Technology and (Dis)Empowerment


Book Description

This timely work draws attention to the varying factors by which technology often leads to disempowerment effects. Seth makes a call to technologists to burst the technology positivism bubble, build an ethos for taking greater responsibility in their work, and engage with the rest of society to strengthen democracy.




Technology and (Dis)Empowerment


Book Description

This timely work draws attention to the varying factors by which technology often leads to disempowerment effects. Seth makes a call to technologists to burst the technology positivism bubble, build an ethos for taking greater responsibility in their work, and engage with the rest of society to strengthen democracy.




Overcoming Gender Inequalities through Technology Integration


Book Description

Information Communication Technologies (ICTs) exert a great influence on global activities. ITC has affected the structure of governments, economies, cultures, and even human health. Another area in which ICT has had a tremendous impact is within the developing world and nations where women face repression and fewer opportunities. Overcoming Gender Inequalities through Technology Integration is a critical source for understanding the role of technology adoption within female empowerment and equality in developing nations and beyond. This publication examines the strategies applicable to the use of technology in the purist of societal recognition of women in addition to the trajectory and visibility of women in developing as well as developed countries in which they have access to ICTs. This book is an essential reference source for students and teachers of gender studies or information technology, women’s advocacy groups, policy makers, NGOs, and technology developers.




Crafting Qualitative Research Questions


Book Description

The essence of research design is the ability to articulate your research question. The research question is the precursor to the study, and a well-crafted question encapsulates all of the design elements for that study. Based on more than 20 years of conducting research, collaborating with colleagues to formulate research projects, and experience advising doctoral students, author Dr. Elizabeth (Betsy) A. Baker forged a research design heuristic which she introduces in this book. She starts by dissecting the anatomy of a qualitative research question, outlines the role of paradigms in research design, describes strategies to use the anatomy as a design heuristic, and provides sample cases that track the decisions two researchers made while formulating a qualitative question. The book concludes with advice on how to move from the research question to the proposal. Throughout, the author provides handy worksheets that readers can complete as they work on crafting their own research question.




Financial Cryptography and Data Security


Book Description

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.




Human Enhancement Technologies and Our Merger with Machines


Book Description

A cross-disciplinary approach is offered to consider the challenge of emerging technologies designed to enhance human bodies and minds. Perspectives from philosophy, ethics, law, and policy are applied to a wide variety of enhancements, including integration of technology within human bodies, as well as genetic, biological, and pharmacological modifications. Humans may be permanently or temporarily enhanced with artificial parts by manipulating (or reprogramming) human DNA and through other enhancement techniques (and combinations thereof). We are on the cusp of significantly modifying (and perhaps improving) the human ecosystem. This evolution necessitates a continuing effort to re-evaluate current laws and, if appropriate, to modify such laws or develop new laws that address enhancement technology. A legal, ethical, and policy response to current and future human enhancements should strive to protect the rights of all involved and to recognize the responsibilities of humans to other conscious and living beings, regardless of what they look like or what abilities they have (or lack). A potential ethical approach is outlined in which rights and responsibilities should be respected even if enhanced humans are perceived by non-enhanced (or less-enhanced) humans as “no longer human” at all.




Active Learning for Digital Transformation in Healthcare Education, Training and Research


Book Description

Active Learning for Digital Transformation in Healthcare Education, Training and Research discusses the potential of advanced training of health professionals as a contributing factor to improve treatment outcomes. By reading this book, professionals who deal with patients with low health literacy will be prepared to promote better access to digital tools, understand the habits of users of health services, and empower engagement. The book contains a set of techniques and instruments associated with health literacy, communication skills and personal development that will enable their application in good daily practices and assist healthcare professionals to promote digital transformation to patients. This is a valuable resource for researchers, graduate students and healthcare professionals who are interested in learning more about how they can be an effective agent of change in healthcare. Discusses the potential of patient education through the training of health professionals to improve patient engagement and adherence to treatment Presents techniques from real-world examples to demonstrate the efficacy of better communication between health professionals and patients, especially in the digital medicine era Outlines digital tools that can be used to strengthen the healthcare professional-patient relationship




Ageing and Digital Technology


Book Description

This book brings together Sociologists, Computer Scientists, Applied Scientists and Engineers to explore the design, implementation and evaluation of emerging technologies for older people. It offers an innovative and comprehensive overview, not only of the rapidly developing suite of current digital technologies and platforms, but also of perennial theoretical, methodological and ethical issues. As such, it offers support for researchers and professionals who are seeking to understand and/or promote technology use among older adults. The contributions presented here offer theoretical and methodological frameworks for understanding age-based digital inequalities, participation, digital design and socio-gerontechnology. They include ethical and practical reflections on the design and evaluation of emerging technologies for older people, as well as guidelines for ethical, participatory, professional and cross-disciplinary research and practice. In addition, they feature state-of-the-art, international empirical research on communication technologies, games, assistive technology and social media. As the first truly multidisciplinary book on technology use among ageing demographics, and intended for students, researchers, applied researchers, practitioners and professionals in a variety of fields, it will provide these readers with insights, guidelines and paradigms for practice that transcend specific technologies, and lay the groundwork for future research and new directions in innovation.




Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data


Book Description

This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.




Methodological and Technological Issues in Technology Transfer


Book Description

This IPCC Special Report provides a state-of-the-art overview of how to achieve and enhance technology transfer to respond to global climate change.