Search results

1 – 10 of 580
Open Access
Article
Publication date: 9 October 2019

Luke Bacon, Kathleen Azali, Alexandra Lara Crosby and Benjamin Forster

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

2989

Abstract

Purpose

The purpose of this study is to identify shared themes and concerns of two local and critical archives by comparing their design and day-to-day practice.

Design/methodology/approach

The action research has drawn on the experience of collaboration between a Sydney-based community space (Frontyard) and the Surabaya-based co-working community (C2O) over one year. Each space houses a small physical library of books, which is the focus of this analysis.

Findings

Hacking has emerged as a key value of both archives. A hacking approach has shaped the design of each space and the organisation each archive. Hacking frames the analysis of each collection in this study.

Practical implications

Pragmatic and political understanding of such archives have implications for better quality and more authentic exchange between the communities that make use of these libraries in Indonesia and Australia.

Originality/value

While some work on local critical archives has been done in Indonesia and Australia, no research to date has made specific comparisons with the aim of sharing knowledge. Because these archives are often temporary and ephemeral, documenting the work that goes into them, and their practitioners’ perspectives, is urgent, making possible shared knowledge that can inform the ways communities make decisions about their own heritage.

Details

Global Knowledge, Memory and Communication, vol. 68 no. 8/9
Type: Research Article
ISSN: 2514-9342

Keywords

Open Access
Article
Publication date: 29 April 2020

P.J. White, Hannah R. Marston, Linda Shore and Robert Turner

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with…

Abstract

In March 2020 the United Nations published an open brief for the creative community to propose interventions to the unfolding COVID-19 pandemic. However, when faced with unprecedented wicked problems such as these, the rigour of design and creative processes can tested. COVID-19 has demonstrated how important human centred design responses are in understanding the worldviews and ecosystems of users. Ad hoc design responses or design hacks have demonstrated that they have a role to play in how we create our future individual, community and societal ecosystems.

In terms of age friendly design, this pandemic makes us envision what should be, furthermore, how we could create better products and services through technology. For our ageing communities “Cocooning” and other social restriction measures have exposed technological deficiencies for the needs of older people and opens up questions of our future preparedness for a growing ageing society. Now more than ever, designers need to understand the behavioural mind-set of older people in their own ecosystem and understand existing mental models.

In this opinion piece we posit what acts of design hacking can lead us to greater understanding of users mental models and therefore better understanding of technology needs for both older and younger adults. While presenting various examples of how design hacking is conducted by citizens and participants alike, it shows that it offers designers differing perspectives, experiences and inspiration for technology.

Details

Emerald Open Research, vol. 1 no. 2
Type: Research Article
ISSN: 2631-3952

Keywords

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Open Access
Article
Publication date: 6 August 2024

Amir Fard Bahreini

Data breaches in the US healthcare sector have more than tripled in the last decade across all states. However, to this day, no established framework ranks all states from most to…

Abstract

Purpose

Data breaches in the US healthcare sector have more than tripled in the last decade across all states. However, to this day, no established framework ranks all states from most to least at risk for healthcare data breaches. This gap has led to a lack of proper risk identification and understanding of cyber environments at state levels.

Design/methodology/approach

Based on the security action cycle, the National Institute of Standards and Technology (NIST) cybersecurity framework, the risk-planning model, and the multicriteria decision-making (MCDM) literature, the paper offers an integrated multicriteria framework for prioritization in cybersecurity to address this lack and other prioritization issues in risk management in the field. The study used historical breach data between 2015 and 2021.

Findings

The findings showed that California, Texas, New York, Florida, Indiana, Pennsylvania, Massachusetts, Minnesota, Ohio, and Georgia are the states most at risk for healthcare data breaches.

Practical implications

The findings highlight each US state faces a different level of healthcare risk. The findings are informative for patients, crucial for privacy officers in understanding the nuances of their risk environment, and important for policy-makers who must grasp the grave disconnect between existing issues and legislative practices. Furthermore, the study suggests an association between positioning state risk and such factors as population and wealth, both avenues for future research.

Originality/value

Theoretically, the paper offers an integrated framework, whose basis in established security models in both academia and industry practice enables utilizing it in various prioritization scenarios in the field of cybersecurity. It further emphasizes the importance of risk identification and brings attention to different healthcare cybersecurity environments among the different US states.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2635-0270

Keywords

Open Access
Article
Publication date: 4 December 2017

Se-Chang Oh, Min-Soo Kim, Yoon Park, Gyu-Tak Roh and Chin-Woo Lee

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain…

11511

Abstract

Purpose

The centralized processes of today’s power trading systems are complex and pose a risk of price tampering and hacking. The decentralized and unmodifiable nature of the blockchain technology that has recently been highlighted offers the potential to improve this power trading process. The purpose of this study is to implement a system to apply the blockchain technology to the problem of power trading.

Design/methodology/approach

The authors modeled the power trading problem as the interaction between admin, producer and consumer nodes. And a power trading scenario has been created for this model using a blockchain platform called Multichain which is both fast and highly scalable. To verify this scenario, they implemented a trading system using Savoir, a Python-based JsonRPC module.

Findings

Experimental results show that all processes, such as blockchain creation, node connectivity, asset issuance and exchange transactions have been correctly handled according to the scenario.

Originality/value

In this study, the authors have proposed and implemented a power trading method that determines price according to the pure market principle and cannot be manipulated or hacked. It is based on the nature of blockchain technology that is decentralized and cannot be tampered.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 3
Type: Research Article
ISSN: 2071-1395

Keywords

Content available
Article
Publication date: 1 September 2001

Mark Henych

780

Abstract

Details

Policing: An International Journal of Police Strategies & Management, vol. 24 no. 3
Type: Research Article
ISSN: 1363-951X

Keywords

Content available
Book part
Publication date: 27 November 2018

Abstract

Details

Networks, Hacking, and Media – CITA MS@30: Now and Then and Tomorrow
Type: Book
ISBN: 978-1-78769-666-2

Open Access
Book part
Publication date: 19 November 2020

Judy Chang

Women who use drugs are one of the most maligned, misunderstood and maltreated groups in contemporary culture and society. Despite this, little public outcry nor empathy is given…

Abstract

Women who use drugs are one of the most maligned, misunderstood and maltreated groups in contemporary culture and society. Despite this, little public outcry nor empathy is given. As a woman who uses drugs, the author examines what lies behind this neglect. A post-structuralist approach is taken in order to examine the categories of meaning assigned to bodies under the twin ruling structures of prohibition and patriarchy. This is done with the intent to better understand and challenge the process of (masculinist) knowledge-making and practices surrounding women who use drugs that treats us as mere objects of knowledge. Furthermore, this chapter draws from feminist auto-ethnography, as the author uses own personal experiences as a woman who uses drugs, a feminist and a drug user advocate as a lens through which to give form to this analysis. Ultimately, the author argue that it is time to let go of outdated, unjust and prejudicial images by challenging established norms and practices, test and apply new theories and negotiate different identities outside of those currently available to women who use drugs. In undertaking this piece, the author hopes that the critical reflections contained within this chapter can ‘cause some trouble’, by being politically useful for the growing movement surrounding women who use drugs.

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

Open Access
Article
Publication date: 7 July 2023

Julianna Faludi

Social hackathons are events designed to craft social change using technology that enables citizen empowerment or addresses societal issues by deploying data. Hackathons provide a…

1046

Abstract

Purpose

Social hackathons are events designed to craft social change using technology that enables citizen empowerment or addresses societal issues by deploying data. Hackathons provide a framework for organizing to help create prototypes and business models through interaction with technology. The relevance of the sociomateriality of the emergent technology (prototype) and organizational structure raises the question if viable and impactful solutions can be developed within such frames.

Design/methodology/approach

This study applies an inductive research methodology based on ethnographic participant observation, interviews with participants and event organizers, and qualitative insights from surveys.

Findings

Events such as social hackathons are centered around technology and share a vision of creating opportunities for change. The materiality of prototypes may define their interaction patterns. The differentiation of the embodiment and emergent structuration of technology may be a breaking point for in-group dynamics and a barrier to social innovation. The emergent structuration of technology with a longer initial phase of problem definition and ideation within a group was found to have more potential for impactful embodiment with the technological artifact. Some cases reveal that “expert” participants who shared visions of change enabled by technology were constrained by other members.

Originality/value

The paper suggests an extended view on the connection of sociomateriality, organizing and social impact.

Details

Journal of Organizational Ethnography, vol. 12 no. 2
Type: Research Article
ISSN: 2046-6749

Keywords

1 – 10 of 580