Archive as Medium

2018 ◽  
Vol 47 (2) ◽  
pp. 45-53
Author(s):  
Virginia A. Dressler

AbstractThis article will explore the idea of the archive as medium, with sub-themes of neutrality, silence, and truth. An archive can serve as the intermediary in the construction of the archival series and collections around a central theme or scope. The messages bound in the archival container are selected to fit into an archival series or collection to reiterate or document a particular aspect. Archival collections have the power and effect of creating cumulative viewpoints over time by way of the contained messages. Selected case studies of more recent user-generated digital archives will be explored in context to these themes; such as A People’s Archive of Police Violence in Cleveland and Take Back the Archive (University of Virginia).

2021 ◽  
Vol 17 (3) ◽  
pp. 1-38
Author(s):  
Lauren Biernacki ◽  
Mark Gallagher ◽  
Zhixing Xu ◽  
Misiker Tadesse Aga ◽  
Austin Harris ◽  
...  

There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. This results in specific point defenses that aim to patch particular vulnerabilities. While these defenses are valuable, they are often blindsided by fresh attacks that exploit new vulnerabilities. This article aims to address this issue by suggesting ways to make future defenses more durable based on an organization of security vulnerabilities as they arise throughout the program life cycle. We classify these vulnerability sources through programming, compilation, and hardware realization, and we show how each source introduces unintended states and transitions into the implementation. Further, we show how security exploits gain control by moving the implementation to an unintended state using knowledge of these sources and how defenses work to prevent these transitions. This framework of analyzing vulnerability sources, exploits, and defenses provides insights into developing durable defenses that could defend against broader categories of exploits. We present illustrative case studies of four important attack genealogies—showing how they fit into the presented framework and how the sophistication of the exploits and defenses have evolved over time, providing us insights for the future.


Author(s):  
Leif M. Burge ◽  
Laurence Chaput-Desrochers ◽  
Richard Guthrie

Pipelines can be exposed at water crossings where rivers lower the channel bed. Channel bed scour may cause damage to linear infrastructure such as pipelines by exposing the pipe to the flow of water and sediment. Accurate estimation of depth of scour is therefore critical in limiting damage to infrastructure. Channel bed scour has three main components: (1) general scour, (2) bed degradation, and (3) pool depth. General scour is the temporary lowering of the channel bed during a flood event. Channel bed degradation is the systematic lowering of a channel bed over time. Pool depth is depth of pools below the general bed elevation and includes the relocation of pools that result from river dynamics. Channel degradation is assessed in the field using indicators of channel incision such as channel bed armoring and bank characteristics, through the analysis of long profiles and sediment transport modelling. Pool depth is assessed using long profiles and channel movement over time. The catastrophic nature of bed lowering due to general scour requires a different assessment. A design depth of cover is based on analysis of depth of scour for a given return period (eg. 100-years). There are three main steps to predict general scour: (1) regional flood frequency analysis, (2) estimation of hydraulic variables, and (3) scour depth modelling. Typically, four scour models are employed: Lacey (1930), Blench (1969), Neill (1973), and Zeller (1981), with the average or maximum value used for design depth. We provide herein case studies for potential scour for pipeline water crossings at the Little Smoky River and Joachim Creek, AB. Using the four models above, and an analysis of channel degradation and pool depth, the recommended minimum depth of cover of 0.75 m and 0.142 m, respectively, were prescribed. Variability between scour models is large. The general scour model results varied from 0.45 m and 0.75 m for the Little Smoky River and 0.16 m to 0.51 m for Joachim Creek. While these models are more than 30 years old and do not adequately account for factors such as sediment mobility, they nevertheless do provide usable answers and should form part of the usual toolbox in water crossing scour calculations.


2014 ◽  
Vol 11 (2) ◽  
pp. 461-480 ◽  
Author(s):  
Nuno Castela ◽  
Paulo Dias ◽  
Marielba Zacarias ◽  
José Tribolet

Business process models are often forgotten after their creation and its representation is not usually updated. This appears to be negative as processes evolve over time. This paper discusses the issue of business process models maintenance through the definition of a collaborative method that creates interaction contexts enabling business actors to discuss about business processes, sharing business knowledge. The collaboration method extends the discussion about existing process representations to all stakeholders promoting their update. This collaborative method contributes to improve business process models, allowing updates based in change proposals and discussions, using a groupware tool that was developed. Four case studies were developed in real organizational environment. We came to the conclusion that the defined method and the developed tool can help organizations to maintain a business process model updated based on the inputs and consequent discussions taken by the organizational actors who participate in the processes.


2014 ◽  
Vol 29 (2) ◽  
pp. 114-127 ◽  
Author(s):  
Anne Quaadgras ◽  
Peter Weill ◽  
Jeanne W Ross

As digitization becomes pervasive, many organizations struggle to drive value from the growing number of IT-related opportunities. We show how the drivers of IT value creation can be framed as firm-wide commitments to a set of IT capabilities. On the basis of 20 published case studies, we identify a small set of IT decisions that organizations must make to use IT to successfully enhance their impact. We group these decisions into a framework of four commitments. Making these commitments helps organizations reinforce what really matters over time, which in turn helps focus the attention of their employees. We demonstrate, via a survey of 210 publicly traded firms, that firms which are more effective in making these four commitments have higher business impact from IT, which in turn correlates with higher financial performance. We suggest the construct of commitment is a step toward unifying the IT value literature and creating an overarching concept that brings together many of the important management practices identified in previous work.


2022 ◽  
pp. 073401682110710
Author(s):  
Benjamin P. Comer ◽  
Jason R. Ingram

This research note empirically assessed similarities and differences among three open-source data sets from 2015-2019. Fatal police shooting incidents were compared across Washington Post, Mapping Police Violence, and Fatal Encounters data over a five-year period. One-way ANOVAs, bivariate correlations, and proportional percentage differences were used to examine mean differences, correlational strength, and yearly percentage difference trends. No significant mean differences were observed between Fatal Encounters, Mapping Police Violence, and Washington Post. With one exception, bivariate correlations between all three data source dyads were consistently strong. Percentage difference comparisons among data source dyads, however, revealed that the sources are becoming more dissimilar in their reporting of fatal shootings over time. Our results complement existing literature that has compared open-source police shooting data to government sources and suggest that the three data sources were strongly associated with one another from 2015-2019. Increasing differences between sources, however, necessitate continued inspection of the data across the various open-source platforms over time.


Author(s):  
Alfonso Siano ◽  
Mario Siglioccolo ◽  
Carmela Tuccillo ◽  
Francesca Conte

This chapter investigates the possible relationships between cultural institutions (museums, theatres, libraries etc.) and companies, which have been increasingly occurring in the last years. While cultural institutions have been progressively needing to acquire financial resources and managerial skills to survive and valorise their activities, at the same time companies are trying new ways to differentiate their image, by means of associating it with the cultural sector. The adoption of a descriptive-normative approach enables the identification of many kinds of collaboration (patronage and corporate philanthropy, volunteer program and payroll giving, cause related marketing, cultural sponsorship, co-branding, licensing and merchandising, electronic relationships, and finally, partnership), distinguished according to the intensity and duration over time. For each relationship, mutual benefits and disadvantages are described in detail, even with the support of real case studies. This joint consideration of the various possible relationships aims to provide an overall view of the issue considered, which differentiates this contribution from the literature so far produced.


Author(s):  
Frank Schimmelfennig ◽  
Thomas Winzen ◽  
Tobias Lenz ◽  
Jofre Rocabert ◽  
Loriana Crasnic ◽  
...  

This chapter introduces the case studies. It describes the rationale for studying cases, our case selection, and the structure of the case study chapters. The case studies offer an opportunity to examine the conditions under which international organizations establish international parliamentary institutions (IPIs) in more detail, take into account alternative configurations of conditions for IPI establishment, and trace the processes of strategic democratic legitimation. In addition, the cases include some of the rare cases of empowerment, in which IPIs increase their authority over time. The case selection aims at a diverse set of cases representing positive and negative cases of IPI establishment, a variety of world regions and historical periods, and stark variation across the conditions of parliamentarization.


2018 ◽  
pp. 124-177
Author(s):  
Laura Kounine

This chapter deals with the role of the self and conscience in defending oneself against the charge of witchcraft. To add depth to intellectual concepts—and teleologies—of the self, we must understand how the individual self was understood, felt, and experienced. Particularly for the crime of witchcraft, the crux of the trial was premised on the moral question of what kind of person would commit such a crime. Those on trial for witchcraft in the Lutheran duchy of Württemberg invoked the idioms of ‘mind’, ‘conscience’, ‘heart’, or ‘self’ in constructing their defence. Through four case studies, ranging from 1565 to 1678, this chapter examines the different ways in which people could conceptualize their person, and shows that change over time in the ‘development’ of the modern self was not a uniform or directly linear pattern.


2020 ◽  
Vol 12 (24) ◽  
pp. 10234
Author(s):  
Javier Rodrigo-Ilarri ◽  
Claudia P. Romero ◽  
María-Elena Rodrigo-Clavero

For the first time, this paper introduces and describes a new Weighted Environmental Index (WEI) based on object-oriented models and GIS data. The index has been designed to integrate all the available information from extensive and detailed GIS databases. After the conceptual definition of the index has been justified, two applications for the regional and local scales of the WEI are shown. The applications analyze the evolution over time of the environmental value from land-use change for two different case studies in Spain: the Valencian Region and the L’Alcora municipality. Data have been obtained from the Spanish Land Occupation Information System (SIOSE) public database and integrate GIS information about land use/land cover on an extensive, high-detailed scale. Results demonstrate the application of the WEI to real case studies and the importance of integrating statistical analysis of WEI evolution over time to arrive at a better understanding of the socio-economic and environmental processes that induce land-use change.


2020 ◽  
Vol 28 (3) ◽  
pp. 588-612
Author(s):  
Mark Henaghan

Abstract Article 5 of the UN Convention on the Rights of the Child recognises the importance of parents and wider family members in ensuring that children are given appropriate directions on their rights in the UN Convention on the Rights of the Child. This paper analyses the wording of Article 5 and four New Zealand case studies to test the possible interpretations of Article 5. The paper builds on the work of Landsdown and Kamchedzera (Landsdown, 2005; Kamchedzera, 2012) who have done previous comprehensive analyses of the ambit and significance of the wording in Article 5. Article 5, like all international instruments, is not designed to provide prescriptive answers to challenging problems where there is a clash of which rights should prevail for children in particular situations. The central theme of this paper is that where there is a clash of a child’s rights, the tiebreaker should be which right in the particular situation will best enhance the unique identity of a particular child. The paper draws on the work of Ronen (Ronen, 2004) which argues that the purpose of a child’s rights framework is so the child can construct their individualised identity which is authentic and real for that particular child. The New Zealand case studies have been chosen to exemplify particular aspects of Article 5 and see how they are played out in particular court settings and whether the outcome enhances or inhibits the child’s opportunity to develop their unique identity.


Sign in / Sign up

Export Citation Format

Share Document