Listing 1 - 10 of 585 | << page >> |
Sort by
|
Choose an application
New technologies, although developed with optimism, often fall short of their predicted potential and create new problems. Communications technologies are no different. Their utopian proponents claim that universal access to advanced communications technologies can help to feed the hungry, cure the sick, educate the illiterate, improve the global standard of living, and ultimately bring about world peace. The sobering reality is that while communications technologies have a role to play in making the world a better place, the impact of any specific technological advance is likely to be modest. The limitations of new technologies are often not inherent in the technologies themselves but the result of regulatory or economic constraints. While the capability may exist to deliver any information anywhere in the world, many people lack the money to pay for it, the equipment to access it, the skills to use it, or even the knowledge that it might be useful to them. This book examines the complex ways in which communication technologies and policies affect the people whose lives they are intended to improve. The areas of discussion include Internet regulation, electronic voting and petitioning, monopoly and competition in communications markets, the future of wireless communications, and the concept of universal service.
Telecommunication policy --- Information technology --- E-books --- INFORMATION SCIENCE/Technology & Policy
Choose an application
Onderwijs. --- Wetenschap. --- Sciences --- SCIENCE EDUCATION. --- SCIENCE AND TECHNOLOGY POLICY. --- Étude et enseignement
Choose an application
This handbook enumerates every aspect of incorporating moral and societal values into technology design, reflects the fact that the latter has moved on from strict functionality to become sensitive to moral and social values such as sustainability and accountability. Aimed at a broad readership that includes ethicists, policy makers and designers themselves, it proffers a detailed survey of how technological, and institutional, design must now reflect awareness of ethical factors such as sustainability, human well-being, privacy, democracy and justice, inclusivity, trust, accountability, and responsibility (both social and environmental). Edited by a trio of highly experienced academic philosophers with a specialized interest in the ethical dimensions of technology and human creativity, this syncretic handbook collates an array of published material and offers a studied, practical introduction to the field. The volume addresses myriad aspects at the intersection of technology design and ethics, enabling designers to adopt a constructive approach in anticipating, preventing, and resolving societal and ethical issues affecting their work. It covers underlying theory; discrete values such as democracy, human well-being, sustainability and justice; and application domains themselves, which include architecture, bio- and nanotechnology, and military hardware. As the first exhaustive survey of a field whose importance is characterized by almost exponential growth, it represents a compelling addition to a formerly atomized literature.
Philosophy. --- Design. --- Economic policy. --- Philosophy of Technology. --- Design, general. --- R & D/Technology Policy.
Choose an application
What are the global implications of the looming shortage of Internet addresses and the slow deployment of the new IPv6 protocol designed to solve this problem? This book looks at this question and much more.
Choose an application
Introducing the concept of 'knowledge alchemy' as the formulation of global standards through the use of indicators and algorithms, this book explores how knowledge alchemy increasingly informs national and institutional policies and practices on economic performance, higher education, research and innovation.
Choose an application
"Big data is ubiquitous but heterogeneous. Big data can be used to tally clicks and traffic on web pages, find patterns in stock trades, track consumer preferences, identify linguistic correlations in large corpuses of texts. This book examines big data not as an undifferentiated whole but contextually, investigating the varied challenges posed by big data for health, science, law, commerce, and politics. Taken together, the chapters reveal a complex set of problems, practices, and policies. The advent of big data methodologies has challenged the theory-driven approach to scientific knowledge in favor of a data-driven one. Social media platforms and self-tracking tools change the way we see ourselves and others. The collection of data by corporations and government threatens privacy while promoting transparency. Meanwhile, politicians, policy makers, and ethicists are ill-prepared to deal with big data's ramifications. The contributors look at big data's effect on individual as it exerts social control through monitoring, mining, and manipulation; big data and society, examining both its empowering and its constraining effects; big data and science, considering issues of data governance, provenance, reuse, and trust; and big data and organizations, discussing data responsibility, "data harm," and decision making." -- Provided by publisher.
Big data. --- INFORMATION SCIENCE/General --- INFORMATION SCIENCE/Technology & Policy --- Data sets, Large --- Large data sets --- Data sets
Choose an application
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, in the global refugee crisis.
Choose an application
In Civic Space/Cyberspace Redmond Kathleen Molz and Phyllis Dain assess the current condition and direction of the American public library. They consider the challenges and opportunities presented by new electronic technologies, changing public policy, fiscal realities, and cultural trends. They draw on site visits and interviews conducted across the country; extensive reading of reports, surveys, and other documents; and their long-standing interest in the library's place in the social and civic structure. The book uniquely combines a scholarly, humanistic, and historical approach to public libraries with a clear-eyed look at their problems and prospects, including their role in the emerging national information infrastructure.
Documentation and information --- United States --- Libraries --- Public libraries --- Special collections --- Computer network resources. --- Computer network protocols --- INFORMATION SCIENCE/Technology & Policy --- Documentation --- Public institutions --- Librarians --- United States of America
Choose an application
In making decisions, we often seek advice. Online, we check Amazon recommendations, eBay vendors' histories, TripAdvisor ratings, and even our elected representatives' voting records. These online reputation systems serve as filters for information overload. In this book, experts discuss the benefits and risks of such online tools. The contributors offer expert perspectives that range from philanthropy and open access to science and law, addressing reputation systems in theory and practice. Properly designed reputation systems, they argue, have the potential to create a "reputation society," reshaping society for the better by promoting accountability through the mediated judgments of billions of people. Effective design can also steer systems away from the pitfalls of online opinion sharing by motivating truth-telling, protecting personal privacy, and discouraging digital vigilantism.
Choose an application
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance -- the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage -- especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
Listing 1 - 10 of 585 | << page >> |
Sort by
|