Review Paper on Computer Ethics and Related Research Models

Size: px
Start display at page:

Download "Review Paper on Computer Ethics and Related Research Models"

Transcription

1 Review Paper on Computer Ethics and Related Research Models Meysam Namayandeh and Hamed Taherdoost Abstract As the general public becomes increasingly computer literate, the gap between technology and peoples mental power notably shrinks. The available computer resources, software, and assorted output devices have enlightened many unethical activities, privacy invasion and illegal purposes. Computer ethics is viewed as one of the foremost areas of concern and interest by academic researchers and industry practitioners. They are defined as an all-encompassing term that refers to all activities needed to secure information and systems that supports, in order to facilitate ethical use. The previous research in computer ethics and related models indicates the need of complete reference on this topic. The purpose of this paper is to study the different computer ethical conceptions and models from different perspective. This study demonstrates that research in computer ethics in general and computer ethics from scenario perspective in particular, clearly contributes to continuous ethics enhancement with regards to technology developments issues. Keywords: ethic, information technology, model, scenario O I. INTRODUCTION VER the past century, it is undeniable that social constructivist and information technology has achieved a bright technological development for us. It has facilitated the globally interdependent technology in which we use, has altered our sense of our place in the universe [6]. To ensure successful effect of information technology, various controls and measures is implemented, current security policies [2], smart card application [39] and information security ethics [28] are the most useful examples of information technology and computer (IT) growth. An interesting point of analysis on these topics would be on ethical issues which remain the heart of [38] in order to develop and suggest a model to realise problems and complicated concern on smart card adoption[37] and related ethical behavior [23][24]. Post graduate student, Centre for Advanced Software Engineering, Universiti Teknologi Malaysia, International Campus, Kuala Lumpur, Malaysia, (meysam.namayandeh@gmail.com). Post graduate student, Centre for Advanced Software Engineering,Universiti Teknologi Malaysia, International Campus, Kuala Lumpur, Malaysia, (hamed.taherdoost@gmail.com). In fact, computer ethics is defined as the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use for technology [42]. The number and kinds of application of computing increase dramatically each year and the impact of computing has felt around the planet [22]. As [36] says, computer ethics is the sense that can be understood as branch of applied technology, which studies and analyzes such social and ethical impacts of technology development. Also from Malaysian perspective, review of related research [20] indicates the existence of conflicting views concerning the ethical perceptions of students. The ubiquitous use of electronic mail, electronics transfer, reservation systems, the World Wide Web, places millions of inhabitants on the planet in a global electronic village [32]. Communication and action at a distance have never been easier and this is definitely evolution of computer generation. The area of improper computer used and computer ethics has not remained unattended situations [42]. In the current growth of information technology; the last decades have brought smart card as an ideal device for any transaction such as healthcare, telecommunication, banking, and many other applications. Smart card provides better possibilities for security, customization and improved services for users. Understanding the factors that influence user acceptance of this aspect of current development is vital for sophisticated consumer with respect to ethical action and reaction, where knowing the customers ethical and intentional behavior to use smart cards should be the key element in any decisionmaking process [37] [38] [39]. In this paper, authors reviewed the past researches on computer ethics and related topics. Also, a comparison study was used to introduce various applications of computer ethics from relevant perspectives. II. HISTORICAL MILESTONE As the computer ethics was one of the major topics which had been studied in the past decades, in order to prevent the people from the social impact, in this part, authors provided a short review milestone on computer ethics and its historical enhancement.

2 1970s. During the late 1960s, Joseph Weizenbaum [14], a computer scientist at Massachusetts Institute of Technology in Boston, created a computer program that called ELIZA. In his first experiment with ELIZA, he provided a crude imitation of a psychotherapist engaged in an initial interview with a patient. Right after real time experiment he shocked with the action and reaction of studied people. In the mid 1970s, Walter Maner [43] began to use the term computer ethics to refer to the field of inquiry dealing with ethical problems. He offered an experimental course on the subject at many universities. During the late 1970s, Maner [43] generated computer ethics courses with varieties of workshops and lectures at computer science conferences and philosophy conferences across United States of America. 1980s. By this era, frequent numbers of social and ethical consequences of information technology were becoming public issues in the world, from computer-enabled crime, disasters caused by computer failures, invasions of privacy via computer databases to major law suits on software ownership. Because of the work of Parker [30] and others, the foundation had been laid for computer ethics as an academic discipline. 1990s. During the 1990s [30], new university courses, research scholars, conferences, journals, articles and textbooks appeared, and a wide diversity of additional researchers and topics became involved. This era, generated new chapter of computer ethics with security in mind. 2000s. As [13] says the computer revolution is divided into three stages, two of which have already occurred, the introduction stage and the permeation stage. The world entered the third and most important stage the power stage in which many of the most serious social, political, legal, and ethical questions involving information technology will present themselves on a large scale. The important mission in this era is to believe that future developments in information technology will make computer ethics more vibrant and more important than ever. Computer ethics is made to research about security and it`s beneficial aspects. In this brief review it can be seen that many views of computer ethics exits. This richness of attitude is probably due to a difference in observation of computing characteristics, the adopted focus - broadly split between the outcome of computing or the undertaking of computing, and the disciplinary background. These perspectives can analyze computer ethics researched areas into several sub categories: Social - considering the computing-impact on society Professional - considering the manner of professional activity Universal activist - inclusive of communities around the globe Parochial - restricted consideration of current and future issues Ethics only - drawing only from ethics theory Multi-disciplinary - blending theory from several disciplines Using starting points and perspective categories the different stances can be classified as shown in the Table 1. For example, Moor adopts a universal conceptual multidisciplinary stance and Maner focused on ethical properties. Bynum's [5] stance of computing being all pervasive is used to argue that computer ethics is about the human values and technology equation whilst pervasiveness is used by Anderson to promote the idea that computer ethics is important for all people in a technologically-dependent world. From the recent research of computer ethics and information security Nemati developed many tools and methodology on this important topic of computer ethics. III. REVIEWED MODELS From morality perspective [23], researcher develop a model to create educational opportunities that allow students to examine their existing beliefs regarding ethical and technical issues and in relation to existing technical, professional, legal, and cultural solutions. In fact, main object was to encourage students to explore who am I now in relation to technical, professional, cultural, and legal solutions to these ethical and security issues. TABLE 1 CLASSIFIED RECENT ETHICAL RESEARCH Topic Maner Moor Johson Gorniak OZ Anderso Spinello Bynum Parker (1970) (1985) (1985) (1991) (1995) n (1997) (2003) (2004) (2006) Properties concepts Application Environment Value Social Professional Prosocial Ethics Code Information security Nemati (2008)

3 According to [19] decision makers place such a high value on information that they will often invade someone's privacy to get it. As earlier Manson mentioned, these for elements are general human weaknesses that cannot be a part of their ethical behavior which are Privacy, Accuracy, Accessibility and Intellectual Property. Also he stated that, the ethical issues involved personal behavior and professional practice. Fig 1. Moral Model [23] As [36] and [18] presents four basic principles of information ethics, including intellectual property rights, privacy, planning, and the prohibition of mischief. On the other hand, they suggested the methods for protecting an individual s computer system where it defines the major objective on computer ethics rather any other segments. Privacy Intellectual Property Computer Ethics Proper Plan Privacy It may define as the claim of individuals to determine for themselves when, to whom, and to what extent individually identified data about them is communicated or used. Most invasions of privacy are not this dramatic or this visible. Rather, they creep up on us slowly as, for example, when a group of diverse files relating to a student and his or her activities are integrated into a single large database. Collections of information reveal intimate details about a student and can thereby deprive the person of the opportunity to form certain professional and personal relationships. This is the ultimate cost of an invasion of privacy. So why integrate databases in the first place. It is because the bringing together of disparate data makes the development of new information relationships possible [19] [38] [39]. Mischief Abandon Fig 2. Basic Ethical Principles [36] Reviews from [40] [25] [35] indicates the effect of internet and cybercrime involved, causing serious damage. In the past, hacking primarily displayed the hacker s ability; however, modern hacking has evolved into antisocial actions, using the hacker s knowledge for a criminal intent. Looking into the subject of hacking according to various situations, hackers have no regard for selling, distributing, falsifying, or destroying confidential information of a country, company, or individual. Intellectual Property One of the more controversial areas of computer ethics concerns the intellectual property rights connected with software ownership. Some people, like Richard Stallman who started the Free Software Foundation, believe that software ownership should not allow at all. He claims that all information should be free, and all programs should be available for copying, studying and modifying by anyone who wishes to do so. Others argue that software companies or programmers would not invest weeks and months of work and significant funds in the development of software if they could not get the investment back in the form of license fees or sales [38][39][19]. Accuracy Represents the legitimacy, precision and authenticity with which information is rendered. Because of the pervasiveness of information about individuals and organizations contained in information systems, special care must be taken to guard against errors and to correct known mistakes. Difficult questions remain when inaccurate information is shared between computer systems [19]. Fig 3. Ethical Characteristics [18] Accessibility What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards? At the same time computer usage flourishes among some, there exists a large group of information-poor people who have no direct access to computational technology and who have little training in its

4 use. The educational and economic ante can be quite high when playing the modern information game [39] [19]. Further, theory of Planned Behaviour has been successfully applied to the understanding of individual acceptance and usage of many different technologies [21] [41] and also other situations in predicting the performance of behaviour and intentions, such as predicting user intentions to use new software [21]. Drawn from social psychology, Theory of Reasoned Action is one of the most fundamental and influential theories of human behaviour, derived from previous research that started out as the Theory of Attitude [16], which lead to the study of attitude and behaviour. It has been used to predict a wide range of behaviours [8]. TRA defines relationships between beliefs, attitudes, norms, intentions, and behaviour. According to this theory, an individual's behaviour (e.g., use or rejection of technology) is specified by one s intention to perform the behaviour, and individual s attitude toward performing the behaviour and subjective norm influence the intention, specified as "the person s perception that many persons who are important to her think she should or should not perform the behaviour in question [8]. Also, the requirements for legal and ethical measures to provide comprehensive security of information systems were introduced by [15] which are: Ethics negotiation phase is where organizations or individuals representing themselves negotiate the content of ethical communication agreement over specific communication channels. Ethics enforcement phase is where each organization enforces changes in the ethical code of conduct by specifying administrative and managerial routines, operational guidelines, monitoring procedures, and sanctions for unacceptable behavior. IV. SCENARIO METHODS Using scenario [4] [37] [38], allows contributors to learn about the relevance and challenges of ethical decision making by resolving of dilemmas that arise in 'real life' situations. Participants can feel into personal understanding and have the opportunity to consider others' perspectives through discussion and role play. In doing so, they can develop an understanding of the need and the ability to stand in another s shoes a critical component of developing sensitivity to ethical issues on computer ethics development. It presents dilemmas to be resolved and raise the kinds of issues to internal and external pressures which many participants could identify. The point of exercise is not to arrive at any one 'right' resolution to dilemmas, but instead to appoint in challenging their own understanding and recognise that reality is usually a better way to resolve a dilemma ethically [37]. From scenarios perspective, rapidly changing environment requires a continuous, adaptable, and enhances able personal approach to ethics. fortunately for it professionals, this approach is not a foreign concept, continuous improvement has been a cornerstone of professional development, quality improvement, and software process improvement through the capability maturity models of the software engineering institute. Also, [34] introduced ethical standards that evolved over the history of western civilization deal with interpersonal relationships from scenario perspectives. Sackson [34] reviewed the scenarios method from three instructional approaches in order to familiar students with real time situations. On the other hand, he presented different teaching pedagogues are beneficial to any faculty who wants to include these topics in the curriculum of a computer courses. In addition, [7] specify that undergraduate programs in computing should starts students to the subject of computer ethics. He discusses a novel way of introducing computer ethics into the curriculum and the use of detailed computer ethics scenarios that introduce important technical issues as well as issues in computer ethics. V. DISCUSSION AND CONCLUSION In this paper, review of many computer ethical models and scenarios indicates the need of this important topic for the current technology development. Also, a classified research area was introduced for future plan of any researcher who intends to focus on computer ethics and related topics. In addition, discussion from previous studies particularly from real time scenarios indicates the need of computer ethics courses in many educational systems. Hence, the nature of technology development indicates that, ethic of future will have a global character. Also, the discussion reveals the significant differences between computer ethics researchers and their appropriate topics whereas it shows the need of more deep research with respect to educational context and industrial developments. However, as the future of education becomes more technology driven and technology dependent, further studies are necessary for analyzing and anticipating the impact and implementation of such trend. Scholarly research and empirical evidence on computer ethics behavior and the effectiveness of various computer ethics policies and instructions are needed to enrich and add to the existing body of research. REFERENCES [1] Ajzen, I From intentions to actions: A theory of planned behavior. Action control: From cognition to behavior2: [2] Ajzen, I The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes. 50(2): [3] Anderson, R. Using the New ACM Code of Ethics in Decision Making, Communications of the ACM, Feb 1997, v36, n2, pp [4] Benbunan, R. (1998). Guidelines for using case scenarios to teach computer ethics. ACM SIGCAS Computers and Society. Vol 28 (3). pp [5] Bynum, T. (2004). Computer Ethics. Basic Concepts and Historical Overview. Stanford. Encyclopedia of philosophy.

5 [6] Cruz, J. A., Frey, W. J An Effective Strategy for Integration Ethics Across the Curriculum in Engineering: An ABET 2000 Challenge, Science and Engineering Ethics, p [7] Epstein, R. (2006). The use of computer ethics scenarios in software engineering education: The case of the killer robot. Software Engineering Education Book chapter. Springer Berlin / Heidelberg. Vol 750. pp [8] Fishbein, M., and Ajzen, I. (1975). Intention and Behavior: An Introduction to Theory and Research. Boston, MA: Addition-Wesley. [9] Foster, Andrea L., Insecure and Unaware, The Chronicle of higher Education, (May 7, 2004), 33. [10] Górniak, K. (1991), The Computer Revolution and the Problem of Global Ethics in Terrell Ward Bynum and Simon Rogerson, eds., Global Information Ethics, Opragen Publications, 1991, pp , (the April 1991 issue of Science and Engineering Ethics). [11] Huff, C., and Frey, W Moral Pedagogy and Practical Science and Engineering Ethics (Forthcoming). [12] James H. Moor. Are there decisions Computers Should Never Make? Nature and System, 1: , James H. Moor. What Is Computer Ethics? In Terrell Ward Bynum, editor, Computers and Ethics. Blackwell, Oxford, UK. [The October 1985 issue of the journal Metaphilosophy, 16(4). [13] Johnson,D. (1985). Computer Ethics, Prentice-Hall. [14] Joseph Weizenbaum. Computer Power and Human Reason:From Judgment to Calculation. Freeman, San Francisco, [15] Jussipekka, L., Seppo, H. (1998). An Analysis of Ethics as Foundation of Information Security in Distributed Systems. HICSS. Volume 6 (6): [16] Kim, Soyoung and Leslie Stoel, Apparel retailers: website quality dimensions and satisfaction. Journal of Retailing and Consumer Services, [17] Langford, D. (2000). Internet Ethics, London: Macmillan. [18] Lee, K. (2006). Efforts for the Fixation of Systemic Information and Communication Ethics Education, Information Communication Ethics Committee. IJCSNS International Journal of Computer Science and Network Security. Volume 6 (6): 3-5. [19] Mason, R.O Four Ethical Issues of the Information Age, Management Information Systems Quarterly, 10, 1, [20] Masrom, M. & Ismail, Z Computer Security and Computer Ethics Awareness: A Component of Management Information System, Proceedings of International Symposium on Information Technology 2008, Kuala Lumpur Convention Centre, Malaysia (26-29 August 2008), pp [21] Mathieson, K Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research 2(3): [22] McGee, R. W The Ethics of Tax Evasion: A Survey of International Business Academics. Presented at the 60th International Atlantic Economic Conference, New York, October 6 9, [23] Mellisa, D A Framework for Information Security in Ethics Education system. University of Maryland [24] Namayandeh, M., and Masrom, M., and Ismail Z., Development of Computer Ethics Framework for Information Security within Educational Context. SEATUC. Shibuara University, Japan., pp [25] National Computerization Agency(2005), Korean Internet White Paper. [26] NBS Technologies Inc., Smart Card Frequently Asked Questions. [27] Nemati, H. (2007). Information Security and Computer Ethics. Tools,Theories and Modeling. North Carolina University, Igbi Science Publication [28] North. S.M., George, R., Shujaee, K., and Mumford, A. Collaborative Information Assurance Capacity Building at a Consortium of Colleges and Universities. Proceedings of the 43rd Annual Association for Computing Machinery Southeast Conference. March 2005, [29] Oliver, R.L A Cognitive Model of the Antecedents and Consequences of Satisfaction Decisions, Journal of Marketing Research, Vol. 17, No. 4, pp [30] Parker, D. Computer Crime: Criminal Justice Resource Manual, 2nd ed., National Institute of Justice, August l989. [31] Parker, Donn. Swope, Susan, Baker, Bruce. Ethical Conflicts in Information and Computer Science, Technology and Business. Wellesley, MA: QED Information Sciences, 1990, Reviewed in [32] Philip, B. (2007). Research in Philosophy and Technology. Journal of Technology. Volume 11(2): 3-8. [33] Raub, A. C Correlates of computer anxiety in college students. Unpublished doctoral dissertation, University of Pennsylvania. [34] Sackson, M Computer Ethics: Are Students Concerned? Retrieved 3 September, 2008, from [35] Song, Su-Kum(2002), Study on the contents of Information Ethics Education and the Methodology of Education for Secondary Schools, SungKyunKwan University Press [36] Spinello, A. (2003). Cyber Ethics: Morality and Law in Cyberspace (2nd Ed.). Sudbury, Jones and Bartlett. [37] Taherdoost. H, Masrom. M, Ismail. Z Evaluation of Smart Card Acceptance: Security, Technology and Usage. Conference Proceedings of 3th International Conference on e-commerce, e- Administration, e- Society, and e-education (e-case). The Grand Copthorne Waterfront, Singapore, January 8-10, 2009, pp [38] Taherdoost. H, Namayandeh. M Social Modeling of Smart Card Technology Acceptance Based On Ethical Scenarios Analysis. [39] Taherdoost. H, Namayandeh. M, Masrom. M Development a Smart Card Acceptance Model from Ethical Perspective, The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP 09), Monte Carlo Resort, Las Vegas, Nevada, USA, July 13-16, [40] Tayani. H., Computer Ethics Bibliography, (Rivier College). [41] Taylor, S., and Todd, P. (1995). Assessing IT usage: the role of prior experience. MIS Quarterly. 19(4), [42] Walters, G.J Privacy and Security: An Ethical Analysis, Computers and Society, 31, 2, [43] Walter Maner. Starter Kit in Computer Ethics. Helvetia Press and the National Information and Resource Center for Teaching Philosophy, Hyde Park, New York, [Originally self-published by Maner in AUTHOR S BIGRAPHY Meysam Namayandeh is a Postgraduate student at Centre for Advanced Software Engineering, University Technology Malaysia International Campus Kuala Lumpur, Malaysia. His research areas include IT management, information security and ethics. meysam.namayandeh@gmail.com Hamed Taherdoost is a Postgraduate student at Centre for Advanced Software Engineering, University Technology Malaysia International Campus Kuala Lumpur, Malaysia. His research areas include information security, IT/IS adoption and smart card technology acceptance. Corresponding author hamed.taherdoost@gmail.com

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Computer Ethics: The Evolution of the Uniqueness Revolution

Computer Ethics: The Evolution of the Uniqueness Revolution Computer Ethics: The Evolution of the Uniqueness Revolution http://www.ccsr.cse.dmu.ac.uk/resources/general/discipline/cepe97.html Computer Ethics: The Evolution of the Uniqueness Revolution by Donald

More information

E-commerce Technology Acceptance (ECTA) Framework for SMEs in the Middle East countries with reference to Jordan

E-commerce Technology Acceptance (ECTA) Framework for SMEs in the Middle East countries with reference to Jordan Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2009 UK Academy for Information Systems 3-31-2009 E-commerce Technology Acceptance

More information

STRATEGIC FRAMEWORK Updated August 2017

STRATEGIC FRAMEWORK Updated August 2017 STRATEGIC FRAMEWORK Updated August 2017 STRATEGIC FRAMEWORK The UC Davis Library is the academic hub of the University of California, Davis, and is ranked among the top academic research libraries in North

More information

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics? A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there

More information

An Examination of Smart Card Technology Acceptance Using Adoption Model

An Examination of Smart Card Technology Acceptance Using Adoption Model An Examination of Smart Card Technology Acceptance Using Adoption Model Hamed Taherdoost Centre for Advanced Software Engineering, Universiti Teknologi Malaysia hamed.taherdoost@gmail.com Maslin Masrom

More information

What Factors Affect General Aviation Pilot Adoption of Electronic Flight Bags?

What Factors Affect General Aviation Pilot Adoption of Electronic Flight Bags? National Training Aircraft Symposium (NTAS) 2017 - Training Pilots of the Future: Techniques & Technology Aug 14th, 9:00 AM - 10:15 AM What Factors Affect General Aviation Pilot Adoption of Electronic

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Diffusion of Virtual Innovation

Diffusion of Virtual Innovation Diffusion of Virtual Innovation Mark A. Fuller Washington State University Andrew M. Hardin University of Nevada, Las Vegas Christopher L. Scott Washington State University Abstract Drawing on Rogers diffusion

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

The Evolution of User Research Methodologies in Industry

The Evolution of User Research Methodologies in Industry 1 The Evolution of User Research Methodologies in Industry Jon Innes Augmentum, Inc. Suite 400 1065 E. Hillsdale Blvd., Foster City, CA 94404, USA jinnes@acm.org Abstract User research methodologies continue

More information

Towards a Software Engineering Research Framework: Extending Design Science Research

Towards a Software Engineering Research Framework: Extending Design Science Research Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

The Acceptance Design Model for Evaluating the Adoption of Folksonomies in UUM Library WEB OPAC

The Acceptance Design Model for Evaluating the Adoption of Folksonomies in UUM Library WEB OPAC The Acceptance Design Model for Evaluating the Adoption of Folksonomies in UUM Library WEB Adebambo Hameed O. a, Raji Ridwan A. b, Akanmu Semiu A. a,b,* a School of Technology Management and Logistics,

More information

Media and Communication (MMC)

Media and Communication (MMC) Media and Communication (MMC) 1 Media and Communication (MMC) Courses MMC 8985. Teaching in Higher Education: Communications. 3 Credit Hours. A practical course in pedagogical methods. Students learn to

More information

For the Malaysia Engineering Accreditation Council (EAC), the programme outcomes for the Master of Engineering (MEng) in Civil Engineering are:

For the Malaysia Engineering Accreditation Council (EAC), the programme outcomes for the Master of Engineering (MEng) in Civil Engineering are: Programme Outcomes The Civil Engineering department at the University of Nottingham, Malaysia considers and integrates the programme outcomes (POs) from both the Malaysia Engineering Accreditation Council

More information

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations

More information

A Model for Incorporating Ethics Instruction into the OEIS Curriculum

A Model for Incorporating Ethics Instruction into the OEIS Curriculum A Model for Incorporating Ethics Instruction into the OEIS Curriculum Herman T. Tavani This article proposes a framework for incorporating ethics instruction into the OEIS Model Curriculum by drawing upon

More information

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers an important and novel tool for understanding, defining

More information

Quantum Technologies Public Dialogue Report Summary

Quantum Technologies Public Dialogue Report Summary Quantum Technologies Public Dialogue Report Summary Foreword Philip Nelson EPSRC Chief Executive New systems, devices and products that make use of the quantum properties of particles and atoms are beginning

More information

Social Innovation and new pathways to social changefirst insights from the global mapping

Social Innovation and new pathways to social changefirst insights from the global mapping Social Innovation and new pathways to social changefirst insights from the global mapping Social Innovation2015: Pathways to Social change Vienna, November 18-19, 2015 Prof. Dr. Jürgen Howaldt/Antonius

More information

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee

More information

BIM Awareness and Acceptance by Architecture Students in Asia

BIM Awareness and Acceptance by Architecture Students in Asia BIM Awareness and Acceptance by Architecture Students in Asia Euisoon Ahn 1 and Minseok Kim* 2 1 Ph.D. Candidate, Department of Architecture & Architectural Engineering, Seoul National University, Korea

More information

RCAPS Working Paper Series

RCAPS Working Paper Series RCAPS Working Paper Series RWP-16004 The Adoption of Information System for Organic Agricultural Small and Medium Enterprises (SMEs) in Chiang Mai November 17, 2016 Chat Chuchuen* and Sirikul Tulasombat

More information

Technology Leadership Course Descriptions

Technology Leadership Course Descriptions ENG BE 700 A1 Advanced Biomedical Design and Development (two semesters, eight credits) Significant advances in medical technology require a profound understanding of clinical needs, the engineering skills

More information

Introduction. CELIA ROMM University of Wollongong. FAY SUDWEEKS University of Sydney

Introduction. CELIA ROMM University of Wollongong. FAY SUDWEEKS University of Sydney CHAPTER 1 Introduction CELIA ROMM University of Wollongong FAY SUDWEEKS University of Sydney The emergence of electronic commerce as a distinct area in business is seen by many researchers and executives

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

SOCI 425 Industrial Sociology I

SOCI 425 Industrial Sociology I SOCI 425 Industrial Sociology I Session One: Definition, Nature and Scope of Industrial Sociology Lecturer: Dr. Samson Obed Appiah, Dept. of Sociology Contact Information: soappiah@ug.edu.gh College of

More information

Human Factors in Control

Human Factors in Control Human Factors in Control J. Brooks 1, K. Siu 2, and A. Tharanathan 3 1 Real-Time Optimization and Controls Lab, GE Global Research 2 Model Based Controls Lab, GE Global Research 3 Human Factors Center

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

Mapping the Design Criterion Framework for Museum Exhibition Design Project

Mapping the Design Criterion Framework for Museum Exhibition Design Project Mapping the Design Criterion Framework for Museum Exhibition Design Project LIN, Chunghung Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/554/ This document

More information

IoT in Health and Social Care

IoT in Health and Social Care IoT in Health and Social Care Preserving Privacy: Good Practice Brief NOVEMBER 2017 Produced by Contents Introduction... 3 The DASH Project... 4 Why the Need for Guidelines?... 5 The Guidelines... 6 DASH

More information

CRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are:

CRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are: CRITERIA FOR AREAS OF GENERAL EDUCATION The areas of general education for the degree Associate in Arts are: Language and Rationality English Composition Writing and Critical Thinking Communications and

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Information Societies: Towards a More Useful Concept

Information Societies: Towards a More Useful Concept IV.3 Information Societies: Towards a More Useful Concept Knud Erik Skouby Information Society Plans Almost every industrialised and industrialising state has, since the mid-1990s produced one or several

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

Dix, Alan; Finlay, Janet; Abowd, Gregory; & Beale, Russell. Human- Graduate Software Engineering Education. Technical Report CMU-CS-93-

Dix, Alan; Finlay, Janet; Abowd, Gregory; & Beale, Russell. Human- Graduate Software Engineering Education. Technical Report CMU-CS-93- References [ACM92] ACM SIGCHI/ACM Special Interest Group on Computer-Human Interaction.. Curricula for Human-Computer Interaction. New York, N.Y.: Association for Computing Machinery, 1992. [CMU94] [Dix93]

More information

DC: Are you aware of any smaller jurisdictions already taking advantage of this or starting to implement this?

DC: Are you aware of any smaller jurisdictions already taking advantage of this or starting to implement this? Technology Makes Information Sharing Possible: advice from Paul Wormeli on how jurisdictions can use technology to improve the capacity to share information between justice and health agencies This summary

More information

NCRIS Capability 5.7: Population Health and Clinical Data Linkage

NCRIS Capability 5.7: Population Health and Clinical Data Linkage NCRIS Capability 5.7: Population Health and Clinical Data Linkage National Collaborative Research Infrastructure Strategy Issues Paper July 2007 Issues Paper Version 1: Population Health and Clinical Data

More information

Playware Research Methodological Considerations

Playware Research Methodological Considerations Journal of Robotics, Networks and Artificial Life, Vol. 1, No. 1 (June 2014), 23-27 Playware Research Methodological Considerations Henrik Hautop Lund Centre for Playware, Technical University of Denmark,

More information

Prof Ina Fourie. Department of Information Science, University of Pretoria

Prof Ina Fourie. Department of Information Science, University of Pretoria Prof Ina Fourie Department of Information Science, University of Pretoria Research voices drive worldviews perceptions of what needs to be done and how it needs to be done research focus research methods

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE. D. M. Berube, NCSU, Raleigh

THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE. D. M. Berube, NCSU, Raleigh THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE D. M. Berube, NCSU, Raleigh Some problems are wicked and sticky, two terms that describe big problems that are not resolvable by simple and traditional solutions.

More information

European Charter for Access to Research Infrastructures - DRAFT

European Charter for Access to Research Infrastructures - DRAFT 13 May 2014 European Charter for Access to Research Infrastructures PREAMBLE - DRAFT Research Infrastructures are at the heart of the knowledge triangle of research, education and innovation and therefore

More information

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples

More information

With Wisdom We Explore

With Wisdom We Explore With Wisdom We Explore OUTCOME BASED EDUCATION (O.B.E) (For Students) Faculty of Mechanical and Manufacturing Engineering Universiti Tun Hussein Onn Malaysia by: OBE Committee 2017, FKMP, UTHM Expected

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

ADVANCING KNOWLEDGE. FOR CANADA S FUTURE Enabling excellence, building partnerships, connecting research to canadians SSHRC S STRATEGIC PLAN TO 2020

ADVANCING KNOWLEDGE. FOR CANADA S FUTURE Enabling excellence, building partnerships, connecting research to canadians SSHRC S STRATEGIC PLAN TO 2020 ADVANCING KNOWLEDGE FOR CANADA S FUTURE Enabling excellence, building partnerships, connecting research to canadians SSHRC S STRATEGIC PLAN TO 2020 Social sciences and humanities research addresses critical

More information

4 WHAT DO WE MEAN BY INFORMATION

4 WHAT DO WE MEAN BY INFORMATION 4 WHAT DO WE MEAN BY INFORMATION TECHNOLOGY? PERSPECTIVES ON STUDYING COMPUTING Steve Sawyer School of Information Sciences and Technology The Pennsylvania State University Steven Haynes School of Information

More information

Understanding the evolution of Technology acceptance model

Understanding the evolution of Technology acceptance model ISSN: 2321-7782 (Online) Volume 1, Issue 6, November 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Understanding

More information

Agenda Item No. C-29 AGENDA ITEM BRIEFING. Vice Chancellor and Dean of Engineering Director, Texas A&M Engineering Experiment Station

Agenda Item No. C-29 AGENDA ITEM BRIEFING. Vice Chancellor and Dean of Engineering Director, Texas A&M Engineering Experiment Station Agenda Item No. C-29 AGENDA ITEM BRIEFING Submitted by: Subject: M. Katherine Banks Vice Chancellor and Dean of Engineering Director, Texas A&M Engineering Experiment Station Establishment of the Center

More information

MEDIA AND INFORMATION

MEDIA AND INFORMATION MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

Aesthetics Change Communication Communities. Connections Creativity Culture Development. Form Global interactions Identity Logic

Aesthetics Change Communication Communities. Connections Creativity Culture Development. Form Global interactions Identity Logic MYP Key Concepts The MYP identifies 16 key concepts to be explored across the curriculum. These key concepts, shown in the table below represent understandings that reach beyond the eighth MYP subject

More information

What is Digital Literacy and Why is it Important?

What is Digital Literacy and Why is it Important? What is Digital Literacy and Why is it Important? The aim of this section is to respond to the comment in the consultation document that a significant challenge in determining if Canadians have the skills

More information

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW

More information

NATIONAL TOURISM CONFERENCE 2018

NATIONAL TOURISM CONFERENCE 2018 NATIONAL TOURISM CONFERENCE 2018 POSITIONING CURAÇAO AS A SMART TOURISM DESTINATION KEYNOTE ADDRESS by Mr. Franklin Sluis CEO Bureau Telecommunication, Post & Utilities Secretariat Taskforce Smart Nation

More information

Engaging UK Climate Service Providers a series of workshops in November 2014

Engaging UK Climate Service Providers a series of workshops in November 2014 Engaging UK Climate Service Providers a series of workshops in November 2014 Belfast, London, Edinburgh and Cardiff Four workshops were held during November 2014 to engage organisations (providers, purveyors

More information

Introduction to Humans in HCI

Introduction to Humans in HCI Introduction to Humans in HCI Mary Czerwinski Microsoft Research 9/18/2001 We are fortunate to be alive at a time when research and invention in the computing domain flourishes, and many industrial, government

More information

in the New Zealand Curriculum

in the New Zealand Curriculum Technology in the New Zealand Curriculum We ve revised the Technology learning area to strengthen the positioning of digital technologies in the New Zealand Curriculum. The goal of this change is to ensure

More information

Additional Arduino Control & Ethics

Additional Arduino Control & Ethics Additional Arduino Control & Ethics 1 Objectives Outline engineering ethics Emphasize importance of project documentation Discuss Servo Function calls and uses Questions Ethics & Practicing Engineering

More information

User Acceptance of Desktop Based Computer Software Using UTAUT Model and addition of New Moderators

User Acceptance of Desktop Based Computer Software Using UTAUT Model and addition of New Moderators User Acceptance of Desktop Based Computer Software Using UTAUT Model and addition of New Moderators Mr. Aman Kumar Sharma Department of Computer Science Himachal Pradesh University Shimla, India sharmaas1@gmail.com

More information

Northfleet Technology College Course Outline: Information Technology in a Global Society

Northfleet Technology College Course Outline: Information Technology in a Global Society Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers

More information

Guidelines for the Professional Evaluation of Digital Scholarship by Historians

Guidelines for the Professional Evaluation of Digital Scholarship by Historians Guidelines for the Professional Evaluation of Digital Scholarship by Historians American Historical Association Ad Hoc Committee on Professional Evaluation of Digital Scholarship by Historians May 2015

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY

STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY LIBRARY UNIVERSITY OF MORATUWA, SRI LANKA ivsoratuwa LB!OON O! /5~OFIO/3 STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY P. D. Kumarapathirana Master of Business Administration in Information

More information

HUMAN COMPUTER INTERFACE

HUMAN COMPUTER INTERFACE HUMAN COMPUTER INTERFACE TARUNIM SHARMA Department of Computer Science Maharaja Surajmal Institute C-4, Janakpuri, New Delhi, India ABSTRACT-- The intention of this paper is to provide an overview on the

More information

Human-computer Interaction Research: Future Directions that Matter

Human-computer Interaction Research: Future Directions that Matter Human-computer Interaction Research: Future Directions that Matter Kalle Lyytinen Weatherhead School of Management Case Western Reserve University Cleveland, OH, USA Abstract In this essay I briefly review

More information

Artificial Intelligence and Asymmetric Information Theory. Tshilidzi Marwala and Evan Hurwitz. University of Johannesburg.

Artificial Intelligence and Asymmetric Information Theory. Tshilidzi Marwala and Evan Hurwitz. University of Johannesburg. Artificial Intelligence and Asymmetric Information Theory Tshilidzi Marwala and Evan Hurwitz University of Johannesburg Abstract When human agents come together to make decisions it is often the case that

More information

Research and Innovation Strategy and Action Plan UPDATE Advancing knowledge and transforming lives through education and research

Research and Innovation Strategy and Action Plan UPDATE Advancing knowledge and transforming lives through education and research Page 1 of 9 Research and Innovation Strategy and Action Plan 2012 2015 UPDATE Advancing knowledge and transforming lives through education and research Executive Summary As the enterprise university, Plymouth

More information

Curriculum Vitae Denise A. Baker

Curriculum Vitae Denise A. Baker Curriculum Vitae Denise A. Baker bakerden@mst.edu 480.707.1049 EDUCATION 2016 2012 2010 PhD MS BS Arizona State University, Tempe, AZ Human and Social Dimension of Science and Technology Arizona State

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

IT ADOPTION MODEL FOR HIGHER EDUCATION

IT ADOPTION MODEL FOR HIGHER EDUCATION IT ADOPTION MODEL FOR HIGHER EDUCATION HERU NUGROHO Telkom University, School of Applied Science, Information System Study Program, Bandung E-mail: heru@tass.telkomuniversity.ac.id ABSTRACT Information

More information

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality Behaviors That Revolve Around Working Effectively with Others 1. Give me an example that would show that you ve been able to develop and maintain productive relations with others, thought there were differing

More information

SOCIAL SCIENCE RESEARCH COUNCIL

SOCIAL SCIENCE RESEARCH COUNCIL SOCIAL SCIENCE RESEARCH COUNCIL WHO WE ARE Better understanding makes for better choices. The SSRC is an international, interdisciplinary network of networks dedicated to galvanizing knowledge and mobilizing

More information

A Discipline for Software Engineering

A Discipline for Software Engineering A Discipline for Software Engineering (Humphrey, (Humphrey, 1995) 1995) Introduction AU INSY 560, Singapore 1997, Dan Turk Humphrey Preface - slide 1 Outline Software Development: Craft or Discipline?

More information

ADDENDUM 1. Changes Related to the Bachelor of Science in Intelligence Degree:

ADDENDUM 1. Changes Related to the Bachelor of Science in Intelligence Degree: ADDENDUM 1 CE UNIVERSITY 2017 2018 CATALOG ADDENDUM 1 National Intelligence University (NIU) produced this Catalog Addendum to supplement the NIU Catalog and Defense Intelligence Agency publications. You

More information

Standard of Knowledge, Skill and Competence for Practice as an Architectural Technologist

Standard of Knowledge, Skill and Competence for Practice as an Architectural Technologist Standard of Knowledge, Skill and Competence for Practice as an Architectural Technologist RIAI 2010 Contents Foreword 2 Background 3 Development of the Standard.4 Use of the Standard..5 Reading and interpreting

More information

A social networking-based approach to information management in construction

A social networking-based approach to information management in construction 175 A social networking-based approach to information management in construction Michael HENRY* and Yoshitaka KATO** Successful project completion in the construction industry requires careful and timely

More information

Programme Specification

Programme Specification Programme Specification Title: Social Policy and Sociology Final Award: Bachelor of Arts with Honours (BA (Hons)) With Exit Awards at: Certificate of Higher Education (CertHE) Diploma of Higher Education

More information

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE 37th Session, Paris, 2013 inf Information document 37 C/INF.15 6 August 2013 English and French only REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION

More information

Digital Health Startups A FirstWord ExpertViews Dossier Report

Digital Health Startups A FirstWord ExpertViews Dossier Report AM PL E PA G ES S A G ES S A FirstWord ExpertViews Dossier Report Published Copyright 2016 Doctor s Guide Publishing Limited All rights reserved. No part of this publication may be reproduced or used in

More information

Vice Chancellor s introduction

Vice Chancellor s introduction H O R I Z O N 2 0 2 0 2 Vice Chancellor s introduction Since its formation in 1991, the University of South Australia has pursued high aspirations with enthusiasm and success. This journey is ongoing and

More information

BOX, Floor 5, Tower 3, Clements Inn, London WC2A 2AZ, United Kingdom

BOX, Floor 5, Tower 3, Clements Inn, London WC2A 2AZ, United Kingdom QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. Collective Innovation for Lunar Exploration: Using LEGO Robotics, ŌSerious GamesÕ and Virtual Reality to Involve a Massive

More information

Research integrity. House of Commons Science and Technology Committee. Submission from the Royal Academy of Engineering.

Research integrity. House of Commons Science and Technology Committee. Submission from the Royal Academy of Engineering. Research integrity House of Commons Science and Technology Committee Submission from the Royal Academy of Engineering March 2017 About the Royal Academy of Engineering As the UK's national academy for

More information

SECTION 2. Computer Applications Technology

SECTION 2. Computer Applications Technology SECTION 2 Computer Applications Technology 2.1 What is Computer Applications Technology? Computer Applications Technology is the study of the integrated components of a computer system (such as hardware,

More information

National Workshop on Responsible Research & Innovation in Australia 7 February 2017, Canberra

National Workshop on Responsible Research & Innovation in Australia 7 February 2017, Canberra National Workshop on Responsible & Innovation in Australia 7 February 2017, Canberra Executive Summary Australia s national workshop on Responsible and Innovation (RRI) was held on February 7, 2017 in

More information

Ethics and Cognitive Systems

Ethics and Cognitive Systems Intelligent Control and Cognitive Systems brings you... Ethics and Cognitive Systems Joanna J. Bryson University of Bath, United Kingdom Beyond the Data Protection Act! Ethics Beyond the Data Protection

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Centre for the Study of Human Rights Master programme in Human Rights Practice, 80 credits (120 ECTS) (Erasmus Mundus)

Centre for the Study of Human Rights Master programme in Human Rights Practice, 80 credits (120 ECTS) (Erasmus Mundus) Master programme in Human Rights Practice, 80 credits (120 ECTS) (Erasmus Mundus) 1 1. Programme Aims The Master programme in Human Rights Practice is an international programme organised by a consortium

More information

AGILE USER EXPERIENCE

AGILE USER EXPERIENCE AGILE USER EXPERIENCE Tina Øvad Radiometer Medical ApS and Aalborg University tina.oevad.pedersen@radiometer.dk ABSTRACT This paper describes a PhD project, exploring the opportunities of integrating the

More information

SME Adoption of Wireless LAN Technology: Applying the UTAUT Model

SME Adoption of Wireless LAN Technology: Applying the UTAUT Model Association for Information Systems AIS Electronic Library (AISeL) SAIS 2004 Proceedings Southern (SAIS) 3-1-2004 SME Adoption of Wireless LAN Technology: Applying the UTAUT Model John E. Anderson andersonj@mail.ecu.edu

More information

Scenario Planning edition 2

Scenario Planning edition 2 1 Scenario Planning Managing for the Future 2 nd edition first published in 2006 Gill Ringland Electronic version (c) Gill Ringland: gill.ringland@samiconsulting.co.uk.: this has kept to the original text

More information

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA Qian Xu *, Xianxue Meng Agricultural Information Institute of Chinese Academy

More information

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance 1. INTRODUCTION AND OBJECTIVES 1.1 This policy seeks to establish a framework for managing

More information

Computerized Physician Order Entry (CPOE): A Study of Physician Technology Acceptance

Computerized Physician Order Entry (CPOE): A Study of Physician Technology Acceptance Association for Information Systems AIS Electronic Library (AISeL) SAIS 2004 Proceedings Southern (SAIS) 3-1-2004 Computerized Physician Order Entry (CPOE): A Study of Physician Technology Acceptance David

More information

Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research

Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research Predicting Collaboration Technology Use: Integrating Technology Adoption and Collaboration Research Susan A. Brown, Alan R. Dennis, and Viswanath Venkatesh Su s a n A. Br o w n is an Associate Professor

More information

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001 WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER Holmenkollen Park Hotel, Oslo, Norway 29-30 October 2001 Background 1. In their conclusions to the CSTP (Committee for

More information

The essential role of. mental models in HCI: Card, Moran and Newell

The essential role of. mental models in HCI: Card, Moran and Newell 1 The essential role of mental models in HCI: Card, Moran and Newell Kate Ehrlich IBM Research, Cambridge MA, USA Introduction In the formative years of HCI in the early1980s, researchers explored the

More information

Communication and Culture Concentration 2013

Communication and Culture Concentration 2013 Indiana State University» College of Arts & Sciences» Communication BA/BS in Communication Standing Requirements s Library Communication and Culture Concentration 2013 The Communication and Culture Concentration

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information