Publications

Publication date: 2011

Information is increasingly hailed as a tool to achieve good governance. This dissertation challenges claims that naturalize the relationship between information and good governance. I argue that such claims are based on the reification of information as a well-defined object with intrinsic value and have shifted focus away from the relations, materials and practices in which information is...

Publication date: 2011

This dissertation is concerned with two phenomena, race and computation, their emergence in modernity and their convergence today in our modern technological epoch. From the perspective of the traditional disciplines the concepts of race and computation are wholly incommensurable. Formally, race refers to a hierarchical taxonomic schema for classifying humans while computation refers to the...

Publication date: 2011

Many popular facets of live information, known collectively as communication technology, deliver ongoing, socially-relevant narrations of our world. Traditionally, different types of communication media were considered to be in competition, but recently they have been discovered to be complementary and synergistic. This paper will concentrate on the role, influence, and potential of the...

Publication date: 2011

The development and widespread use of Internet technologies and platforms that are grouped under the labels “Web 2.0” and “social media” have led to celebratory accounts of their potential as tools to unleash human creativity. A “creativity consensus” has emerged that describes a vision of creative production via these new platforms as universal, democratic, communal, non-commercial, and...

Publication date: 2011

Great By Choice

Why some companies thrive in uncertainty and others do not.

Based on nine years of research, buttressed by rigorous analysis and infused with engaging stories, Jim Collins and Morten Hansen enumerate the principles for building a truly great enterprise in unpredictable, tumultuous, and fast-moving times.

With a team of more than twenty researchers,...

Publication date: 2011

A succession of doctrines for enhancing cybersecurity has been advocated in the past, including prevention, risk management, and deterrence through accountability. None has proved effective. Proposals that are now being made view cybersecurity as a public good and adopt mechanisms inspired by those used for public health. This essay discusses the failings of previous doctrines and surveys the...

Publication date: 2011

While the turn from traditional regulation to more collaborative, experimentalist, and flexible forms of governance has garnered significant academic focus, far less attention has been paid to the effects of such “New Governance” approaches on regulated firms’ understanding of the laws’ demands, and on the structures employed within business organizations to meet them. This article targets...

Publication date: 2011

It's the second week of a six-week website redesign at a San Francisco design consultancy. The visiting researcher asks the senior interaction designer about his work. He responds, "Oh, I'm not doing any real work on the project anymore. I'm just showing up at client meetings and hand waving."

"Hand waving" is an apt name for what happens when designers meet with clients. To make...

Publication date: 2011
In low-income regions, mobile phone–based tools can improve the scope and efficiency of field health workers. They can also address challenges in monitoring and supervising a large number of geographically distributed health workers. Several tools have been built and deployed in the field, but little comparison has been done to help understand their effectiveness. This is largely because no...
Publication date: 2011
In this paper, I reflect on a specific product of interaction design, social networking sites. The goals of this paper are two-fold. One is to bring a feminist reflexivity, to HCI, drawing on the work of Judith Butler and her concepts of peformativity, citationality, and interpellation. Her approach is, I argue, highly relevant to issues of identity and self-representation on social networking...
Publication date: 2011

Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis.
Perhaps of even greater concern, the pace at which technology and threats change far outpaces the abilities of even the most...

Publication date: 2011

Through essays contributed by leading experts and scholars, Deviant Globalization argues that far from being marginal, illicit activities are a fundamental part of globalization. Narcotrafficking, human trafficking, the organ trade, computer malware, transnational gangs are just as much artifacts of globalization as are CNN and McDonald’s, free trade and capital mobility, accessible air travel...

Publication date: 2011

Among the first casebooks in the field, Software and Internet Law presents clear and incisive writing, milestone cases and legislation, and questions and problems that reflect the authors' extensive knowledge and classroom experience. Technical terms are defined in context to make the text accessible for students and professors with minimal background in technology, the software...

Publication date: 2011

Digital media and technology have become culturally and economically powerful parts of contemporary middle-class American childhoods. Immersed in various forms of digital media as well as mobile and Web-based technologies, young people today appear to develop knowledge and skills through participation in media. This MacArthur Report examines the ways in which afterschool programs, libraries,...

Publication date: 2011
Context enabled mobile applications are considered to provide a richer experience and to enhance the user interaction by acquiring information that allows the identification of the user’s current situation. Modern context inference infrastructures can source, process and deliver user information. However, a commercialization towards a context service has still been prohibited by the need for...
Publication date: 2010

In this paper I argue for an analytic approach that courts should employ when determining ownership of a tangible copy of a copyrighted work. Courts are surprisingly divided on this apparently simple question, as I will detail several distinct and conflicting approaches, sometimes adopted within the same Circuit.

I argue that a correct approach to determining copy ownership must be...

Publication date: 2010

Linked Data has become a popular term and method of how to expose structured data on the Web. There currently are two school of thought when it comes to defining what Linked Data actually is, with one school of thought defining it more narrowly as a set of principles describing of how to publish data based on Semantic Web technologies, whereas the...

Pages