Your Search Results

      • Trusted Partner
        Humanities & Social Sciences
        May 2020

        Constructing cybersecurity

        Power, expertise and the internet security industry

        by Andrew Whiting

      • Trusted Partner
        Computing & IT
        March 2024

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter (now X) used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media channels were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        February 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        February 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Trusted Partner
        Computing & IT
        January 2021

        Digital contention in a divided society

        Social media, parades and protests in Northern Ireland

        by Paul Reilly

        How are platforms such as Facebook and Twitter used by citizens to frame contentious parades and protests in 'post-conflict' Northern Ireland? What do these contentious episodes tell us about the potential of information and communication technologies to promote positive intergroup contact in the deeply divided society? These issues are addressed in what is the first in-depth qualitative exploration of how social media were used during the union flag protests (December 2012-March 2013) and the Ardoyne parade disputes (July 2014 and 2015). The book focuses on the extent to which affective publics, mobilised and connected via expressions of solidarity on social media, appear to escalate or de-escalate sectarian tensions caused by these hybrid media events. It also explores whether citizen activity on these online platforms has the potential to contribute to peacebuilding in Northern Ireland.

      • Computing & IT
        January 2014

        The Audacity to Spy

        How Government, Business, and Hackers Rob Us of Privacy

        by Catherine Nolan and Ashley M. Wilson, JD

        Ever get the feeling you're being watched? The thieves that steal identities are using cutting-edge, high-tech tools that can take one fact from a social media site, another from an online travel survey, a third from a purchase made via the internet and even access highly confidential medical records. Little by little they piece together your buying habits, your religious and school affiliations, the names of your family and pets, your political views, your driving habits, the places you have vacationed, and much, much more.   This is not science fiction and this is not the future, this is what is happening to each and every one of us now - today. And although the vast majority of adults say they are concerned about providing personal information online, nearly 1/3 say they have never used a privacy setting on their computer, never inquired about the charities to whom they donate their money, never worried about someone accessing their medical information and never thought twice about giving a financial institution their social security number over the internet.   The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother who is an experienced Information Analyst, reveals the ways in which your identity and personal data have been stolen by various sources. Yes, you should be concerned about the NSA and other government agencies having your phone logs and emails; but you should worry more about the insidious data brokers that are collecting information about you every time you log on to your laptop, use your cell phone, access an app, or use your GPS. Companies are collecting a variety of data about you, combining it with location information, and using it to both personalize their own services and to sell to other advertisers for behavioral marketing. Law enforcement agencies are tracking your car and insurance companies are installing devices to monitor your driving. Clerks are making copies of your credit cards. And if that wasn't enough, the FBI has reported that hackers have been discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users's valuable personal and financial information.   More than warning you about the ways your data can be stolen, at the end of each chapter are suggestions for limiting the amount of personal data that is available to be seized and divulged. Can you completely cut off the flow of information about yourself? The answer is no, not completely - there is already too much data out there and increasingly sophisticated ways to obtain bits and pieces. But knowing how it is collected, and by whom, gives you the power to control sensitive information and determine how much of your life you wish to expose to those more than willing to exploit it.

      • Computing & IT
        January 2014

        Non-Invasive Data Governance

        The Path of Least Resistance and Greatest Success

        by Robert S. Seiner

        Data-governance programs focus on authority and accountability for the management of data as a valued organizational asset. Data Governance should not be about command-and-control, yet at times could become invasive or threatening to the work, people and culture of an organization. Non-Invasive Data Governance™ focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources. Non-Invasive Data Governance will provide you with a complete set of tools to help you deliver a successful data governance program.   Learn how: Steward responsibilities can be identified and recognized, formalized, and engaged according to their existing responsibility rather than being assigned or handed to people as more work. Governance of information can be applied to existing policies, standard operating procedures, practices, and methodologies, rather than being introduced or emphasized as new processes or methods. Governance of information can support all data integration, risk management, business intelligence and master data management activities rather than imposing inconsistent rigor to these initiatives. A practical and non-threatening approach can be applied to governing information and promoting stewardship of data as a cross-organization asset. Best practices and key concepts of this non-threatening approach can be communicated effectively to leverage strengths and address opportunities to improve.

      • Computing & IT
        February 2008

        fruITion

        Creating the Ultimate Corporate Strategy for Information Technology

        by Chris Potts

        Ian is a Chief Information Officer (CIO) who is about to go on a journey of change - whether he likes it or not.  He will be expected to explore, challenge and radically recast the complex, often hostile relationships that can exist between a business and the people in its Information Technology (IT) department.  On the way, Ian, his Chief Executive Officer, Chief Financial Officer and other key stakeholders, experience a transformation in how a business needs to think about the value of its IT people and the work that they do. This results in some truly groundbreaking innovations in the scope and contribution of Ian's role as CIO, the people that work for him and the strategy that he leads. Watch the characters in this extraordinary business novel as they meet the challenge, struggle and grow. Share in Ian's transformation, and join the author in observing key messages as the adventure unfolds. Part entertaining novel and part enlightening textbook - FruITion takes the reader through a discovery process revealing indispensable messages about the next generation of strategies for Information Technology. - Jeremy Hall, Managing Director, IRM UK Strategic IT Training FruITion brings vividly to life the issues of being a CIO in today's corporate world and how IT, when properly integrated into the objectives of a business can drive massive value creation. His insights into how to win the engagement war and bring technology strategies alive for the non technical are absolutely spot on. - Steve Adams, COO and Managing Director for Card Services, Euronet Worldwide The modern CIO is to be seen as part of the business rather than a service provider to the business. Chris Potts is at the forefront of thinking that will put us all there if we act on his inspiration. - David Brown, CIO of Scottish WaterMore from the author, Chris PottsThe debate over the CIO role, and about the extent to which it should be about business or technology, is taking place in an increasing vacuum of strategic context.  Some CIOs have abandoned strategy altogether, while others persevere with a traditional IT Strategy founded in the mindset of the mainframe era.  Meanwhile, business managers and staff continue to develop their knowledge of technology and understanding of how to exploit it.  There seems to be a presumption that the next-generation strategic purpose of the CIO will be an incremental step on from what has gone before - significant, maybe, but still incremental.  What if the CIO's new strategic context is not incremental but disruptive, requiring a very different mindset and skillset?  And, most crucially, what if the corporate strategists - rather than the CIO community - are the ones deciding what context is?   Their offer to the CIO:  you can become one of the corporate strategists like us, but not with your traditional scope and approach to strategy.  What does that offer look like and what does it mean for incumbent CIOs and the people who work for them? Chris Potts works with executives and CIOs in industry-leading companies around the world, formulating and executing the new generation of corporate strategies for exploiting IT. He delivers public seminars that are founded on his own breakthrough work with clients, and has provided training to some of the worlds leading consultancies.

      • Ethical & social aspects of computing

        SLOW COMPUTING

        Why We Need Balanced Digital Lives

        by Rob Kitchin, Alistair Fraser

        Digital technologies should be making life easier. And to a large degree they are, transforming everyday tasks of work, consumption, communication, travel and play. But they are also accelerating and fragmenting our lives affecting our well-being and exposing us to extensive data extraction and profiling that helps determine our life chances. Initially, the COVID-19 pandemic lockdown seemed to create new opportunities for people to practice ‘slow computing’, but it quickly became clear that it was as difficult, if not more so, than during normal times. Is it then possible to experience the joy and benefits of computing, but to do so in a way that asserts individual and collective autonomy over our time and data? Drawing on the ideas of the ‘slow movement’, Slow Computing sets out numerous practical and political means to take back control and counter the more pernicious effects of living digital lives.

      • Computing & IT
        January 2014

        Data Resource Data

        A Comprehensive Data Resource Understanding

        by Michael Brackett

        "Are you struggling to gain a thorough understanding of your organization's data resource? Are you finding that your data resource has become quite disparate through lack of understanding? Are you having difficulty developing meaningful meta-data about your data resource, or understanding the meta-data that have been developed? Do you agonize over finding a way to document your data resource that is thorough, understandable, and readily available? If the answer to any of these questions is Yes, then you need to read Data Resource Data to help you understand your organization's data resource.   Most public and private sector organizations do not have a formal process for thoroughly documenting the entire data resource at their disposal, in any meaningful manner, that is readily available to everyone in the organization. Most do not even have a formal design for that documentation. The much abused, misused, misspelled, undefined, and incomplete meta-data are not providing a denotative understanding of the organization's data resource, without which a high quality data resource cannot be developed.   Data Resource Data provides the complete detailed data resource model for understanding and managing data as a critical resource of the organization. The model presents formal data resource data as a replacement for the relatively ineffective meta-data. It provides an excellent example of a formal data resource model, compared to a traditional data model, that can be easily implemented by any organization. The use of data resource data ensures a thorough understanding of an organization's data resource and the development of a high quality comparate data resource.   Like Data Resource Simplexity, Data Resource Integration, and Data Resource Design, Michael Brackett draws on five decades of data management experience, in a wide variety of different public and private sector organizations, to understand and document an organization's data resource. He leverages theories, concepts, principles, and techniques from many different and varied disciplines, such as human dynamics, mathematics, physics, chemistry, philosophy, and biology, and applies them to the process of formally documenting an organization's data resource.

      • Computing & IT
        August 2014

        Data Resource Data

        A Comprehensive Data Resource Understanding

        by Michael Brackett

        Are you struggling to gain a thorough understanding of your organization's data resource? Are you finding that your data resource has become quite disparate through lack of understanding? Are you having difficulty developing meaningful meta-data about your data resource, or understanding the meta-data that have been developed? Do you agonize over finding a way to document your data resource that is thorough, understandable, and readily available? If the answer to any of these questions is Yes, then you need to read Data Resource Data to help you understand your organization's data resource.Most public and private sector organizations do not have a formal process for thoroughly documenting the entire data resource at their disposal, in any meaningful manner, that is readily available to everyone in the organization. Most do not even have a formal design for that documentation. The much abused, misused, misspelled, undefined, and incomplete meta-data are not providing a denotative understanding of the organization's data resource, without which a high quality data resource cannot be developed.Data Resource Data provides the complete detailed data resource model for understanding and managing data as a critical resource of the organization. The model presents formal data resource data as a replacement for the relatively ineffective meta-data. It provides an excellent example of a formal data resource model, compared to a traditional data model, that can be easily implemented by any organization. The use of data resource data ensures a thorough understanding of an organization's data resource and the development of a high quality comparate data resource.Like Data Resource Simplexity, Data Resource Integration, and Data Resource Design, Michael Brackett draws on five decades of data management experience, in a wide variety of different public and private sector organizations, to understand and document an organization's data resource. He leverages theories, concepts, principles, and techniques from many different and varied disciplines, such as human dynamics, mathematics, physics, chemistry, philosophy, and biology, and applies them to the process of formally documenting an organization's data resource.

      • Computing & IT
        September 2014

        Non-Invasive Data Governance

        The Path of Least Resistance and Greatest Success

        by Robert S. Seiner

        Data-governance programs focus on authority and accountability for the management of data as a valued organizational asset. Data Governance should not be about command-and-control, yet at times could become invasive or threatening to the work, people and culture of an organization. Non-Invasive Data Governance™ focuses on formalizing existing accountability for the management of data and improving formal communications, protection, and quality efforts through effective stewarding of data resources.Non-Invasive Data Governance will provide you with a complete set of tools to help you deliver a successful data governance program. Learn how:Steward responsibilities can be identified and recognized, formalized, and engaged according to their existing responsibility rather than being assigned or handed to people as more work.Governance of information can be applied to existing policies, standard operating procedures, practices, and methodologies, rather than being introduced or emphasized as new processes or methods.Governance of information can support all data integration, risk management, business intelligence and master data management activities rather than imposing inconsistent rigor to these initiatives.A practical and non-threatening approach can be applied to governing information and promoting stewardship of data as a cross-organization asset.Best practices and key concepts of this non-threatening approach can be communicated effectively to leverage strengths and address opportunities to improve.

      • Computing: general
        January 1985

        Information Technologies and Social Transformation

        by National Academy of Engineering; Bruce R. Guile, editor

        This collection of papers by scholars of technology and society, based on a National Academy of Engineering symposium, explores the process of mutual adjustment between information technologies and social institutions. The topics addressed include recent developments and likely futures in information technology, comparison of information technology to historical developments in other technologies, and the interaction of information technology with businesses, homes, property rights in information, and various hierarchies of social organization.

      • Computing: general
        January 1994

        Information Technology in the Service Society

        A Twenty-First Century Lever

        by Committee to Study the Impact of Information Technology on the Performance of Service Activities, National Research Council

        Information technology has been touted as a boon for productivity, but measuring the benefits has been difficult. This volume examines what macroeconomic data do and do not show about the impact of information technology on service-sector productivity. This book assesses the ways in which different service firms have selected and implemented information technology, examining the impact of different management actions and styles on the perceived benefits of information technology in services.

      • Computing: general
        June 2015

        A Review of the Next Generation Air Transportation System

        Implications and Importance of System Architecture

        by David E. Liddle and Lynette I. Millett, Editors; Committee to Review the Enterprise Architecture, Software Development Approach, and Safety and Human Factor Design of the Next Generation Air Transportation System; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council

        The Next Generation Air Transportation System's (NextGen) goal is the transformation of the U.S. national airspace system through programs and initiatives that could make it possible to shorten routes, navigate better around weather, save time and fuel, reduce delays, and improve capabilities for monitoring and managing of aircraft. A Review of the Next Generation Air Transportation provides an overview of NextGen and examines the technical activities, including human-system design and testing, organizational design, and other safety and human factor aspects of the system, that will be necessary to successfully transition current and planned modernization programs to the future system. This report assesses technical, cost, and schedule risk for the software development that will be necessary to achieve the expected benefits from a highly automated air traffic management system and the implications for ongoing modernization projects. The recommendations of this report will help the Federal Aviation Administration anticipate and respond to the challenges of implementing NextGen.

      • Computing: general
        June 2015

        Interim Report on 21st Century Cyber-Physical Systems Education

        by Committee on 21st Century Cyber-Physical Systems Education; Computer Science and Telecommunications Board; Division on Engineering and Physical Sciences; National Research Council

        Cyber-physical systems (CPS) are increasingly relied on to provide the functionality and value to products, systems, and infrastructure in sectors including transportation, health care, manufacturing, and electrical power generation and distribution. CPS are smart, networked systems with embedded sensors, computer processors, and actuators that sense and interact with the physical world; support real-time, guaranteed performance; and are often found in critical applications. Cyber-physical systems have the potential to provide much richer functionality, including efficiency, flexibility, autonomy, and reliability, than systems that are loosely coupled, discrete, or manually operated, but also can create vulnerability related to security and reliability. Advances in CPS could yield systems that can communicate and respond faster than humans; enable better control and coordination of large-scale systems, such as the electrical grid or traffic controls; improve the efficiency of systems; and enable advances in many areas of science. As CPS become more pervasive, so too will demand for a workforce with the capacity and capability to design, develop, and maintain them. Building on its research program in CPS, the National Science Foundation (NSF) has begun to explore requirements for education and training. As part of that exploration, NSF asked the National Research Council of the National Academies to study the topic. Two workshops were convened in 2014, on April 30 and October 2-3 in Washington, D.C., to explore the knowledge and skills required for CPS work, education, and training requirements and possible approaches to retooling engineering and computer science programs and curricula to meet these needs. Interim Report on 21st Century Cyber-Physical Systems Education highlights emerging themes and summarizes related discussions from the workshops.

      • Computing: general
        December 2015

        Review of Three Divisions of the Information Technology Laboratory at the National Institute of Standards and Technology

        Fiscal Year 2015

        by Panel on Review of the Information Technology Laboratory at the National Institute of Standards and Technology; Committee on NIST Technical Programs; Laboratory Assessments Board; Division on Engineering and Physical Sciences; National Academies of Sciences, Engineering, and Medicine

        At the request of the National Institute of Standards and Technology (NIST), the National Academies of Sciences, Engineering, and Medicine has, since 1959, annually assembled panels of experts from academia, industry, medicine, and other scientific and engineering environments to assess the quality and effectiveness of the NIST measurements and standards laboratories, of which there are now seven, as well as the adequacy of the laboratories' resources. Review of Three Divisions of the Information Technology Laboratory at the National Institute of Standards and Technology: Fiscal Year 2015 assesses the organization's technical programs, the portfolio of scientific expertise within the organization, the adequacy of the organization's facilities, equipment, and human resources, and the effectiveness by which the organization disseminates its program outputs.

      • Computing: general
        March 2009

        Assessing the Impacts of Changes in the Information Technology R&D Ecosystem

        Retaining Leadership in an Increasingly Global Environment

        by Committee on Assessing the Impacts of Changes in the Information Technology R & D Ecosystem: Retaining Leadership in an Increasingly Global Environment; National Research Council

        The U.S. information technology (IT) research and development (R&D) ecosystem was the envy of the world in 1995. However, this position of leadership is not a birthright, and it is now under pressure. In recent years, the rapid globalization of markets, labor pools, and capital flows have encouraged many strong national competitors. During the same period, national policies have not sufficiently buttressed the ecosystem, or have generated side effects that have reduced its effectiveness. As a result, the U.S. position in IT leadership today has materially eroded compared with that of prior decades, and the nation risks ceding IT leadership to other nations within a generation. Assessing the Impacts of Changes in the Information Technology R&D Ecosystem calls for a recommitment to providing the resources needed to fuel U.S. IT innovation, to removing important roadblocks that reduce the ecosystem's effectiveness in generating innovation and the fruits of innovation, and to becoming a lead innovator and user of IT. The book examines these issues and makes recommendations to strengthen the U.S. IT R&D ecosystem.

      Subscribe to our

      newsletter