A Concluding Pledge

Author(s):  
Mary Kirk

This book has offered one feminist’s perspective on how a deeper understanding of our dominator social system might clarify why women are underrepresented as developers, users, and beneficiaries of technology. I have suggested that we move beyond the attitude of simply providing access to the more encompassing goal of co-creating a partnership social system. This approach will increase the participation of women, as well as other currently underrepresented populations, in information technology. In the end, co-creating a partnership global IT industry is about building relationships founded in an attitude of empathy and caring that informs all of our human relations. Although I have attempted to offer a vision of what partnership in IT might look like in relation to media, language, education, and business, the best efforts to increase the participation of women as developers, users, and beneficiaries of technology will be broad-based, multifaceted, include many more perspectives than mine, and involve all of our social institutions. In earlier chapters, I have suggested some places to begin. Breaking through false assumptions about the purpose and relevance of women’s studies and feminist science studies, along with perspectives from many other disciplines, is a key to exploring a rich mine of ideas about how our current social system operates and how we might work together to co-create a more hospitable social climate for all. Undoing the damage done by dualistic thinking and stereotypes will take us a long way towards a richer understanding of our shared human experience. Reframing some of the core assumptions of the philosophy of science—primarily the founding assumption that science is male and nature is female—will offer new perspec tives from which to understand our increasingly complex scientific and technical knowledge tradition. Citizens of the United States of America have learned to think of themselves as members of the world’s greatest democracy. We call our nation the “land of opportunity” and we rely on the “myth of meritocracy” (the idea that anyone can achieve anything by their own efforts) without any acknowledgement of the institutionalized barriers that make it much harder for some. However, we have yet to live up to a true democratic ideal as a nation, and one of the reasons for this is the power of unnamed stereotypes. Learning more about the power of media as a social institution to shape our views about ourselves and one another is a critical component of any lasting social change. Henderson (1996) describes the global mass information system as a new kind of “government” that she calls a “mediocracy” run by large businesses and financial interests (p. 112). At the same time, Henderson also shares my hope for what the media could do if we all participated in information technology: “Mass media could become a national feedback mechanism by providing a random-access conduit for all the wisdom, creativity, and diversity of our citizens” (Henderson, 1996, p. 117). That is the potential that a partnership approach to information technology can help us manifest.

2020 ◽  
Vol 11 (2) ◽  
pp. 67-91
Author(s):  
Mustari Bosra

This paper is about the Islamization movement of the kingdoms in South Sulawesi, sointegrated sara 'is into a social institution called pangadereng (Bugis) angadakkang (Makassar). To ensure the upholding of Islamic law, which has been integrated into the social system, a religious bureaucracy (Islam) known aswas formed sara '. The royal bureaucratic officials who handle this institution, from the central level to the village or village level are called parewa sara ', which in this study uses the term daengguru. This integration pattern was developed in almost all Islamic kingdoms in South Sulawesi. Adat has its own field and sharia controls its own field. One another should not disturb each other. When the King of Bone La Maddarremmeng was about to confront Islam and customs, he was opposed by all parties. When Arung Matowa Wajo declared a strong Islamization, he was also evicted from his position.


2013 ◽  
Vol 4 (2) ◽  
pp. 46-57 ◽  
Author(s):  
Wooseok Dong ◽  
Kunio Shirahada ◽  
Michitaka Kosaka

In this paper, the authors propose a service value creation model based on sharing service experience. Experiences for services still remain in customers’ brain or heart after the services are finished. Their main aim is to share customers’ experiences and find suitable service by analyzing information shared after service providing. In the proposed model, the direct service field and the indirect service field are prepared. In the indirect service field, customers share their service experience by using Information Technology (Web2.0, Social Network). Suitable services can be found by analyzing information in the indirect service field. The effectiveness of this new model is demonstrated through its application to Korean language education during a 14week period.


2020 ◽  
Vol 87 (6) ◽  
pp. 2727-2753 ◽  
Author(s):  
Giovanni Mastrobuoni

Abstract An increasing number of police departments use information technology (IT) to optimize patrolling strategies, yet little is known about its effectiveness in preventing crime. Based on quasi-random access to “predictive policing,” this study shows that IT improves police productivity as measured by crime clearance rates. Thanks to detailed information on individual incidents and offender-level identifiers it also shows that criminals strategies are predictable. Moreover, the introduction of predictive policing coincides with a large negative trend-discontinuity in crime rates. The benefit–cost ratio of this IT innovation appears to be large.


2021 ◽  
Vol 5 (4) ◽  
Author(s):  
Xiaolong Feng

The application of modern information technology in College English teaching not only makes the teaching methods modernized, diversified and convenient, but also transform its teaching ideas, teaching modes and learning conditions. This paper analyzes the major challenges in teaching and learning faced by EFL education at the tertiary level under the background of internet plus foreign language education, including decline of college students’ motivation and engagement in English learning, transition problems from online learning to offline learning, and teachers’ lack of information technology competence. To address the above listed challenges, this paper puts forward corresponding solutions to better meet the requirements of the “Internet plus” era.


Author(s):  
Mehdi Asheghi ◽  
Yizhang Yang ◽  
Sadegh M. Sadeghipour ◽  
James A. Bain ◽  
Katayun Barmak ◽  
...  

By all measures, the data storage industry is one of the most important components of the Information Technology (IT) revolution. In recent years, many of the emerging technologies rely heavily on energy transport at extremely short time and length scales as a mean to overcome the superparamagnetic limit - a serious impediment to future advancement of storage technology. Additionally, thermally induced failure and reliability issues at the nanoscale are becoming increasingly important due to rapid device miniaturization in data storage applications. Further advances in high-technology data storage systems will be difficult, if not impossible, without rigorous treatment of nanoscale energy transport. This manuscript reviews the thermal design issues and challenges in thermally assisted magnetic disk recording, thermally assisted scanned probe recording, phase change optical data recording, magnetoresistive random access memory (MRAM) and giant magnetoresistive (GMR) heads. Relevant thermally induced failures in GMR heads, write coil, interconnects and MRAM will be discussed as well.


Author(s):  
Wendy Cukier

Attention to women’s low participation in information technology is framed in Canada and elsewhere in terms of concern over availability of well-qualified human resources (ITAC & IDC, 2002) as well as equity issues (Applewhite, 2002; Ramsey & McCorduck, 2005). In most of these discussions, IT Professional is equated with Computer Scientist or Engineer in spite of the evidence that the profession is more diverse. This article suggests that while those directions are worthwhile, the very definition of “information technology professional” framed in the discourse may have unintended consequences which tend to exclude women. Framed by the literatures on gender and institutionalization of professions, this article applies critical discourse analysis to a variety of “texts” concerning the IT profession in Canada as well as available empirical data. Critical discourse analysis focuses on surfacing the political structures which underlie taken for granted assumptions (Fairclough, 1995). We maintain that while it is critically important to continue to attract females to study computer science and engineering, it is equally important to ensure that multiple paths are available and respected and that narrow definitions are not systemic barriers to the participation of women in the IT profession. In addition, more inclusive definitions which broaden the perspective on information technology (and match the reality of the industry) will promote good technology practices.


Author(s):  
Mary Kirk

Education is another of the primary social institutions from which we learn the values, attitudes, beliefs, and behaviors of a dominator culture. A discussion of education as a social institution embraces: (1) how we come to know (epistemologies); (2) the methods of teaching and learning (pedagogies); and (3) what we know, the content of our knowledge tradition. In Chapter III, I explored some ideas about epistemological barriers to women in IT education related to our philosophy of science. For example, some scholars have argued that since more women tend to be concrete learners, and more men tend to be abstract learners, women may be less comfortable with the abstract approaches that predominate in science and IT education (Belenky, 1986; Estrin, 1996; Goldberger, 1996; Greenbaum, 1990; Keller, 1992; Kramer & Lehman, 1990; Riger, 1992; Rosser, 1995; Turkle & Papert, 1990). In Chapter IX, I will address questions of epistemology and pedagogy in more depth as I propose a partnership model of education. In this chapter, I would like to focus on the third issue, that is, the content of our knowledge tradition. This chapter explores: (1) our incomplete knowledge tradition; (2) a brief her-story of women in math, engineering, and IT; and (3) the ins and outs of women’s education and employment in these fields.


Author(s):  
Mary Kirk

Language as a social institution is the primary symbol system through which we teach/learn about our dominator culture. The assumptions, values, attitudes, beliefs, and behaviors that are considered “normative” are deeply embedded in our language and communication style. The “language of domination” features “shoulds and musts, blame and criticism, [and] judgment and demand,” all of which privileges certain groups and suppresses others according to their “appropriate” social rank (Hart, 2004, p. 114). Language is also one of the powerful mechanisms for teaching and conveying stereotypes; the significant impact of which we have already explored. Further, without a great deal of mindful effort, the average person conforms to stereotypes of language and communication style without even being aware of it. Johnson (2006) describes how most of us learn to take the “path of least resistance” with regard to social expectations of ourselves and of others. This also points to the necessity for what feminist activists and scholars have called “consciousness raising.” Once we become conscious of the ways in which our language and communication style reflect dominator stereotypes that have taught us false models for how to think about ourselves and each other, we can make conscious choices to do things differently. This chapter explores the following concepts in an effort to chart the map down the “path of resistance” to a dominator social system: (1) why political correctness matters; (2) gendered communication style; (3) malecentered IT communication style and culture; and (4) dominance, violence, and sex metaphors in IT.


Sign in / Sign up

Export Citation Format

Share Document