33 Matching Annotations
  1. Oct 2022
    1. For example, a driver may deem it possible to takeover immediately, yet the vehicle, detecting changes in the driver's physical or cognitive state, may not agree with the driver's own perceived ability. This perception of ability, along with SA and mental model, affect alternatives that qualify as being “actionable” (i.e., those that the entity deems or believes as being possible, even though this alternative may not truly be possible).

      Que pasa en casos como el del avión en el Hudson.

  2. Sep 2022
    1. For automation definitely eliminates the need for a vast number of workers, including skilled, semi-skilled, unskilled, and middle-class clerical workers.

      But automation has created the need for new types of workers, that are deeply exploited. ex: facebook moderators, fact-checkers, even bitcoin miners...

    2. "Next time tell him the work is scheduled, and then if he refuses you can fire him because we have the sole right to schedule production as we see fit."

      Fear control.

    1. (1) Different kinds of knowledgefields with different socialand cognitive organization.(2) Different languages for special purposes (LSP)(3) Different kinds of research methods(4) Different kinds of, among other things, primary, sec-ondary and tertiary documents(5) Different patterns of cognitive authority.(6) Differentsemantic distancesbetween questions anddocuments (cf. Brooks, 1995

      A problem for interdisciplinarity?

    2. I have uncovered four basic kinds ofmethods: (a)rationalistic methods(as known from, e.g.,Ranganathan and the facet-analytic tradition); (b)empiricalmethods(as known from, e.g., the bibliometric method ofco-citation analysis); (c)historical methods(see, e.g., Hjør-land, 2000b); (d)pragmatic methods, focusing on goals andvalues, and connected to, for example, feminist and criticalapproaches to knowledge organization

      proper methods for cognitive analysis and IS?

    3. ognition the way bi-ologists treat any organ, namely, as an adaptation.”

      Two paths: cognition as an adaptation (close to biology) vs. cognition as top-down ICM

    4. ften the mainproblem in cognitive research is the kinda of perspectivesthat are omitted because of implicit rationalistic assump-tions.

      Assumptions hinder perspectives, affecting research. Author suggests one should recognize and challenge those assumptions.

    1. Gaming, then, is not so much about a generalized threat to the integrity of systems, but about the regulation of reactive practices at the margins of contemporary ranking schemes

      important conclusion

    2. as mediating a peculiar tension between desires to preserve the integrity of systems and attempts to maintain some autonomy on the part of data subjects.

      Constant tension... are there better ways to do this? Isn't every measure "asking" to be tricked?

    3. As the field of Science and Technology Studies (STS) has shown, users rarely play the roles assigned to them by engineers and designers (Kline and Pinch, 1996; Woolgar, 1990).

      Important to my theory

    4. In these discussions, gaming tends to be portrayed as a threat to the integrity of systems, an inevitable evil that is best to be eradicated. As Strathern (1997: 308) puts it, ‘When a measure becomes a target, it ceases to be a good measure’

      🔥🔥🔥

    5. ethicality of optimization has itself become a site of governance and contestation. Studying such practices of ‘being ethical’ not only offers opportunities for rethinking popular tropes like ‘gaming the system’, but also draws attention to often-overlooked struggles for authority at the margins of contemporary ranking schemes.

      His contribution to literature/conclusion.

    6. Specifically, I am interested in the ethical work performed as SEO consultants artfully arrange themselves to cope with moral ambiguities provoked and delegated by the operators of the search engine.

      Research Question

    1. ust as some friendly debunkerswere able to build connections with believers, addressing the issues of false conspiracy theoriesmay require us to see our similarities and common concerns instead of focusing solely on ourdifferences in belief. This challenge also requires us to see the problem from a socio-technicalperspective by treating the technologies and the social relationships on the internet together as anorganic whole. We hope our research contribute to the understanding of conspiracy believers andtheir belief changing process, and shed light on how we may better facilitate people in makingsense of online information

      Made me think of flat-earth documentary on Netflix.

    2. As the definition shows, conspiracy theories oftendeal with incomplete, uncertain, changing, and uncorroborated data. Actively seeking and sharinginformation about conspiracy theories are arguably attempts to organize and comprehend theunknown. In all aspects of life, people “structure the unknown” through the process of sensemakin

      Limitations of previews research

    3. of in-depth interviews with thirteenbelievers and seven ex-believers, we find that many people become curious about chemtrails after consumingrich online media, and they later find welcoming online communities to support shared beliefs and worldviews

      Method

    4. We apply Weick’s theory of sensemaking to examine the role of people’s frames (beliefs andworldviews), as well as the socio-technical contexts (social interactions and technological affordances) forprocessing informational cues about the conspirac

      Epistemology and theory justification

    1. We do not approach the studyas tabula rasa, but built on previous grounded theory work(Gibson, 2014), combining standard thematic analysiswith the constant comparative method of theoretical devel-opment used in constructivist grounded theory research(Charmaz, 2014; Kolb, 2012).

      Epistemology disclaimer.

    2. nderstandinformation poverty and information marginalization asdyadic perspectives on the same mismatch of informationvalues and imbalance of power that often exists between mar-ginalized people and the institutions that purport to servethem.

      For me, the core piece of the paper. It summarizes findings while presenting opportunities for research/impact.

    3. From theirperspective, participants saw lack of information as prob-lem with infrastructure, rather than just one of informationliteracy or access. Parents did not internalize the deficitapproach. They largely saw the information systems (ratherthan themselves) as needing repair

      Crucial finding: subjects believe systems need fixing, not them as actors.

    4. The data demonstrated that mothers exhibited arange of defensive behaviors and practices commonly asso-ciated with information poverty in response to persistentstructural problems (contextual conditions) in face-to-faceinformation environments and online information systems.

      Crucial findings: attitudes respond to persistent structural problems.