Last Post
Thursday, May 26, 2016
0
comments
I no longer update this blog but won't delete it for sentimental reasons :) You are welcome to read old posts.
Labels:
The other day I googled my name. Most of the hits I got were expected. Information about me which I knew was searchable, because I had made the decision to make that data public previously. Some hits were from data aggregators showing profiles made up with data taken from various other websites. All of these were wrong of course having taken data without my consent (although that data are public I haven't agreed for them to be used by another website) and without me verifying its accuracy and quality. These aggregators mix data that is mine with data from people with similar names. The result is of course an unreliable and unethical source of information. This isn't good, is it? Anyway, even if I don't like this I was kind of expecting this kind of links.
You may have read (a lot) about online privacy recently, privacy on social networks and web applications that feed or are fed by social networks. I am also a user of those networks and hear/read what people are saying. People are either, ignorant or panicking, afraid of the unknown, unable to control what is happening to their data or at least not knowing if the controls they apply actually work. Being technology literate myself I sometimes doubt if my data are safe out there, I am concerned too. So I thought about blogging about this. This is what is happening, from my point of view anyway.
I’ve been on Twitter for over a year now and I have to say my opinion of it has changed a bit. http://clk0.blogspot.com/2009/08/this-is-what-i-think-about-twitter.html I joined when a friend of mine, Dr T, told me it was fun and that he found it extremely useful. I have to say that I find it useful too but perhaps not at the same level. Dr T’s experience has been quite different from mine.
Atkinson and Brooks (2003) see the reflective monitoring of actions as not accounting for conscious, dramatic change. That is, for overt initiatives, such as the implementation of an information system in an organization, which can interrupt the flow of slow change to impose new technologies. This means that there is one actor or actors (e.g., the IT department) which is consciously trying to solve a problem by changing the structures (and interpretive schemes, norms and facilities) of their users. However Jones and Karsten (2008) disagree and state that the dimensions of the duality of structure already account for emancipatory change in every instant of action. That is, the actions of the IT department could be studied by the use of the modalities and considering the reflective monitoring of actions of Software developers' own actions and the ones of their users.
From the above one can understand what a student needs and why... of course this is a very limited example, but I hope you get my point.
Orlikowski, W. J., (2000), 'Using Technology and Constituting Structures: A practice Lens for Studying Technology in Organizations', Organisation Science, 11, no.4: 404-428
.