Abstract Better access to government information about publicly-funded research has benefits for many groups of users including scholars, policymakers, and the general public. But can prevailing open access models for this type of documentation be extended to information related to national security and international relations? What factors affect open access to security-related information, and how can the public's right to know be balanced against legitimate security concerns? This article proposes a way forward, drawing on experiences with current open access models in publicly-funded biomedical research.
AbstractBetter access to government information about publicly-funded research has benefits for many groups of users including scholars, policymakers, and the general public. But can prevailing open access models for this type of documentation be extended to information related to national security and international relations? What factors affect open access to security-related information, and how can the public's right to know be balanced against legitimate security concerns? This article proposes a way forward, drawing on experiences with current open access models in publicly-funded biomedical research.
Introduction -- What is online trolling? -- What motivates online trolling and its perpetrators? -- Online enabling factors for trolling and deviant behaviors -- All trolling is not equal -- Gender and online trolling -- Trolling in context -- Culture and online trolling -- Responding to online trolls -- Conclusions
Research on multiculturalism and information and communication technology (ICT) has been important to understanding recent history, planning for future large-scale initiatives, and understanding unrealized expectations for social and technological change. This interdisciplinary area of research has examined interactions between ICT and culture at the group and society levels. However, there is debate within the literature as to the nature of the relationship between culture and technology. In this synthesis, we suggest that the tensions result from the competing ideologies that drive researchers, allowing us to conceptualize the relationship between culture and ICT under three primary models, each with its own assumptions: 1) Social informatics, 2) Social determinism, and 3) Technological determinism. Social informatics views the relationship to be one of sociotechnical interaction, in which culture and ICTs affect each other mutually and iteratively, rather than linearly; the vast majority of the literature approach the relationships between ICT and culture under the assumptions of social informatics. From a socially deterministic perspective, ICTs are viewed as the dependent variable in the equation, whereas, from a technologically deterministic perspective, ICTs are an independent variable. The issues of multiculturalism and ICTs attracted much scholarly attention and have been explored under a myriad of contexts, with substantial literature on global development, social and political issues, business and public administration as well as education and scholarly collaboration. We synthesize here research in the areas of global development, social and political issues, and business collaboration. Finally we conclude by proposing under-explored areas for future research directions.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Abstract Conceptualizing privacy as information flow rules-in-use constructed within a commons governance arrangement, we adapt the Governing Knowledge Commons (GKC) framework to study the formal and informal governance of information flows. We incorporate Helen Nissenbaum's "privacy as contextual integrity" approach, defining privacy in terms of contextually appropriate flows of personal information. While Nissenbaum's framework treats contextual norms as largely exogenous and emphasizes their normative valence, the GKC framework provides a systematic method to excavate personal information rules-in-use that actually apply in specific situations and interrogate governance mechanisms that shape rules-in-use. The GKC framework thus directs attention beyond information transmission principles to a broader spectrum of rules-in-use for personal information and supports consideration of procedural legitimacy. After discussing how the GKC framework can enrich privacy research, we explore empirical evidence for contextual integrity as governance within the GKC framework through meta-analysis of previous knowledge commons case studies, revealing three governance patterns within the observed rules-in-use for personal information flow. Though constrained by existing literature, our theoretical analysis provides strong justification for a new research agenda using the GKC framework to explore privacy as governance. We conclude by discussing potential implications for policy-makers of viewing privacy through an information governance lens.
AbstractConceptualizing privacy as information flow rules-in-use constructed within a commons governance arrangement, we adapt the Governing Knowledge Commons (GKC) framework to study the formal and informal governance of information flows. We incorporate Helen Nissenbaum's "privacy as contextual integrity" approach, defining privacy in terms of contextually appropriate flows of personal information. While Nissenbaum's framework treats contextual norms as largely exogenous and emphasizes their normative valence, the GKC framework provides a systematic method to excavate personal information rules-in-use that actually apply in specific situations and interrogate governance mechanisms that shape rules-in-use. The GKC framework thus directs attention beyond information transmission principles to a broader spectrum of rules-in-use for personal information and supports consideration of procedural legitimacy. After discussing how the GKC framework can enrich privacy research, we explore empirical evidence for contextual integrity as governance within the GKC framework through meta-analysis of previous knowledge commons case studies, revealing three governance patterns within the observed rules-in-use for personal information flow. Though constrained by existing literature, our theoretical analysis provides strong justification for a new research agenda using the GKC framework to explore privacy as governance. We conclude by discussing potential implications for policy-makers of viewing privacy through an information governance lens.
The study of people, information, and communication technologies and the contexts in which these technologies are designed, implemented, and used has long interested scholars in a wide range of disciplines, including the social study of computing, science and technology studies, the sociology of technology, and management information systems. As ICT use has spread from organizations into the larger world, these devices have become routine information appliances in our social lives, researchers have begun to ask deeper and more profound questions about how our lives have become bound up with technologies. A common theme running through this research is that the relationships among people, technology, and context are dynamic, complex, and critically important to understand. This book explores social informatics (SI), one important and dynamic approach that researchers have used to study these complex relationships. SI is "the interdisciplinary study of the design, uses and consequences of information technology that takes into account their interaction with institutional and cultural contexts" (Kling 1998, p. 52; 1999). SI provides flexible frameworks to explore complex and dynamic socio-technical interactions. As a domain of study related largely by common vocabulary and conclusions, SI critically examines common conceptions of and expectations for technology, by providing contextual evidence
Verfügbarkeit an Ihrem Standort wird überprüft
Dieses Buch ist auch in Ihrer Bibliothek verfügbar:
Trolling behaviors are extremely diverse, varying \ by context, tactics, motivations, and impact. \ Definitions, perceptions of, and reactions to online \ trolling behaviors vary. Since not all trolling is equal \ or deviant, managing these behaviors requires context \ sensitive strategies. This paper describes appropriate \ responses to various acts of trolling in context, based \ on perceptions of college students in North America. In \ addition to strategies for dealing with deviant trolling, \ this paper illustrates the complexity of dealing with \ socially and politically motivated trolling.
The rise of 'smart' - or technologically advanced - cities has been well documented, while governance of such technology has remained unresolved. Integrating surveillance, AI, automation, and smart tech within basic infrastructure as well as public and private services and spaces raises a complex set of ethical, economic, political, social, and technological questions. The Governing Knowledge Commons (GKC) framework provides a descriptive lens through which to structure case studies examining smart tech deployment and commons governance in different cities. This volume deepens our understanding of community governance institutions, the social dilemmas communities face, and the dynamic relationships between data, technology, and human lives. For students, professors, and practitioners of law and policy dealing with a wide variety of planning, design, and regulatory issues relating to cities, these case studies illustrate options to develop best practice. Available through Open Access, the volume provides detailed guidance for communities deploying smart tech
Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core