, 1826, application-layer multicast (ALM) 667 1966 applicative-oriented formal specification orientation 1905 language 1210 agents compatibility 1826 appropriation and delivery structure 1995 agent-based approximation Set 438 approach to ASP 145 a-priori feature extraction 2271 simulation 2506 Arab world 2850 aggregate range query 929 Arabization 2839 aggregation 494 arbitration 1833 process 216 architecture 487 agile 2909 viewpoint 487 agile/virtual enterprise 1896 areal interpolation 380 AIP 518 arity 1475 algebraic specification 2430 around-the-clock development 1451 algorithm animation 2334 around-the-sun development 1451 alignment 109, 2625, 2647, 1321, 3073 ARPANET 1022 all rules search 896 artefact 2994 alliance management 247 articulated object 2701 allied model of IPFS 1457 artificial ambiguity 1853 intelligence 1602, 1787 American Community Survey 379 life (ALife) 2084 Americans with Disabilities Act 884, 3047 neural network 172, 1814 amusement 1611 artificially intelligent systems 1241 analog 156 ASCII 156 analysis 1383, 2084 aspect 1927 filter bank 1252 descriptor 1927 model 2391 assertion 801 analysts 311 assessment 386 anchor domain 102 asset anchored instruction 372 creator 869 andragogy 1188 manager 869 angle of arrival (AOA) 1977 assignment 1200 animated pedagogical agents 1137 assisted global positioning system (A-GPS) 1977 animation 1611 assistive technology 884, 2212, 2919, 3083 model 2506 association 2418, 2642 annotations 2480 analysis 2798 anomalies 1234 rules 1148, 2099 anonymity 97, 183, 1343 assured forwarding (AF) 395 in GSS 659 asymmetric of GSS 1343 communication 654 antenarrative 1937 digital subscriber line 917 anthropocentric view of knowledge 1782 asymmetry 2901 antinoise 2596 asynchronous 2213 anytime, anywhere work 134 communication channels 1798 APA 2352 discussion 1916 APICS 778, 1142 group communication technologies 2783 Applet 2442 mode 679 application transfer mode 917 aware vs. application transparent 1196 asynchrony 2864 integration 2604 ATAP 790 programming interfaces (APIs) 1741 ateleology 2734 service provider (ASP) 1011, 1862 attention-based IT infrastructure 1224 state 1413 attitude toward the site (ATS) 1611 2 Index of Key Terms attribute 2006, 1277 behavior networks 479 (informal definition) 1496 hyperstructures 479 auction-based market 1905 learning 242 audience method 815 class 186 network 235 response system (ARS) 183 BBN 242 track 186 beat tracking 196 audience-driven Web design 186 bed and breakfast 1639 audio behavioral/value information 1890 browser 884 behavioural packet 57 landscape 2734 sample 57 variations 2734 audio-lingual method 2759 beliefs 2642 audit 1401 below-view 2729 authentication 1966 benchmark 1910, 2148 author cocitation analysis 727 benefits authoring 1927 management 2367 authority 3117 realisation 2367 authorization 1966 benevolence 2909 for informationbase 1517 best practices 1093, 1107 automated better-faster-cheaper 975 fingerprint identification system (AFIS) 199 bibliometrics 276 planning 2408 bibliomining 276 automatic big-bang indexing 3117 approach 1849 thesaurus construction 2661 ERP implementation 1093 transcription 195 bill of materials (BOM) 2413 tutoring device 2329 binary coding 1200 autonomous bioinformatics 727 agent 1606 biological neural network 172 system (AS) 667 biometry (synonym: biometrics) 305 (sub) system 1572 bit stream 2057 autonomy and freedom 1424 black boxing 46 avatars 126 black-scholes option pricing model 2401 awareness model 572 blended axiom 2154 learning 690, 1819, 2448 axiomatic semantics 1210 learning environment 259 blocking 1544, 2028 B blog 507 back-end interoperability 988 Blooms taxonomy of learning 790 backpropagation 172, 1633, 2099 BM_VEARM 1897 backward-looking responsibility 1325 BM_virtual enterprise 1897 balanced score card 176, 843, 975, 1910 BNN 242 balancing (counteracting) feedback 2722 Bobby 3047 bandwidth 32, 917, 1406, 2028 boosting 2099 management 2050 BBA (Bone-Based Animation) 126 bar codes 545 BOOTSTRAP 386 base pair 3073 bottlenecks 1606 basic residential register network 2363 bottom-up approach 317 baudot 156 boundary Bayes rule 235, 242 crossing 1798 Bayesian region 438 agencies 479 bounded rationality 1853 Box-Jenkins approach 2103 3 Index of Key Terms branching 1315 capability brick-and-mortar 1069 maturity model (CMM) 2179, 2358, 2555 organization 2813 maturity model integrated (CMMI) 2340 schools 3006 table, 1523 broadband network 917 capacity broadcast miss 367 channel 697 provisioning network (CPN) 367 cycle 697 capital equipment expenditures (CAPEX) 638 database 744 cardinality constraints 2423 broker 402, 1897 career trajectory 1769 browser 1662, 2442 carrier sensing 3094 log 2442 CASE 329 browsewrap agreement 1837 case buddy list 1544 history 1937 building block 2839 mix 1672 bulletin board 471, 1763 mix information system (CMIS) 1672 Bullwhip effect 1069, 3089 study 317, 1937, 2381, 2502 business study research 1677 alignment 1897 case-based expert system 1830 complexity 1725 catalog 1930 engineering 2506 categorisation 1602 intelligence 752, 993, 1462, 1589 category model 337, 2710, 3059 attribute 216 process 10, 355, 1321, 1602, 2000 in NL 2855 process outsourcing 1304 causal process reengineering (BPR) 115, 355, 621, ambiguity 479 633, 925, 1093, 1954, 2825 link 1161 processes 2657, 2855 loop diagram (CLD) 843, 2722 rule 1475, 2301 CD-ROM 965 rules 1429 programs 2759 strategy 1321 cell 929 business to business (B2B) 917, 2133, 3121 identification (Cell-ID) 1977 e-commerce 1069, 2044 cellular networks 3094 business to consumer (B2C) e-commerce 1069, census II X-11 2103 2044, 2886 centralized model 2869 business to employee (B2E) 2133 certificate authority 450 business certification 386 transaction 10 authority 933, 2292 value 2657 practice statement 2292 buyer-driven value chain 67 CGI 1948 byte hit rate 3053 chain of sustainability 479 byte-code 1668 challenge 1424 and response 2372 C challenged projects 1937 C4ISR 1283 change 1842 cache 2442 management 1842, 2259, 2683 memory 2276 readiness 1418 caching proxy 367 channel CAD 128 availability 2891 call option 474 capacity 1029 call-based policing 324 conflict 2877 camera calibration 1354 symmetry 2891 capabilities 463 character segmentation 6 4 Index of Key Terms set 1297 clustering 227, 702, 2109, 2419, 2642, 2798 charismatic behavior 801 algorithm 196 chat 1544, 2202 CMM I (CMM-I1; CMM-I2) 2358 room 1120, 1544, 2312 coaches 311 sessions 790 cocited 2491 checkpointing (full, incremental) 1196 cognition 443, 2062 Chen approach 2423 cognitive chief knowledge officer (CKO) 413 domain 204 children 879 gap 2418 Chi-Square automatic interaction detection load 879, 2062 (CHAID) 2099 problem-solving style 2418 choropleth map 380, 2984 process 1826 CIO 1321 reasoning 2329 Cisco Certified Network Associate (CCNA) 690 science 1787, 2062 citizen style 1264, 1277, 2418 rights 1124 system 1826 satisfaction 324 tool 2062 citizen-centric 15 trust 1869 civil society 419 cohesion 2154 clarity of responsibility 1418 collaboration 830, 1869, 1916 class 329, 2006, 2160, 2468 collaborative algebra 2246 browsing 456 diagram 1173, 1217 culture 2000 hierarchy 2468 filter 2462 classification 235, 896, 2491, 2642, 2798 filtering 727, 910, 2067, 2549 tree 1633, 2325 interface 2408 classroom interaction 626 learning 1005, 2448 cleansing 2860 planning, forecasting, andreplenishment clear (CPFR) 843, 1862 case 1830 resources 572 direction 1424 collection 1383 click-and-mortar 1069 development 2801 click-stream 684 management 2801 clickstream stage 2695 data 2808 collective tracking 2276 action 1763 clickwrap agreement 1837 human knowledge 1787 client 2442 intentional action 456 client/server 433 knowledge 1527 architecture 3034 collectivism 2886 client-originated ERP maintenance request 1101 collision 2377 client-server architecture 1093 co-located
Recommended publications
  • Link ? Rot: URI Citation Durability in 10 Years of Ausweb Proceedings
    Link? Rot. URI Citation Durability in 10 Years of AusWeb Proceedings. Link? Rot. URI Citation Durability in 10 Years of AusWeb Proceedings. Baden Hughes [HREF1], Research Fellow, Department of Computer Science and Software Engineering [HREF2] , The University of Melbourne [HREF3], Victoria, 3010, Australia. [email protected] Abstract The AusWeb conference has played a significant role in promoting and advancing research in web technologies in Australia over the last decade. Papers contributed to AusWeb are highly connected to the web in general, to digital libraries and to other conference sites in particular, owing to the publication of proceedings in HTML and full support for hyperlink based referencing. Authors have exploited this medium progressively more effectively, with the vast majority of references for AusWeb papers now being URIs as opposed to more traditional citation forms. The objective of this paper is to examine the reliability of URI citations in 10 years worth of AusWeb proceedings, particularly to determine the durability of such references, and to classify their causes of unavailability. Introduction The AusWeb conference has played a significant role in promoting and advancing research in web technologies in Australia over the last decade. In addition, the AusWeb forum serves as a point of reflection for practitioners engaged in web infrastructure, content and policy development; allowing the distillation of best practice in the management of web services particularly in higher educational institutions in the Australasian region. Papers contributed to AusWeb are highly connected to the web in general, to digital libraries and to other conference sites in particular, owing to the publication of proceedings in HTML and full support for hyperlink based referencing.
    [Show full text]
  • Technopopulism: the Emergence of a Discursive Formation
    tripleC 15(2): 441-458, 2017 http://www.triple-c.at Technopopulism: The Emergence of a Discursive Formation Marco Deseriis Northeastern University, Boston, USA, [email protected], http://neu.academia.edu/MarcoDeseriis Abstract: This article contends that technopopulism is a discursive formation that emerges from the convergence of two preexisting discourses: populism and technolibertarianism. Whereas these discourses are historically distinct the 2008 financial crisis and the 2011 wave of struggles precipitated the political conditions for their intersection. Such convergence produces both tensions and possibilities. On the one hand, technopopulism engenders a radically participatory model of democracy, which is ultimately anti-institutional as citizens cooperate and engage in sophisticated decision-making without the mediation of professional politicians. On the other hand, the more electorally successful technopopulist parties are led by charismatic leaders who synthesize the positions that emerge from the netroots to mobi- lize them against the establishment. These two seemingly contradictory aspects precipitate in two variants of technopopulism: a leaderless-technocratic variant, which is derived from the open source mode of governance and from early experiments of the Global Justice Movement in networked self-government; and a leaderist-populist variant, which is more strictly focused on the electoral competition as an intrinsically hegemonic practice. The article concludes with a reflection on the discursive complementarity of these two variants. Keywords: technopopulism, technolibertarianism, populism, electronic democracy, social media activism, Global Justice Movement, Free and Open Source Software, Podemos, Five Star Movement, Occupy Technopopulism is the belief that the “government of the people, by the people, for the people” (Lincoln 1953 [1863]) is achievable by means of information communica- tions technology.
    [Show full text]
  • Librarians and Link Rot: a Comparative Analysis with Some Methodological Considerations
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, UNL Libraries Libraries at University of Nebraska-Lincoln 10-15-2003 Librarians and Link Rot: A Comparative Analysis with Some Methodological Considerations David C. Tyler University of Nebraska-Lincoln, [email protected] Beth McNeil University of Nebraska-Lincoln, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/libraryscience Part of the Library and Information Science Commons Tyler, David C. and McNeil, Beth, "Librarians and Link Rot: A Comparative Analysis with Some Methodological Considerations" (2003). Faculty Publications, UNL Libraries. 62. https://digitalcommons.unl.edu/libraryscience/62 This Article is brought to you for free and open access by the Libraries at University of Nebraska-Lincoln at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Faculty Publications, UNL Libraries by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. David C. Tyler and Beth McNeil 615 Librarians and Link Rot: A Comparative Analysis with Some Methodological Considerations David C. Tyler and Beth McNeil abstract: The longevity of printed guides to resources on the web is a topic of some concern to all librarians. This paper attempts to determine whether guides created by specialist librarians perform better than randomly assembled lists of resources (assembled solely for the purpose of web studies), commercially created guides (‘Best of the web’-type publications), and guides prepared by specialists in library science and other fields. The paper also attempts to determine whether the characteristics of included web resources have an impact on guides’ longevity. Lastly, the paper addresses methodological issues of concern to this and similar studies.
    [Show full text]
  • Introduction
    GRANICK 5/2/2007 6:29:34 PM INTRODUCTION * JENNIFER GRANICK This issue of the Stanford Law and Policy Review contains five insightful articles about proposed government regulation of different new technologies. Individually, each article describes how regulation of a particular new development, whether digital or medical, comports with the values and desires of the public and proposes a way that individual interests could be better enshrined in public policy. As a set, the five articles reveal an underlying consensus: what the public wants is what the public should have, with only narrow exceptions in the case of medical safety and the rare market failure. The market is the morality. In the opening article of this issue, Congressman Rick Boucher details an onslaught of legislative proposals from a media industry intent on strengthening its bargaining position vis-à-vis consumer electronics manufacturers.1 In short, Big Content wants to control the features Big Devices build into their products, and customer fair use rights are collateral damage. As a thirteen term U.S. Representative for Southern Virginia and member of the House Judiciary Committee’s Internet and Intellectual Property Subcommittee, Boucher has a front row seat for this battle of the titans. Luckily for consumers, the consumer electronics trade groups are a powerful opposition to the copyright industries, and the manufacturers want to give culture lovers gadgets with all the bells and whistles. This power player is standing up for customer freedom, for fair use, and for a certain kind of innovation, though they do so out of self-interest, rather than out of a sense of the inherent public value in fair use and freedom to create.
    [Show full text]
  • Bowling Alone, but Online Together? Virtual Communities and American Public Life
    Bowling Alone, But Online Together? Virtual Communities and American Public Life Felicia Wu Song Charlottesville, Virginia B.A., Yale University, 1994 M.A., Northwestern University, 1996 A Dissertation presented to the Graduate Faculty of the University of Virginia in Candidacy for the Degree of Doctor of Philosophy Department of Sociology University of Virginia May, 2005 Bowling Alone, but Online Together? Virtual Communities and American Public Life Felicia Wu Song James Davison Hunter, Chair Department of Sociology University of Virginia ABSTRACT The integration of new communication technologies into the fabric of everyday life has raised important questions about their effects on existing conceptions and practices of community, relationship, and personal identity. How do these technologies mediate and reframe our experience of social interactions and solidarity? What are the cultural and social implications of the structural changes that they introduce? This dissertation critically considers these questions by examining the social and technological phenomenon of online communities and their role in the ongoing debates about the fate of American civil society. In light of growing concerns over declining levels of trust and civic participation expressed by scholars such as Robert Putnam, many point to online communities as possible catalysts for revitalizing communal life and American civic culture. To many, online communities appear to render obsolete not only the barriers of space and time, but also problems of exclusivity and prejudice. Yet others remain skeptical of the Internet's capacity to produce the types of communities necessary for building social capital. After reviewing and critiquing the dominant perspectives on evaluating the democratic efficacy of online communities, this dissertation suggests an alternative approach that draws from the conceptual distinctions made by Mark E.
    [Show full text]
  • Oscarssowhite & the Problem of Women Musicians on Film
    Cover: Pat O’Neill Untitled (shades) 1974 35 mm film mounted in glass, straight-grain Douglas fir wood frame 23 x 17 inches Table of Contents Anna Shechtman: Introduction Daphne Brooks: “Ain’t Got No, I Got Life”: #OscarsSoWhite & the Problem of Women Musicians on Film Jerome Christensen: Pure as Jesus and Cunning as Satan K. Austin Collins: Stakes Is High: On Spike Lee’s Chi-Raq J.D. Connor: Making Things Right: Star Wars Episode VII: The Force Awakens Derek Nystrom: Of Christians and Communists: Joel and Ethan Coen’s Hail, Caesar! — INTRODUCTION — Hollywood’s Self-Critique: Five Essays on Race and Class at the Movies Chris Rock’s monologue at this year’s Academy Awards — in which he called Hollywood “sorority racist” and the event itself the “White People’s Choice Awards” — was deceptively consistent with the industry’s own self-critique featured in many of this year’s top-grossing and critically acclaimed films. Hollywood, it seems, has learned to parry generic attacks on the industry’s sexism, racism, and classism with genre films that keep the system well oiled and, perhaps, the critics at bay. The five essays featured in this collection concern films that seek absolution for the industry’s consistently unsavory politics by addressing Hollywood’s politically incorrect history in their stories or backstories. Indeed, these are mostly historical films that depict racial protest and class warfare from the perspective of an industry that continually finds itself on the wrong side of American history when it comes to issues of race and class. Jerome Christensen writes about Trumbo, a biopic about Hollywood’s most successful blacklisted screenwriter, and a film whose producers nonetheless obfuscate its own shady production history.
    [Show full text]
  • An Archaeology of Digital Journalism
    ARCHVES MASSACHUSETTS INSTITUTE OF rECHNOLOLGY MAY 14 2015 The Missing Links: LIBRARIES An Archaeology of Digital Journalism by Liam Phalen Andrew B.A., Yale University (2008) Submitted to the Department of Comparative Media Studies/Writing in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2015 @ Liam Phalen Andrew, MMXV. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part in any medium now known or hereafter created. Signature redacted Author .......................................... Department of Comparative Media Studies/Writing Signature redactedM ay 8, 2015 Certified by........................................ William Uricchio Professor of Comparative Media Studies Thesis Supervisor Signature redacted Accepted by ................ Z-/ T.L. Taylor Director of Graduate Studies, Comparative Media Studies 2 The Missing Links: An Archaeology of Digital Journalism by Liam Phalen Andrew Submitted to the Department of Comparative Media Studies/Writing on May 8, 2015, in partial fulfillment of the requirements for the degree of Master of Science in Comparative Media Studies Abstract As the pace of publishing and the volume of content rapidly increase on the web, citizen journalism and data journalism have threatened the traditional role of institu- tional newsmaking. Legacy publishers, as well as digital-native outlets and aggrega- tors, are beginning to adapt to this new news landscape, in part by drawing newfound value from archival stories and reusing older works. However, this trend's potential remains limited by technical challenges and institutional inertia.
    [Show full text]
  • World Wide Web - Wikipedia, the Free Encyclopedia
    World Wide Web - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=World_Wide_Web&printabl... World Wide Web From Wikipedia, the free encyclopedia The World Wide Web , abbreviated as WWW and commonly known as The Web , is a system of interlinked hypertext documents contained on the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web. [1] He was later joined by Belgian computer scientist Robert Cailliau while both were working at CERN in Geneva, Switzerland. In 1990, they proposed using "HyperText [...] to link and access information of various kinds as a web of nodes in which the user can browse at will",[2] and released that web in December. [3] "The World-Wide Web (W3) was developed to be a pool of human knowledge, which would allow collaborators in remote sites to share their ideas and all aspects of a common project." [4] If two projects are independently created, rather than have a central figure make the changes, the two bodies of information could form into one cohesive piece of work. Contents 1 History 2 Function 2.1 What does W3 define? 2.2 Linking 2.3 Ajax updates 2.4 WWW prefix 3 Privacy 4 Security 5 Standards 6 Accessibility 7 Internationalization 8 Statistics 9 Speed issues 10 Caching 11 See also 12 Notes 13 References 14 External links History Main article: History of the World Wide Web In March 1989, Tim BernersLee wrote a proposal [5] that referenced ENQUIRE, a database and 1 of 13 2/7/2010 02:31 PM World Wide Web - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=World_Wide_Web&printabl..
    [Show full text]
  • “It Doesn't Have to Be This Way”: Hacker Perspectives on Privacy
    Hacker Perspectives on Privacy 29 “It Doesn’t Have to Be This Way”: Hacker Perspectives on Privacy Kevin Steinmetz & Jurg Gerber* We face a lot of troubling times ahead with regards to surveillance. Most of the power, for the moment at least, remains in our hands and in our minds, should we choose to use them. It is our acceptance of the elements of a surveillance state which will give it the most strength and solidify its presence for future generations. It doesn’t have to be this way. —Emmanuel Goldstein, “The Whole World’s Watching” (2008, 5) F A PERSON WERE TO ONLY CONSULT NEWS MEDIA, HE OR SHE WOULD GAIN THE impression that the world is constantly under threat of computer hackers eroding our technological infrastructure, national security, and—perhaps most Iimmediately frightening to many—our personal privacy. Much attention has been directed toward hackers recently, in light of the numerous controversies surrounding the escapades of hacker groups like Anonymous and the disbanded Lulz Security/ LulzSec (Olson 2012); concerns over consumer financial security, as demonstrated in the occasion of the recent breach of credit card data at Target (Newman 2013); and a plethora of other hacking occurrences.1 Perhaps now more than ever, hackers are perceived as a tremendous threat, particularly to personal privacy. Scholars have spent a great deal of time examining public perceptions to- wards hackers (Halbert 1997; Holt 2009; Skibell 2002; Thomas 2005). Hacking, however, is often shrouded in a veil of social construction, perhaps as a result of the fact that the public has “little direct contact with computer hackers,” which makes their image “particularly susceptible to shifts in public perception” (Skibel 2002, 343; Hollinger 1991; Taylor 1999).
    [Show full text]
  • Critical Perspectives on Open Development : Empirical Interrogation of Theory Construction
    This is a repository copy of Critical perspectives on open development : empirical interrogation of theory construction. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/173046/ Version: Published Version Book: Chib, A., Bentley, C.M. and Smith, M.L., eds. (2021) Critical perspectives on open development : empirical interrogation of theory construction. International Development Research Centre . MIT Press , Cambridge, MA . ISBN 9780262542326 Reuse This article is distributed under the terms of the Creative Commons Attribution (CC BY) licence. This licence allows you to distribute, remix, tweak, and build upon the work, even commercially, as long as you credit the authors for the original work. More information and the full terms of the licence here: https://creativecommons.org/licenses/ Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Critical Perspectives on Open Development The MIT Press— International Development Research Centre Series Open Development: Networked Innovations in International Development, edited by Matthew L. Smith and Katherine M. A. Reilly Public Access ICT across Cultures: Diversifying Participation in the Network Society, edited by Francisco J. Proenza Shadow Libraries: Access to Knowledge in Global Higher Education, edited by Joe Karaganis Digital Economies at Global Margins, edited by Mark Graham Making Open Development Inclusive: Lessons from IDRC Research, edited by Matthew L. Smith and Ruhiya Kristine Seward Critical Perspectives on Open Development Empirical Interrogation of Theory Construction Edited by Arul Chib, Caitlin M.
    [Show full text]
  • Linked Research on the Decentralised Web
    Linked Research on the Decentralised Web Dissertation zur Erlangung des Doktorgrades (Dr. rer. nat.) der Mathematisch-Naturwissenschaftlichen Fakultät der Rheinischen Friedrich-Wilhelms-Universität Bonn vorgelegt von Sarven Capadisli aus Istanbul, Turkey Bonn, 2019-07-29 Angefertigt mit Genehmigung der Mathematisch-Naturwissenschaftlichen Fakultät der Rheinischen Friedrich-Wilhelms-Universität Bonn 1. Gutachter: Prof. Dr. Sören Auer 2. Gutachter: Dr. Herbert Van de Sompel Tag der Promotion 2020-03-03 Erscheinungsjahr 2020 Abstract This thesis is about research communication in the context of the Web. I analyse literature which reveals how researchers are making use of Web technologies for knowledge dissemination, as well as how individuals are disempowered by the centralisation of certain systems, such as academic publishing platforms and social media. I share my findings on the feasibility of a decentralised and interoperable information space where researchers can control their identifiers whilst fulfilling the core functions of scientific communication: registration, awareness, certification, and archiving. The contemporary research communication paradigm operates under a diverse set of sociotechnical constraints, which influence how units of research information and personal data are created and exchanged. Economic forces and non-interoperable system designs mean that researcher identifiers and research contributions are largely shaped and controlled by third-party entities; participation requires the use of proprietary systems. From a technical standpoint, this thesis takes a deep look at semantic structure of research artifacts, and how they can be stored, linked and shared in a way that is controlled by individual researchers, or delegated to trusted parties. Further, I find that the ecosystem was lacking a technical Web standard able to fulfill the awareness function of research communication.
    [Show full text]
  • The Digital Deciders
    October 2018 The Digital Deciders How a group of often overlooked countries could hold the keys to the future of the global internet Robert Morgus, Jocelyn Woolbright, & Justin Sherman Last edited on October 22, 2018 at 9:24 a.m. EDT Acknowledgments We would like to thank Jason Healey, Trey Herr, Pavlina Ittleson, Adam Segal, and Ian Wallace for their thoughtful comments on earlier drafts, as well as all those who participated in our research survey. In addition, we owe a special debt of gratitude to Loren Risenfeld, Ellie Budzinski, and Maria Elkin, without whom’s help the data we collected would be far less useful. Finally, Tim Maurer, now of Carnegie Endowment for International Peace, was instrumental in the formulation of the ideas behind this report. This paper was produced as part of the Florida International University - New America Cybersecurity Capacity Building Partnership (C2B Partnership). newamerica.org/cybersecurity-initiative/reports/digital-deciders/ 2 About the Author(s) and local level, within the U.S. government and industry, and internationally. Robert Morgus is a senior policy analyst with New America’s Cybersecurity Initiative and International Security program and the deputy director of the FIU- New America C2B Partnership. Jocelyn Woolbright was an intern with New America’s Cybersecurity Initiative and is a recent graduate of Florida International University. Justin Sherman was an intern with New America’s Cybersecurity Initiative and a student at Duke University. About New America We are dedicated to renewing America by continuing the quest to realize our nation’s highest ideals, honestly confronting the challenges caused by rapid technological and social change, and seizing the opportunities those changes create.
    [Show full text]