Government information systems are big business (costing over 1 per cent of GDP a year). They are critical to all aspects of public policy and governmental operations. Governments spend billions on ...them - for instance, the UK alone commits L14 billion a year to public sector IT operations. Yet governments do not generally develop or run their own systems, instead relying on private sector computer services providers to run large, long-run contracts to provide IT. Some of the biggest companies in the world (IBM, EDS, Lockheed Martin, etc) have made this a core market. The book shows how governments in some countries (the USA, Canada and Netherlands) have maintained much more effective policies than others (in the UK, Japan and Australia). It shows how public managers need to retain and develop their own IT expertise and to carefully maintain well-contested markets if they are to deliver value for money in their dealings with the very powerful global IT industry. This book describes how a critical aspect of the modern state is managed, or in some cases mismanaged. It will be vital reading for public managers, IT professionals, and business executives alike, as well as for students of modern government, business, and information studies. Available in OSO: http://www.oxfordscholarship.com/oso/public/content/management/9780199296194/toc.html
Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the ...information age, and this is exactly what Jon R. Lindsay's Information Technology and Military Power gives us. As Lindsay shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. He highlights how personnel now struggle with their own information systems as much as with the enemy. Throughout this foray into networked technology in military operations, we see how information practice—the ways in which practitioners use technology in actual operations—shapes the effectiveness of military performance. The quality of information practice depends on the interaction between strategic problems and organizational solutions. Information Technology and Military Power explores information practice through a series of detailed historical cases and ethnographic studies of military organizations at war. Lindsay explains why the US military, despite all its technological advantages, has struggled for so long in unconventional conflicts against weaker adversaries. This same perspective suggests that the US retains important advantages against advanced competitors like China that are less prepared to cope with the complexity of information systems in wartime. Lindsay argues convincingly that a better understanding of how personnel actually use technology can inform the design of command and control, improve the net assessment of military power, and promote reforms to improve military performance. Warfighting problems and technical solutions keep on changing, but information practice is always stuck in between.
This open access book constitutes selected papers presented during the 30th Irish Conference on Artificial Intelligence and Cognitive Science, held in Munster, Ireland, in December 2022. The 41 ...presented papers were thoroughly reviewed and selected from the 102 submissions. They are organized in topical sections on machine learning, deep learning and applications; responsible and trustworthy artificial intelligence; natural language processing and recommender systems; knowledge representation, reasoning, optimisation and intelligent applications.
Today we are witnessing dramatic changes in the way scientific and scholarly knowledge is created, codified, and communicated. This transformation is connected to the use of digital technologies and ...the virtualization of knowledge. In this book, scholars from a range of disciplines consider just what, if anything, is new when knowledge is produced in new ways. Does knowledge itself change when the tools of knowledge acquisition, representation, and distribution become digital? Issues of knowledge creation and dissemination go beyond the development and use of new computational tools. The book, which draws on work from the Virtual Knowledge Studio, brings together research on scientific practice, infrastructure, and technology. Focusing on issues of digital scholarship in the humanities and social sciences, the contributors discuss who can be considered legitimate knowledge creators, the value of "invisible" labor, the role of data visualization in policy making, the visualization of uncertainty, the conceptualization of openness in scholarly communication, data floods in the social sciences, and how expectations about future research shape research practices. The contributors combine an appreciation of the transformative power of the virtual with a commitment to the empirical study of practice and use.
Over the last several decades, employers have increasingly replaced permanent employees with temporary workers and independent contractors to cut labor costs and enhance flexibility. Although ...commentators have focused largely on low-wage temporary work, the use of skilled contractors has also grown exponentially, especially in high-technology areas. Yet almost nothing is known about contracting or about the people who do it. This book seeks to break the silence.
Relations between the public and holders of political authority are in a period of transformative flux. On the one side, new expectations and meanings of citizenship are being entertained and ...occasionally acted upon. On the other, an inexorable impoverishment of mainstream political communication is taking place. This book argues that the Internet has the potential to improve public communications and enrich democracy, a project that requires imaginative policy-making. This argument is developed through three stages: first exploring the theoretical foundations for renewing democratic citizenship, then examining practical case studies of e-democracy, and finally, reviewing the limitations of recent policies designed to promote e-democracy and setting out a radical, but practical proposal for an online civic commons: a trusted public space where the dispersed energies, self-articulations and aspirations of citizens can be rehearsed, in public, within a process of ongoing feedback to the various levels and centers of governance: local, national and transnational.
This book is open access. This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ...ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies. Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.
Digital state at the leading edge Borins, Sandford F
Digital state at the leading edge,
c2007, 20070120, 2007, 2007-01-01, 2007-01-20, 20070101
eBook
Digital State at the Leading Edgeis the first attempt to take a comprehensive view of the impact of IT upon the whole of government, including politics and campaigning, public consultation, service ...delivery, knowledge management, and procurement.
This book places Indonesia at the forefront of the global debate about the impact of disruptive digital technologies. Digital technology is fast becoming the core of life, work, culture and identity. ...Yet, while the number of Indonesians using the Internet has followed the upward global trend, some groups — the poor, the elderly, women, the less well-educated, people living in remote communities — are disadvantaged. This interdisciplinary collection of essays by leading researchers and scholars, as well as e-governance and e-commerce insiders, examines the impact of digitalisation on the media industry, governance, commerce, informal sector employment, education, cybercrime, terrorism, religion, artistic and cultural expression, and much more. It presents groundbreaking analysis of the impact of digitalisation in one of the world's most diverse, geographically vast nations. In weighing arguments about the opportunities and challenges presented by digitalisation, it puts the very idea of a technological revolution into critical perspective.