首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this article, I argue that a key problem for understanding the social ramifications of software is an implicit separation of software programs into two separate elements: expressive aspects, which are seen as socially driven and affectual, and functional aspects, understood as scientific and rational. In order to overcome this binary, I develop an alternative framework that examines the ways software expresses best practices, correct behaviors, and social organization. A key element of this framework is an understanding of software programs as simultaneously rhetorical and tangible objects. Given that Western society is dependent on sociotechnical systems in which software plays a crucial role, understanding the complex ways software expresses normative tasks, practices, and social orders is increasingly important.  相似文献   

2.
《普罗米修斯》2012,30(3):239-250
Abstract

Are advances in ICTs enabling positive transformations in academic research practices? This paper explores key themes emerging from a 2008 survey of researchers aimed at identifying use and non‐use of advanced ICTs for research. Deterministic perspectives on e‐Research suggest that new e‐infrastructures will reshape research in predictable ways, such as by fostering more collaboration. In contrast, social shaping perspectives lead to the expectation that existing practices and institutions will shape the ways in which e‐Research is employed. This exploratory study found that individual variations across researchers cluster into identifiable groupings of research practices, which help to illuminate involvement in e‐Research, and differences in methods and research software used across the disciplines. In line with a social shaping perspective, the findings suggest that, in the social sciences, top‐down visions of e‐infrastructure development need to be tied to the realities of bottom‐up patterns of innovation in approaches to e‐Research.  相似文献   

3.

Within media theory the worldwide shift from a 19th-century print culture via a 20th-century electronic culture to a 21st-century digital culture is well documented. In this essay the emergence of a digital culture as amplified and accelerated by the popularity of networked computers, multiple-user software, and Internet is investigated in terms of its principal components. A digital culture as an underdetermined praxis is conceptualized as consisting of participation, remediation, and bricolage. Using the literature on presumably “typical” Internet phenomena such as the worldwide proliferation of independent media centers (indymedia) linked with (radical) online journalism practices and the popularity of (individual and group) weblogging, the various meanings and implications of this particular understanding of digital culture are explored. In the context of this essay, digital culture can be seen as an emerging set of values, practices, and expectations regarding the way people (should) act and interact within the contemporary network society. This digital culture has emergent properties with roots in both online and offline phenomena, with links to trends and developments predating the World Wide Web, yet having an immediate impact and particularly changing the ways in which we use and give meaning to living in an increasingly interconnected, always on(line) environment.  相似文献   

4.

The design and use of information technologies are not as easily separated as they may seem. Designers have much at stake in the use of their software, while users are greatly influenced by the design of the software that they use. In this article, I explore the complex relationships built up between the designers and users of human anatomy simulations, including processes of cooperation and conflict. I develop and apply a three-step process for studying the design and use of a software product in its social context. First, it is important to focus on the social worlds of designers and users that influence the development of the technology. Next, the emphasis shifts to the technology itself, which can be viewed as a boundary object emerging from the intersection of the contributing social worlds. Finally, the technology exhibits agency by reshaping the relationships and interactions among the contributing social worlds.  相似文献   

5.
《普罗米修斯》2012,30(4):345-361
Abstract

During the late 1990s, photography moved from being a primarily analogue medium to being an almost entirely digital medium. The development of digital cameras and software for working with photographs has led to the wholesale computerization of photography in many different domains. This paper reports on the findings of a study of the social and organizational changes experienced by marine mammal scientists who have changed from film‐based photography to digital photography. This technical change might be viewed as a simple substitution of a digital for an analogue camera, with little significance for how scientists do what they do. However, a perspective anchored in social informatics leads to the expectation that such incremental technical changes can have significant outcomes, changing not only how scientists work, but also the outcomes of their research. This present study finds that key consequences of this change have been the composition of the personnel working on the scientific research teams for marine biology projects and the ways in which these scientists allocate their time.  相似文献   

6.
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.  相似文献   

7.
Abstract

This article investigates how an account of hidden, internal properties of an everyday technology became a framework to interpret human action as a serious crime. Using a case study situated in the New York subway system, I examine the criminalization of a practice of New York’s poor known as “selling swipes” performed by so-called “swipers”. A high court came to classify the practice as felony forgery, interpreting it though an expert-witness account of how objects physically manipulated by swipers interact with a secretive, proprietary digital information system. Thousands of felony arrests – overwhelmingly of nonwhite men – have been legitimated under this theory, in which the crime occurs on a plane of technical interactions to which swipers have no access. Through close examination of the underlying technology (known as MetroCard), however, I show considerable problems in the authorities’ understanding of the technology, illustrating the hazards of interpreting human action through proprietary or complex systems, especially as they are represented solely through expert accounts. The case demonstrates fresh connections between technology and unequal outcomes in the U.S. criminal justice system, and suggests an emerging form of social vulnerability, to interpretations of our actions through the logic of technologies black-boxed to us.  相似文献   

8.
The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make clear the ethical aspects of producing potentially flawed software. This paper outlines some of the vulnerabilities associated with software systems and identifies a number of social and organisational factors affecting software developers and contributing to these vulnerabilities. Scott A. Snook’s theory of practical drift is used as the basis for our analysis. We show that this theory, originally developed to explain the failure of a military organisation, can be used to understand how professional software developers “drift away” from procedures and processes designed to ensure quality and prevent software vulnerability. Based on interviews with software developers in two Norwegian companies we identify two areas where social factors compel software developers to drift away from a global set of rules constituting software development processes and methods. Issues of pleasure and control and difference in mental models contribute to an uncoupling from established practices designed to guarantee the reliability of software and thus diminish its vulnerability.  相似文献   

9.
《普罗米修斯》2012,30(2):129-149
Abstract

There is wide agreement on the value of multidisciplinary social research related to information and communication technologies. This paper provides insights into the dynamics at play in these studies, drawing on an in‐depth analysis of exchanges among an international group of experts from many relevant disciplines who participated in a workshop on research into the social implications of emerging digital technologies. In addition to identifying some distinctive new challenges facing this field, the paper suggests how understanding ways to foster productive engagement in discussing and developing issues and joint work could lead to more useful multidisciplinary partnerships.  相似文献   

10.
Greater understanding of how interdisciplinary research and education evolves is critical for identifying and implementing appropriate programme management strategies. In this paper a programme evaluation framework is presented. It is based on social learning processes (individual learning, interdisciplinary research practices, and interaction between researchers with different backgrounds); social capital outcomes (ability to interact, interpersonal connectivity, and shared understanding); and knowledge and human capital outcomes (new knowledge that integrates multiple research fields). The framework is illustrated on an established case study doctoral programme. Data are collected via mixed qualitative/quantitative methods to reveal several interesting findings about how interdisciplinary research evolves and can be supported. Firstly, different aspects of individual learning seem to contribute to a researcher's ability to interact with researchers from other research fields and work collaboratively. These include learning new material from different research fields, learning how to learn new material and learning how to integrate different material. Secondly, shared interdisciplinary research practices can be identified that may be common to other programmes and support interaction and shared understanding between different researchers. They include clarification and questioning, harnessing differences and setting defensible research boundaries. Thirdly, intensive interaction between researchers from different backgrounds support connectivity between the researchers, further enabling collaborative work. The case study data suggest that social learning processes and social capital outcomes precede new interdisciplinary research findings and are therefore a critical aspect to consider in interdisciplinary programme management.  相似文献   

11.

This article provides a critical, cautionary stance toward the future structure of “Internet studies” as a field. A social constructionist reading of the process of organizing reveals the ways in which apparently obdurate structures are constructed and negotiated through everyday discursive practices. Subsequent structures and practices function ideologically to control organizational members in a concertive fashion by shaping and directing the conceptual frameworks for inquiry and action in a seemingly natural way. Definitions and metaphors construct conceptual boundaries of meaning for the field of inquiry, delimiting and protecting over time what counts as Internet and Internet studies. Over time, origins of knowledge are hidden within the structure of the organizations and a culture of unobtrusive control emerges. Unless radical measures are taken to reflexively interrogate everyday routines and habitual ways of talking in academic environments, the future field of Internet studies will not transcend the traditions of the academy but will be entrenched in and reproduce traditional structures and a traditional scholarly enterprise.  相似文献   

12.
Abstract

Over some seven decades, a rather mundane transition that in its thoroughness and consequences has gone largely unacknowledged, has taken place, namely the revolution in modern information systems (IS) that guide organizations in their actions. Today, it is fair to say that IS have come to rule the world. They do this literally, by the rules they embody, which dictate how much of everyday life, as it relates to individuals and organizations and the transactions they engage in, takes place around the globe. In essence, IS have become important social and economic infrastructure. Seeking an understanding of how this has come about, I review historical developments in IS, focusing in particular on accounting systems, enterprise systems, retail automation, and electronic commerce. I argue that it is transactions and their facilitation that lie at the heart of IS and its development as a field of practice. I reflect on why this has gone mostly overlooked as such. I consider where we have now arrived with transaction facilitation as infrastructure and its importance in the light of current issues. I suggest how future studies might contribute to our learning more about where we should want to be with our transaction facilitation infrastructure.  相似文献   

13.
Abstract

Although stigma is widely accepted to be a multidimensional construct, the implications of its dimensions for social support warrant greater consideration. We conducted a meta-analysis of 31 content analyses to investigate the association between specific dimensions of stigma and the types of social support messages shared in health-related contexts online. Among health conditions where character stigma was greater, information, network, and tangible support were more prevalent. Physical stigma was associated with a higher prevalence of esteem support. Information, emotional, network, and tangible support were more prevalent among health conditions where concealable stigma was greater. Among health conditions where visible stigma was greater, information, and esteem support were more prevalent. Our study contributes to stigma and social support research by providing evidence that health-related stigma has multiple dimensions each with distinct implications for social support. More broadly, this project offers a framework that can be used to examine the ways in which social meanings of health conditions may be translated into digital behavior.  相似文献   

14.
Participation is often used as a blanket term that is uncritically celebrated; this is particularly true in the case of youth digital participation. In this article, we propose a youth-focused analytical framework, applicable to a wide variety of youth digital participation projects, which can help facilitate a more nuanced understanding of these participatory practices. This framework analyzes the aims envisioned for youth participation, the actors and contexts of these activities, and the variable levels of participatory intensity, in order to more accurately assess the forms and outcomes of youth digital participation. We demonstrate the value of this framework by applying it to two contemporary cases of digital youth participation: an informal online community (Nerdfighters) and a formalized educational initiative (CyberPatriot). Such analyses facilitate normative assessments of youth digital participation, which enable us to better assess what participation is good for, and for whom.  相似文献   

15.
This conceptual paper focuses on misinformation in the context of asylum seekers. We conducted a literature review on the concept of misinformation, which showed that a more nuanced understanding of information and misinformation is needed. To understand and study different viewpoints when it comes to the perception of the accuracy of information, we introduce two new concepts: perceived misinformation and normative misinformation. The concepts are especially helpful when marginalised and vulnerable groups are studied, as these groups may perceive information differently compared to majority populations. Our literature review on the information practices of asylum seekers shows that asylum seekers come across different types of misinformation. These include official information that is inadequate or presented inadequately, outdated information, misinformation via gatekeepers and other mediators, information giving false hope or unrealistic expectations, rumours and distorted information. The diversity of misinformation in their lives shows that there is a need to understand information in general in a broad and more nuanced way. Based on this idea, we propose a Social Information Perception model (SIP), which shows that different social, cultural and historical aspects, as well as situation and context, are involved in the mental process which determines whether people perceive information as accurate information, misinformation or disinformation. The model, as well as the concepts of perceived and normative misinformation, are helpful when the information practices of marginalised and vulnerable groups are studied, giving a holistic view on their information situation. Understanding the information practices more holistically enables different actors to give trustworthy information in an understandable and culturally meaningful way to the asylum seekers.  相似文献   

16.

Three arguments are raised in this article with regard to the indices used to measure the digital divide. First, I criticize policymakers who rely on simplistic measures of the digital divide, at the expense of a thoughtful analysis of (1) the purpose of the tool, (2) the level of observation, and (3) the method of approaching the data. Second, I argue that networks and associated technologies are not neutral artifacts but are political and social spaces in their structure as well as in their content levels. Accordingly, we need to factor in the context as an important actor in conceptualizing and measuring the digital divide. Third, two general types of indices are used for the measurement of the digital divide(s): focused monotopical indices and comprehensive indices. Monotopical indices are more widely available, while comprehensive ones are rare. I argue that policymakers need to promote comprehensive indices over monotopical indices. Finally, I present a conceptual definition of the digital divide and a framework for developing a comprehensive index to measure it.  相似文献   

17.
18.

Using Layder's domain theory (1997) Layder, D. 1997. Modern social theory:Key debates and new directions, London: UCL Press.  [Google Scholar] as an analytical framework, this article shows how the information society can be measured through various levels of society. Layder's notions of psychobiography, situated activity, social setting, and contextual resources help identify cultural and social indicators for understanding changes in the information society. With the help of empirical indicators for each domain, this article uses the case of Estonia to show that there is often more to the information society than what is captured by traditional measures. This article calls for a context-sensitive approach, which takes into consideration social and cultural indicators. Measurements from all four domains are necessary for understanding the complexity of information-society-related issues.  相似文献   

19.
Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.  相似文献   

20.
We engage with recent applications of the Marxist “labor theory of value” to online prosumer practices, and offer an alternative framework for theorizing value creation in such practices. We argue that the labor theory of value is difficult to apply to online prosumer practices for two reasons. One, value creation in such practices is poorly related to time. Two, the realization of the value accumulated by social media companies generally occurs in financial markets, rather than in direct commodity exchange. In an alternative framework, we offer an understanding of value creation as based primarily on the capacity to initiate and sustain webs of affective relations, and value realization as linked to a reputation based financial economy. We argue that this model describes the process of value creation and appropriation in the context of online prosumer platforms better than an approach based on the Marxist labor theory of value. We also suggest that our approach can cast new light on value creation within informational capitalism in general.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号