Your points will be added to your account once your order is shipped. Click on the cover image above to read some pages of this book! This book grew out of the conviction that the preparation and management of large-scale technological projects can be substantially improved. We have witnessed the often unhappy course of societal and political decision making concerning projects such as hazardous chemical installations, novel types of electric power plant or storage sites for solid wastes.
Special Topics Courses
This has led us to believe that probabilistic risk analysis, technical reliability analysis and environm, ental impact analysis are necessary but insufficient for making acceptable, and justifiable, social decisions about such projects. There is more to socio-technical decision making than applying acceptance rules based on neglige ably low accident probabilities or on maximum credible accidents.
Consideration must also be given to psychological, social and political issues and methods of decision making. Our conviction initially gave rise to an international experts' workshop titled 'Social decision methodology for technological projects' SDMTP and held in May at the University of Groningen, the Netherlands, at a time when Cvetkovich spent a sabbatical there.
The work- shop - aimed at surveying the issues and listing the methods to address them - was the first part of an effort whose second part was directed at the production of this volume. Plans called for the book to deal systematically with the main problems of socio-technical decision making; it was to list a number of useful approaches and methods; and it was to present a number of integrative conclusions and recommendations for both policy makers and methodologists.
Help Centre. Track My Order. My Wishlist Sign In Join. Vlek Editor , George Cvetkovich Editor. Be the first to write a review. Add to Wishlist. Monday, Tuesday, Thursday pmpm. Div Bhansali. Whether it's in-store shopping, online commerce, transportation, health care, fitness, law enforcement, entertainment or informal social interaction, our activities are increasingly "datafied.
In this course, we will explore the datafication of various arenas of activity, the nature of the digital data involved, and the implications for information professionals. Students will learn object-oriented programming, data structures, algorithm analysis, and data processing techniques in the context of information science topics such as metadata harvesting, information retrieval, text analysis, and user interfaces.
The course combines conceptual understanding of data structures and algorithms with practical techniques for implementation and debugging. Uses the Python language. It also touches upon the methodological approaches used in such research, as well as the deciphering of what is 'informational' in any setting.
- About this book.
- Table of contents.
- Signup for our Newsletter.
Topics considered include: 1 contextual elements e. Take this course! A survey class about data management and data services, it requires NO experience with math or statistics. As library and information science students, you all have enough background to succeed in this course. Participants in this course, similar to other survey courses about specialized professions, will have the chance to learn special sources in which to find data, and special tools with which to manipulate them.
You will have the chance to select some of your own assignments to customize your experience to your particular interests. Even if you plan to work in another specialty, awareness of data and data tools can substantially strengthen your resume. Students interested in any library environment are encouraged to enroll. Using a fictional company profile, students will walk through a complete security review of a small company from soup to nuts, using each area as an excuse to delve into security technology and management and connecting technical reviews of packets and software to the IT processes that control them.
Students should leave comfortable with the use of common security tools, with identifying and prioritizing the risks present in an IT system, and with presenting their findings to a non-technical audience. The course will introduce students to major legal publishers, databases, and vendors. Students will learn a complete method for conducting basic legal research. The course will introduce and explain primary legal materials, including statutes, court opinions, and administrative law, as well as a variety of secondary sources and practice materials.
The course also covers free, low-cost, and cost efficient research.
You are here
The course will introduce students to the different types of law libraries, including academic, private, and government libraries, and will cover issues including governance, standards and policies in law libraries. Students will learn about the variety of roles taken on by law librarians in collection management, reference, digitization, and management.
Drawing on recent law library scholarship as readings, students will be tasked with handling real-world decisions regarding collection development, negotiating with vendors over licensing agreements, dealing with cost-recovery for legal research tools, educating new attorneys on legal research, preserving print and digital content, and managing print and electronic collections. We will review historical and present-day cases of misinformation. We will consider the implications of misinformation and how to address it, with an emphasis on anticipating the potential outcomes positive and negative of possible solutions.
Class preparation will be varied and include scholarly and popular literature, long-form journalism, and video, but may also include activities or social media. Faculty in biomedical and health informatics based in UNC will be participating as guest lectures in the course. Using a range of tools from Facebook to Twitter, from satellite modems to landlines to ad-hoc mesh networks, these movements have made their mark in history. The objective of this course is to enhance our conceptual and empirical understanding of the interaction between the new media ecology and social change.
We will explore various approaches to studying social movements and social change and look at specific cases. Governments and powerful institutions are also responding to the challenge posed by the emergence of the Internet as a mundane and global technology. From increased surveillance and filtering capacity, to delivering propaganda over the Internet to their own, from "hacking" of dissident websites to sophisticated methods of censorship, governments around the world are broadening their repertoire of social, technical and legal tools for control and suppression of --and through-- the Internet.
We will explore the integration of new media tools within these movements as well governmental and institutional responses to these developments.
Special Topics Courses | inluthosi.tk
We will also discuss the rapidly changing and contested terrain for shaping the infrastructure of global connectivity. Materials for this class will include readings, videos not to be viewed in class but as material to be viewed , and a variety of visiting speakers both in person and via Skype. The balance between the social and environmental issues is governed by Information and Communication Technologies ICT that power a smart city infrastructure.
In this course, we learn about the influence of urban networks, smart city urban planning, energy as a catalyst of sustainable development, smart city infrastructure, sustainable transportation, flow of information and communications, smart grids, digital infrastructure and the role of data and information technology.
We will discuss criteria for measuring the smartness of a city, including quality of life, citizen governance, and discuss issues that go towards the making of a future smart city.
Several case studies will be presented with guest lecturers invited to present on critical thinking and practices in smart city development. Our explorations during the course will emphasize social justice and inclusiveness as fundamental concepts.
This course provides fundamental skills needed to design, implement, and maintain computer applications focused on information processing, management, retrieval, and presentation. This course provides an introduction to the fundamentals of defining, developing, and administering rare book collections. Learning will be accomplished through class lectures, outside assigned readings, and the hands-on examination of books as artifacts.
Survey of information and its needs in the social sciences, with an emphasis on information use and search strategies and on reference and other information resources. Survey of information and its needs in the humanities, with an emphasis on information use and search strategies and on reference and other information resources. In this seminar we will focus on how Jordan Lake is the nexus of a water-food-energy resource for our region.
This will include the tributaries and land around the lake and how the long-term sustainability of the region can benefit by leveraging good information to change human and enterprise behaviors toward more economical and environment-friendly patterns. The seminar will include field trips to meet with stakeholders and will culminate in information 'packages' that aim to inform people about how behaviors influence the local water-food-energy nexus.
A follow up course will be offered in the Spring semester that aims to take the information packages and develop an action plan to promote public awareness and behavior change. Some of the types of stories covered will include: stories that inspire trust or confidence, stories that give insight into your character and motivations, and stories that tactfully give advice.
This course will contain a performance element. Knowledge of programming is essential.
Social Decision Methodology for Technological Projects
These include: UX lifecycle, interaction models, contextual inquiry, modeling and task analysis, rapid evaluation and inspection techniques, UX goals and metrics, formal and informal evaluation techniques, usability moderation, test plans, testing environments, analysis, and reporting. A number of archivists are advocating for a new, collaborative model of archiving that empowers communities to look after their own records "by partnering professional archival expertise with communities' deep sense of commitment and pride in their own heritage and identity.
Scenarios in which emotions are motivators, by-products, and consequences of human information interactions are considered, as is the spectrum of emotions, from the positive and even profound to the negative and problem-fraught. Both theoretical and empirical literature will be considered, and students will become familiar with one 'affectively amenable' methodological technique—the guided tour—applying it in a small-scale, individual, and original research study. Issues covered include text encoding, digital scholarly editing, the creation of custom corpora, distant reading techniques, and natural language processing.
No programming background is required, although we will do some programming in class. By the end of the course, students will have read a number of seminal articles in the field, encoded a text in TEI, created their own custom corpus, and done some basic textual analysis on their corpus. We will cover a brief history of orality, discuss modern unmediated oral transmission such as face-to-face conversations , modern mediated oral transmission such as YouTube , and oral communications that have been rendered obsolete by text.
We will ask questions such as: How has the spoken word changed over time? What do we lose when oral communication becomes mediated? What do we gain? What motivates us to keep talking to each other?