Star invisible work and silenced dialogues in knowledge representation pdf

Posted on Thursday, May 27, 2021 3:07:03 PM Posted by Kiel W. - 27.05.2021 and pdf, management pdf 5 Comments

star invisible work and silenced dialogues in knowledge representation pdf

File Name: star invisible work and silenced dialogues in knowledge representation .zip

Size: 11702Kb

Published: 27.05.2021

Susan Leigh Star — was an American sociologist. She commonly used the qualitative methods methodology and feminist theory approach.

Susan Leigh Star

Robbin, Alice and Koball, Heather Seeking explanation in theory: Reflections on the social practices of organizations that distribute public use microdata files for research purposes. Journal of the American Society for Information Science , , vol. Public concern about personal privacy has recently focused on issues of Internet data security and personal information as big business.

The scientific discourse about information privacy focuses on the cross-pressures of maintaining confidentiality and ensuring access in the context of the production of statistical data for public policy and social research and the associated technical solutions for releasing statistical data. This article reports some of the key findings from a small-scale survey of organizational practices to limit disclosure of confidential information prior to publishing public use microdata files, and illustrates how the rules for preserving confidentiality were applied in practice.

Explanation for the apparent deficits and wide variations in the extent of knowledge about statistical disclosure limitation SDL methods is located in theories of organizational life and communities of practice. The article concludes with suggestions for improving communication between communities of practice to enhance the knowledge base of those responsible for producing public use microdata files.

Alford, R. Health care politics: Ideological and interest group barriers to reform. Chicago: The University of Chicago Press. Albrechtsen, H. The dynamics of classification systems as boundary objects for cooperation in the electronic library. Library Trends, 47 2 , — Allen, T. Roles in technical communication networks.

In Neson, C. American Association of Public Opinion Research. Best practices for survey and public opinion research. Ann Arbor, MI: Author. American Society for Information Science. ASIS heads west for a look at information privacy, integrity and data security. Bulletin, 23 3 , 2—3. Information about statistical disclosure limitation methods.

American Statistical Association. Committee on Privacy and Confidentiality. Procedures for restricted data access. Americans facing loss of personal privacy. Congressional Record, H Beck, B. Linking the host culture to organizational variables. In Frost, P. Bennett, C. Arguments for the standardization of privacy protection policy: Canadian initiatives and American and international responses. Government Information Quarterly, 14 4 , — Convergence revisited: Toward a global policy for the protection of personal data?

In Agre, P. The adequacy of privacy: The European Union data protection directive and the North American response.

The Information Society, 13 3 , — Berg, B. Qualitative research methods for the social sciences 3rd ed. Boston: Allyn and Bacon. Bethlehem, J. Disclosure control of microdata. Journal of the American Statistical Association, 85, 38—45 cited in Winkler, Blumer H.

Symbolic interactionism: Perspective and method. Boruch, R. Bowker, G. Sorting things out: Classification and its consequences. Brown, J. Organizational learning and communities-of-practice.

Organizing knowledge. Situated cognition and the culture of learning. Carr, D. Summary of a workshop. Caruso, D. The New York Times. Cate, F. Privacy in the information age. Chaiklin, S. Understanding practice: Perspectives on activity and context. New York: Cambridge University Press. Chatman, E. A theory of life in the round. Journal of the American Society for Information Science, 50 3 , — Choo, C.

The knowing organization: How organizations use information to construct meaning, create knowledge, and make decisions. New York: Oxford University Press. Cicourel, A. The integration of distributed knowledge in collaborative medical diagnosis. In Galegher, J. Clark, H. Language use and language users. In Lindzey, G.

New York: Random House. Clausing, J. Report rings alarm bells about privacy on the Internet. Clement, A. Computing at work: Empowering action by low-level users. Communications of the ACM, 37 1 , 52— Cox, L. Statistical Science, 6 3 , — Davenport, E. In press. Organizational knowledge and communities of practice. Denzin, N. Handbook of qualitative research. Duncan, G. Confidentiality and statistical disclosure limitation. International Encyclopedia of the Social and Behavioral Sciences.

Private lives and public policies. Enhancing access to microdata while protecting confidentiality: Prospects for the future. Emory, F. The causal texture of organizational environments. Human Relations 18 1 , 21— European Commission. Data Protection Working Party.

Data protection: Annual report of the data protection working party. First annual report.

Working relations of technology production and use

No work is inherently either visible or invisible. The indicators change with context, and that context becomes a negotiation about the relationship between visible and invisible work. With shifts in industrial practice these negotiations require longer chains of inference and representation, and may become solely abstract. This article provides a framework for analyzing invisible work in CSCW systems. We sample across a variety of kinds of work to enrich the understanding of how invisibility and visibility operate. Understanding these processes may inform the design of CSCW systems and the development of related social theory.

This paper explores the relevance of recent feminist reconstructions of objectivity for the development of alternative visions of technology production and use. I take as my starting place the working relations that make up the design and use of technical systems. Working relations are understood as networks or webs of connections that sustain the visible and invisible work required to construct coherent technologies and put them into use. I outline the boundaries that characterize current relations of development and use, and the boundary crossings required to transform them. Three contrasting premises for design-the view from nowhere, detached engagement, and located accountability — are taken to represent incommensurate alternatives for a politics of professional design. From the position of located accountability, I close by sketching aspects of what a feminist politics and associated practices of system development could be.

Robbin, Alice and Koball, Heather Seeking explanation in theory: Reflections on the social practices of organizations that distribute public use microdata files for research purposes. Journal of the American Society for Information Science , , vol. Public concern about personal privacy has recently focused on issues of Internet data security and personal information as big business. The scientific discourse about information privacy focuses on the cross-pressures of maintaining confidentiality and ensuring access in the context of the production of statistical data for public policy and social research and the associated technical solutions for releasing statistical data. This article reports some of the key findings from a small-scale survey of organizational practices to limit disclosure of confidential information prior to publishing public use microdata files, and illustrates how the rules for preserving confidentiality were applied in practice. Explanation for the apparent deficits and wide variations in the extent of knowledge about statistical disclosure limitation SDL methods is located in theories of organizational life and communities of practice. The article concludes with suggestions for improving communication between communities of practice to enhance the knowledge base of those responsible for producing public use microdata files.

Working relations of technology production and use

Капля Росы. Он слышал приятный голос сеньора Ролдана из агентства сопровождения Белена. У нас только две рыжеволосые… Две рыжеволосые, Иммакулада и Росио… Росио… Росио… Беккер остановился как вкопанный.

Вся моя жизнь - это любовь к моей стране. Вся моя жизнь - это работа здесь, в Агентстве национальной безопасности. Сьюзан слушала молча. - Как ты могла догадаться, - продолжал он, - вскоре я собираюсь выйти в отставку. Но я хотел уйти с высоко поднятой головой.

 - О Боже, - проговорила Сьюзан, сообразив, в чем дело, - Цифровая крепость зашифровала самое. Стратмор невесело улыбнулся: - Наконец ты поняла. Формула Цифровой крепости зашифрована с помощью Цифровой крепости. Танкадо предложил бесценный математический метод, но зашифровал .

Он не имел ни малейшего желания затеряться в подвальных коридорах АНБ с сопротивляющейся изо всех сил заложницей. Это смертельная ловушка.

COMMENT 5

  • Star, Susan Leigh (b): Invisible Work and Silenced Dialogues in Representing Knowledge. In I. Eriksson, B.A. Kitchenham, and K.G. Tijdens (eds.​): Women. Dominic C. - 28.05.2021 at 13:16
  • Star, Susan Leigh (): Invisible Work and Silenced Dialogues in Knowledge Representation. InWomen, Work and Computerization, eds. Frutos F. - 29.05.2021 at 07:27
  • No work is inherently either visible or invisible. Tom S. - 29.05.2021 at 11:58
  • Institute, she collaborated with Karl Hewitt at MIT's artificial intelligence lab around issues of centered on the sociology of work and practice including invisible work, articulation work Invisible work and silenced dialogues in representing. Laurencio C. - 03.06.2021 at 02:45
  • Star, S. L. Invisible Work and Silenced Dialogues in Knowledge Representation. In I. Eriksson, B. Kitchenham, and K. Tijdens (Eds.) Women, Work and. Onfroi G. - 06.06.2021 at 00:12

LEAVE A COMMENT