Spelling suggestions: "subject:"forminformation technologocial aspects."" "subject:"forminformation technology.crucial aspects.""
1 |
The symbolic construction of online communityHutchinson, Ronelle January 2002 (has links)
Abstract not available
|
2 |
Receivers' reactions to dissonant use of communication technology in the workplace: effects on communication strategies and the perceived usefulness of technologyHamel, Stephanie Alodie 28 August 2008 (has links)
Not available / text
|
3 |
Reconfiguring public access in the post-convergence era: the social construction of public access to new media in Austin, Texas / Social construction of public access to new media in Austin, TexasFuentes-Bautista, Martha 28 August 2008 (has links)
This dissertation examines the impacts of shifting federal and state regulation on localities and on their efforts to extend public access to new technologies by exploring how libraries, diverse community sites and commercial hotspots have configured their services and programs in Austin, Texas in the last decade. Historically, regulation to ensure public access to communication and information systems have been regarded in the United States as an expression of government's concerns about preserving the public interest in the media. Since the early 1990s, diverse policy initiatives promoting public access to information and communication technology (ICT) sought to fulfill ideals of equity and democracy in the information age. However, an increasing preponderance of neoliberal ideology in current policy discourses, coupled with the explosive growth of high-speed, mobile networks, and individual-based, social software applications are challenging traditional notions of public access in communication policy. Since 2002, federal and state governments have ended a decade of direct government support to local, non-profit and community-based programs that facilitated public access to ICT. Over the same period, they have increasingly pursued a market-oriented approach to broadband access through the unlicensed spectrum, encouraging private enterprises to provider WiFi and wireless services to consumers in restaurants, airports, and other public places. Such changes bear significant implications for issues of governance, participatory democracy and equity in the information age. The comparative case study of Internet access initiatives in Austin seeks to answer three interrelated questions. First, how has public policy facilitating the transition toward convergent media environments framed public access to information and communication technologies (ICT)? A framing analysis of federal, state and local regulation of public ICT access indicates increasing fragmentation of policy discourses on access. Second, what are the main characteristics of the field of public access to ICT in an American technopolis? Austin, a modern American Technopolis and pioneer of Internet access in the country serves as a site to assess the impact of fragmented regulation on public ICT access. Third, how has public access to new technology through the unlicensed spectrum been conceptualized by different access cultures in a shifting regulatory environment? A survey of Wi-Fi hotspots in Austin, interviews with stakeholders and secondary data are employed in analyzing how non-profits, private firms and the local government are configuring high-speed Internet access through the unlicensed spectrum.
|
4 |
Gender and information technologies : exploring performing bodiesQuenneville, Carmen 05 1900 (has links)
This paper argues that since media or technologies are extensions or abstractions of
ourselves, the technologies that we performatively produce simultaneously function to
(re)produce us. Technologies are highly social spaces which have the performative
power to (re)produce the very 'materiality' of that thing we call 'reality.' The
performative powers of technologies manifest as the powerfully (re)productive meaningmaking
paradigms and regulatory controls in operation in a given culture. After
considering the predominant paradigms performed through typographic and computing
technologies, this paper investigates 'gender' as a performative site of social interface
(re)produced in relation to these predominating technological paradigms. This paper
further argues that in the context of the cyborg, 'gender' is exposed to be a map with no
territory: in a world increasingly exposed as simulation, the material reality of 'gender'
is power's effect. Finally, this paper considers the theatre in relation to typographic and
computing paradigms, arguing that 'play' and the imagination, in world that is all
representation, are crucial sites of social practice. Indeed, 'performativity' provides a
means for understanding the agency, subjectivity, materiality, and politics of construction
(re)produced through this, our simulated world.
|
5 |
Addressing the digital divide through the implementation of a wireless school networkDu Preez, Creswell January 2009 (has links)
Societal trends have changed more in the last decade than they have in the last century. This is particularly prevalent in the education environment. Concepts such as Lifelong Learning (the continued learning/educating of an individual throughout his/her lifetime), New Competencies (technology that is now part of almost every skill in the workplace) and Telecommuting (more people working from home rather than traditional offices) have become common-place today (Twigg, 1996, pp. 1-2). Education delivery needs to provide for these societal changes in order to ensure competent individuals pass on to the next level of education and ultimately to the work force. With key trends in technology such as Digitization, Maturation and Disintermediation becoming common in the workplace, education delivery must address the ―Digital Divide. (Twigg, 1996, pp. 2-3). Historically, schools in South Africa have used traditional teaching methods that have stayed the same for the last century. Educational institutions in South Africa, in particular, the previously disadvantaged schools of the Eastern Cape, face various challenges such as the dwindling ability to collect school fees from parents of scholars and declining financial support from the government. In Chapter Seven of the Draft White Paper on e-Education, which was gazetted on 26 August, 2004, the DoE, as part of its implementation strategies, urged the private sector to respond by implementing ICT initiatives nationwide. Phase 1 of the strategy advocated that ―Institutions are connected, access the internet and communicate electronically. (Department of Education, 2004, pp. 37-40). This dissertation shows that it is feasible to create a communications’ network among South African schools. It is believed that such a network can add great value to the education system in South Africa. The potential for this network to address the gap in the Digital Divide is enormous. This dissertation examines various ICT communications’ technologies and isolates wireless communications’ technology as best suited for this purpose, due to the speeds offered by the technology and the cost structure associated with it. A case study examines a pilot installation of the network and endeavours to prove the concept.
|
6 |
Factors impacting Tablet PC usage in low-income communitiesMeiring, Natalie January 2014 (has links)
The purpose of this research was to identify factors that impact on tablet PC usage in low-income communities. In order to determine and identify these factors a main research question and sub-research questions were formulated. The primary research question of this study was "What factors impact on tablet PC usage in low-income communities?" This main research question was answered by creating three sub-research questions followed by triangulating the results from these questions. The first sub-research question was aimed at determining whether prior exposure to touch screen technology impacts the user experience. In order to reach this objective an extensive literature review was conducted on the tablet PC landscape in South Africa. This literature review, coupled with the case study helped answer this first research question. The second sub-research question was concerned with determining whether existing user experience guidelines are relevant to South African users. A thorough literature review was conducted on user experience guidelines and related studies. This literature review, together with the results from the case study helped answer this second research question. The third sub-research question involved identifying specific factors which help improve the user experience of tablet PC users in a specific context. This research question was addressed in the case study. Each sub-research question provided results which were analysed in order to answer the main research question. The factors which impact on tablet PC usage were thus identified and recommendations were proposed.
|
7 |
Gender and information technologies : exploring performing bodiesQuenneville, Carmen 05 1900 (has links)
This paper argues that since media or technologies are extensions or abstractions of
ourselves, the technologies that we performatively produce simultaneously function to
(re)produce us. Technologies are highly social spaces which have the performative
power to (re)produce the very 'materiality' of that thing we call 'reality.' The
performative powers of technologies manifest as the powerfully (re)productive meaningmaking
paradigms and regulatory controls in operation in a given culture. After
considering the predominant paradigms performed through typographic and computing
technologies, this paper investigates 'gender' as a performative site of social interface
(re)produced in relation to these predominating technological paradigms. This paper
further argues that in the context of the cyborg, 'gender' is exposed to be a map with no
territory: in a world increasingly exposed as simulation, the material reality of 'gender'
is power's effect. Finally, this paper considers the theatre in relation to typographic and
computing paradigms, arguing that 'play' and the imagination, in world that is all
representation, are crucial sites of social practice. Indeed, 'performativity' provides a
means for understanding the agency, subjectivity, materiality, and politics of construction
(re)produced through this, our simulated world. / Arts, Faculty of / English, Department of / Graduate
|
8 |
Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutionsDaya, Jithendra Chotoo January 1996 (has links)
A research report submitted to the Faculty of Commerce, University of the Witwatersrand, Johannesburg, in the partial fulfilment of the requirements for the degree of Master of Commerce. Johannesburg 1996. / This paper addresses concerns surrounding information privacy and the secondary use of
information in South African corporations. This study also attempts to assess the level of
concern that management and information technology practitioners if! South African retail
banks have about privacy issues.
The research suggests that privacy is a huge concern internationally and may affect South
African corporations if they do not follow certain policies and practices. Eleven in-person
structured interviews were conducted at four banks.
The research proposes a set of guidelines by which South African management and IT
practitioners, who are involved with the identification and solution of some of the problems
that may be presented by possible privacy legislation, will be able to assess their policies and
practices against international practices and policies. The results inform IS managers and
executives about appropriate business policies they can implement voluntarily to address
public concerns about specific information practices that may be considered a threat to
privacy.
The findings suggest that the executives are deliberately avoiding confronting the issue of
information privacy for as long as possible. The executives are adopting a wait-and-see
attitude and will react 011 whatever legislation requires them to do. At the time of the
report senior executives at banks were not accepting responsibility for information privacy
policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs. / GR2017
|
9 |
Remote monitoring and controlling of RF communication for a mobile deviceUnknown Date (has links)
In recent years there has been dramatic growth in mobile devices and
technologies. According to reports from comScore [1], 47% users in the United States
(aged more than 13) are using a smartphones as their primary phone. Smartphone offers
more advanced computing ability and connectivity than contemporary phones. In today’s
world, a user wants to keep their smartphones private, because of the personal
information present in it. Among these users, some of them are minors. This thesis
addresses the functionality to track/control the mobile activities of minors by their parents
using mobile phones. As a parent they want to know, whom his/her child is talking to and
for what they are accessing browser for. Cellular network companies are providing
number blocking services from the carrier side, but those are monthly paid services. In this thesis, we propose application architecture for remotely control the child phone
and grant access to selected numbers for call and text. We use the emerging Android mobile platform and Google nexus phones to implement and test the application. This architecture will help developers to make more innovative applications in future which helps parent to access child phone information. We performed a study and reported the result using the proposal. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2013.
|
10 |
Firm Social Network, Information Transfer and Information EnvironmentUnknown Date (has links)
I investigate whether or not a firm’s social network size (also known as social
capital) impacts the quality of its information environment. Following social capital
theory, I posit three potential channels that help bring an informational advantage to wellconnected
firms. First, well-connected firms are likely to have timely access to a broader
set of information that affords them the opportunity to disclose this information. Second,
a social network fosters trust among social peers, which promotes the transfer of more
accurate information within that network. Third, well-connected executives and directors
have greater reputational capital at stake, which may encourage them to provide accurate
information to the market. I provide evidence that well-connected firms have higher
quality information environments.
I further document that the beneficial impact of the firm’s social network size on
the quality of the firm’s information environment is higher for complex firms. I also find that the beneficial effect of the firm’s social ties on the quality of the firm’s information
environment is greater when the firm’s connections are in the same industry or are top
executives or are industry leaders or are financiers in the capital markets.
My study extends existing social network literature by investigating whether
firm’s social connections to outside executives and directors impact the quality of the
firm’s information environment. My paper focuses on the networking skills of the
executives and directors and extends the literature on how executives’ and directors’
personal characteristics are important. Additionally, I respond to the call by Engelberg et
al. (2013) to identify the mechanism by which a CEO’s network creates value to the firm
and well-connected CEOs get paid higher compensation. This study also contributes to a
growing debate in social network literature between social capital theory and agency
theory. Finally, my study is important to the regulators and standard setters as they can
provide further evidence on the impact of non-financial information on the information
quality surrounding the firm. / Includes bibliography. / Dissertation (Ph.D.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
|
Page generated in 0.1172 seconds