Mental Health and Title IX: Challenging Privacy and Transparency
In: Information Matters, Band 2, Heft 5
19 Ergebnisse
Sortierung:
In: Information Matters, Band 2, Heft 5
SSRN
In: Journal of information policy: JIP, Band 4, S. 44-66
ISSN: 2158-3897
Abstract
Better access to government information about publicly-funded research has benefits for many groups of users including scholars, policymakers, and the general public. But can prevailing open access models for this type of documentation be extended to information related to national security and international relations? What factors affect open access to security-related information, and how can the public's right to know be balanced against legitimate security concerns? This article proposes a way forward, drawing on experiences with current open access models in publicly-funded biomedical research.
In: Journal of information policy: JIP, Band 4, Heft 1, S. 44-66
ISSN: 2158-3897
AbstractBetter access to government information about publicly-funded research has benefits for many groups of users including scholars, policymakers, and the general public. But can prevailing open access models for this type of documentation be extended to information related to national security and international relations? What factors affect open access to security-related information, and how can the public's right to know be balanced against legitimate security concerns? This article proposes a way forward, drawing on experiences with current open access models in publicly-funded biomedical research.
Introduction -- What is online trolling? -- What motivates online trolling and its perpetrators? -- Online enabling factors for trolling and deviant behaviors -- All trolling is not equal -- Gender and online trolling -- Trolling in context -- Culture and online trolling -- Responding to online trolls -- Conclusions
SSRN
Working paper
In: Synthesis Lectures on Information Concepts, Retrieval, and Services Ser.
Research on multiculturalism and information and communication technology (ICT) has been important to understanding recent history, planning for future large-scale initiatives, and understanding unrealized expectations for social and technological change. This interdisciplinary area of research has examined interactions between ICT and culture at the group and society levels. However, there is debate within the literature as to the nature of the relationship between culture and technology. In this synthesis, we suggest that the tensions result from the competing ideologies that drive researchers, allowing us to conceptualize the relationship between culture and ICT under three primary models, each with its own assumptions: 1) Social informatics, 2) Social determinism, and 3) Technological determinism. Social informatics views the relationship to be one of sociotechnical interaction, in which culture and ICTs affect each other mutually and iteratively, rather than linearly; the vast majority of the literature approach the relationships between ICT and culture under the assumptions of social informatics. From a socially deterministic perspective, ICTs are viewed as the dependent variable in the equation, whereas, from a technologically deterministic perspective, ICTs are an independent variable. The issues of multiculturalism and ICTs attracted much scholarly attention and have been explored under a myriad of contexts, with substantial literature on global development, social and political issues, business and public administration as well as education and scholarly collaboration. We synthesize here research in the areas of global development, social and political issues, and business collaboration. Finally we conclude by proposing under-explored areas for future research directions.
In: GOVERNING PRIVACY AS COMMONS, M. Sanfilippo, K.J. Strandburg and B.M. Frischmann, eds; Cambridge University Press, 2020 Forthcoming)
SSRN
In: Preprint of article published by Taylor & Francis in Information, Communication and Society, Sept. 26, 2019
SSRN
SSRN
In: Journal of information policy: JIP, Band 8, S. 116-166
ISSN: 2158-3897
Abstract
Conceptualizing privacy as information flow rules-in-use constructed within a commons governance arrangement, we adapt the Governing Knowledge Commons (GKC) framework to study the formal and informal governance of information flows. We incorporate Helen Nissenbaum's "privacy as contextual integrity" approach, defining privacy in terms of contextually appropriate flows of personal information. While Nissenbaum's framework treats contextual norms as largely exogenous and emphasizes their normative valence, the GKC framework provides a systematic method to excavate personal information rules-in-use that actually apply in specific situations and interrogate governance mechanisms that shape rules-in-use. The GKC framework thus directs attention beyond information transmission principles to a broader spectrum of rules-in-use for personal information and supports consideration of procedural legitimacy. After discussing how the GKC framework can enrich privacy research, we explore empirical evidence for contextual integrity as governance within the GKC framework through meta-analysis of previous knowledge commons case studies, revealing three governance patterns within the observed rules-in-use for personal information flow. Though constrained by existing literature, our theoretical analysis provides strong justification for a new research agenda using the GKC framework to explore privacy as governance. We conclude by discussing potential implications for policy-makers of viewing privacy through an information governance lens.
In: Journal of information policy: JIP, Band 8, Heft 1, S. 116-166
ISSN: 2158-3897
AbstractConceptualizing privacy as information flow rules-in-use constructed within a commons governance arrangement, we adapt the Governing Knowledge Commons (GKC) framework to study the formal and informal governance of information flows. We incorporate Helen Nissenbaum's "privacy as contextual integrity" approach, defining privacy in terms of contextually appropriate flows of personal information. While Nissenbaum's framework treats contextual norms as largely exogenous and emphasizes their normative valence, the GKC framework provides a systematic method to excavate personal information rules-in-use that actually apply in specific situations and interrogate governance mechanisms that shape rules-in-use. The GKC framework thus directs attention beyond information transmission principles to a broader spectrum of rules-in-use for personal information and supports consideration of procedural legitimacy. After discussing how the GKC framework can enrich privacy research, we explore empirical evidence for contextual integrity as governance within the GKC framework through meta-analysis of previous knowledge commons case studies, revealing three governance patterns within the observed rules-in-use for personal information flow. Though constrained by existing literature, our theoretical analysis provides strong justification for a new research agenda using the GKC framework to explore privacy as governance. We conclude by discussing potential implications for policy-makers of viewing privacy through an information governance lens.
In: Synthesis lectures on information concepts, retrieval, and services #46
The study of people, information, and communication technologies and the contexts in which these technologies are designed, implemented, and used has long interested scholars in a wide range of disciplines, including the social study of computing, science and technology studies, the sociology of technology, and management information systems. As ICT use has spread from organizations into the larger world, these devices have become routine information appliances in our social lives, researchers have begun to ask deeper and more profound questions about how our lives have become bound up with technologies. A common theme running through this research is that the relationships among people, technology, and context are dynamic, complex, and critically important to understand. This book explores social informatics (SI), one important and dynamic approach that researchers have used to study these complex relationships. SI is "the interdisciplinary study of the design, uses and consequences of information technology that takes into account their interaction with institutional and cultural contexts" (Kling 1998, p. 52; 1999). SI provides flexible frameworks to explore complex and dynamic socio-technical interactions. As a domain of study related largely by common vocabulary and conclusions, SI critically examines common conceptions of and expectations for technology, by providing contextual evidence
In: The information society: an international journal, Band 34, Heft 1, S. 27-39
ISSN: 1087-6537
Trolling behaviors are extremely diverse, varying \ by context, tactics, motivations, and impact. \ Definitions, perceptions of, and reactions to online \ trolling behaviors vary. Since not all trolling is equal \ or deviant, managing these behaviors requires context \ sensitive strategies. This paper describes appropriate \ responses to various acts of trolling in context, based \ on perceptions of college students in North America. In \ addition to strategies for dealing with deviant trolling, \ this paper illustrates the complexity of dealing with \ socially and politically motivated trolling.
BASE
In: 8 JOURNAL OF INFORMATION POLICY 116 (2018)
SSRN