Results 1 - 10
of
167
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
, following an old tradition in human ecology. I would like to use for conceptualizing technology as a layer of the social structure, the Tourainian concept of 'mode of development' (also consistent with Bell's analytical framework), that I will de ne, in my own terms, as: &apos
Indicators for Social and Economic Coping Capacity - Moving Toward a Working Definition of Adaptive Capacity”, Wesleyan-CMU Working Paper.
, 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract
-
Cited by 109 (14 self)
- Add to MetaCart
could actually turn on personal stature and not necessarily social usefulness. Determinant #3 speaks to institutional requirements for each adaptation option and the decisionmaking frameworks with which they will be evaluated. Both need to be considered, and both can be evaluated independently
Digital library adoption and the technology acceptance model: A cross-country analysis
- The Electronic Journal on Information Systems in Developing Countries
, 2010
"... In this article, we examine, through the framework of the Technology Acceptance Model (TAM), some of the features that inform user acceptance of a digital library system implementation at agricultural universities in two developing countries: Kenya and Peru. This is a study not only examining factor ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
In this article, we examine, through the framework of the Technology Acceptance Model (TAM), some of the features that inform user acceptance of a digital library system implementation at agricultural universities in two developing countries: Kenya and Peru. This is a study not only examining
Digital Trust: An Analysis of Trust in the Adoption of Digital Support Services
"... Adoption of digital support services is mediated by varying experiences of trust. This paper deconstructs the notion of trust in technology through a design-led research project on the long-term adoption of a telehealth service -a context at once complex and fragile. The investigated daily experien ..."
Abstract
- Add to MetaCart
trust means in developing digital support services more generally, and how appreciating the fragility of trust can bring both risk and hope in uncertain and evolving worlds. DECONSTRUCTING TRUST Digital technology is ubiquitous. Daily rituals of the most mundane kind are enacted through smartphones
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
"... The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching for sustainable solutions to reduce the digital gap in order to leverage their investments in information and communication ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and communication technologies (ICT) toward the attainment of greater economic and social benefits and increased global competitiveness. Research has shown that the earlier focus on this phenomenon targeted physical access and diffusion of ICT as an indicator of digital readiness to reap ICT benefits. However
Active Mask Framework for Segmentation of Fluorescence Microscope Images
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract
- Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly
Nanyang Technological
"... We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: writes involve expen-sive erase operations and as a result are usually much slower than reads. Therefore, we address this as ..."
Abstract
- Add to MetaCart
We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: writes involve expen-sive erase operations and as a result are usually much slower than reads. Therefore, we address this asymmetry in FD-Buffer. Specifically, we use the average I/O cost per page access as op-posed to the traditional miss rate as the performance metric for a buffer. We develop a new replacement policy in which we sepa-rate clean and dirty pages into two pools. The size ratio of the two pools is automatically adapted according to the read-write asymme-try and the runtime workload. We evaluate FD-Buffer with trace-driven simulations as well as experiments on real flash disks. Our evaluation results show that our algorithm achieves up to 40 % less I/O cost in simulation and up to 33 % improvement on the over-all performance on commodity flash disks, in comparison with the state-of-the-art flash-aware replacement policy. 1.
APractical Lattice-based Digital Signature Schemes
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract
- Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case
THE IMPACT OF SOCIAL ISSUES ON INTERNET POLICY MAKING
"... The advantages that Internet as a new technology offers to business and individuals can’t be fully exploited without taking under consideration a number of social issues that related with its use. Its global nature makes Internet policy making a challenging task, creating new responsibilities for po ..."
Abstract
- Add to MetaCart
for policy makers world-wide. Apart from the technical (e.g. security, network availability, speed) and regulatory (e.g. legal frameworks and standardization) challenges that need to be tackled there are a number of social concerns that require special concern. It is important for policy makers to see
pp. 69–88 L2 IDENTITY, DISCOURSE, AND SOCIAL NETWORKING IN RUSSIAN
"... As the integration of Internet-based social networking tools becomes increasingly popular in foreign language classrooms, the use of modern communication technologies is particularly critical in the context of less commonly taught languages (LCTLs), where student exposure to the target language and ..."
Abstract
- Add to MetaCart
As the integration of Internet-based social networking tools becomes increasingly popular in foreign language classrooms, the use of modern communication technologies is particularly critical in the context of less commonly taught languages (LCTLs), where student exposure to the target language
Results 1 - 10
of
167