Guest  

 
Search: 
Search By: SubjectAbstractAuthorTitleFull-Text

 

Showing 1 through 5 of 4,754 records.
Pages: Previous - 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 951 - Next  Jump:
2017 - American Society of Criminology Words: 82 words || 
Info
1. Kelley, Barbara. "Secondary Data Analysis Opportunities through OJJDP Data at the National Archive of Criminal Justice Data" Paper presented at the annual meeting of the American Society of Criminology, Philadelphia Marriott Downtown, Philadelphia, PA, <Not Available>. 2019-12-10 <http://citation.allacademic.com/meta/p1276852_index.html>
Publication Type: Individual Paper
Abstract: The Bureau of Justice Statistics, National Institute of Justice, and OJJDP sponsor the National Archive of Criminal Justice Data (NACJD). NACJD facilitates research in criminal justice and criminology through the preservation, enhancement, and sharing of computerized data resources; through the production of original research based on archived data; and through specialized training workshops in quantitative analysis of crime and justice data. This presentation will discuss OJJDP’s efforts to archive data in the NACJD and encourage use of that data for secondary analyses.

2017 - American Society of Criminology Words: 169 words || 
Info
2. Widom, Rebecca. "Data Science, Data Culture, and Data Empowerment" Paper presented at the annual meeting of the American Society of Criminology, Philadelphia Marriott Downtown, Philadelphia, PA, <Not Available>. 2019-12-10 <http://citation.allacademic.com/meta/p1277982_index.html>
Publication Type: Individual Paper
Abstract: What is a data scientist and what does s/he do at a public defenders office? What opportunities exist to use data to advance the mission of a public defense? How can we effectively bring the right people, skills, questions, and resources together to take best advantage of those opportunities? What are the big pitfalls to avoid along the way? What would a data empowered public defender office look like and how do we get there? What kinds of training are most needed and most effective? This talk will explore lessons learned from the first year or so of a data science role at the Bronx Defenders, where the data scientist works with staff at all levels in the organization to reimagine the possibilities for collection, analysis, and use of data. From shared joy at new resources and ease of access to basic information, to shared frustration at tasks (e.g. data collection) that remain challenging, this presentation will begin to answer the questions above and leave room for additional conversation.

2014 - International Communication Association 64th Annual Conference Pages: unavailable || Words: 1731 words || 
Info
3. Obar, Jonathan. "Phantom Data Sovereigns: Walter Lippmann, Big Data, and the Fallacy of Personal Data Sovereignty" Paper presented at the annual meeting of the International Communication Association 64th Annual Conference, Seattle Sheraton Hotel, Seattle, Washington, May 21, 2014 Online <APPLICATION/PDF>. 2019-12-10 <http://citation.allacademic.com/meta/p708606_index.html>
Publication Type: Conference Paper/Unpublished Manuscript
Review Method: Peer Reviewed
Abstract: In 1927, Walter Lippmann published the Phantom Public, arguing for what he referred to as the fallacy of direct democracy. Repurposing Lippmann, this paper argues that recent calls for individual data privacy by the FTC, the White House and Congress present a comparable fallacy of personal data sovereignty. Had we the faculties and the system, the digital citizen has little interest or time for data governance. We desire the freedom to pursue the ends of digital production, without being inhibited by the means. We want privacy, and safety, but cannot and will not do all that is required for its protection. If the fallacy of direct democracy is similar to the fallacy of personal data sovereignty, then the pragmatic solution is representative data sovereignty; a combination of non-profit/commercial digital dossier management and government oversight ensuring the protection of personal data, while freeing individuals from what Lippmann referred to as an ‘unattainable ideal.’

2017 - Comparative and International Education Society CIES Annual Meeting Words: 548 words || 
Info
4. Li, Peiwei. "Paper 1: Data as “data-ing”: Taking data as relationships and as communicative action" Paper presented at the annual meeting of the Comparative and International Education Society CIES Annual Meeting, Sheraton Atlanta Downtown, Atlanta, Georgia, <Not Available>. 2019-12-10 <http://citation.allacademic.com/meta/p1214729_index.html>
Publication Type: Panel Paper
Abstract: This paper examines and conceptualizes the nature of “data” against the backdrop of the relational fabrics of research. I argue that instead of treating “data” as a material-like entity gained through data collection (an instrumentally oriented conceptualization), “data” should be considered primarily as a form of communicative and reflexive action. Its very constitution is shaped relationally between the researcher and the research context, between the researchers and the participants, and in terms of how the researcher and the participants relate to themselves (e.g. identity, process of self-integration). Thus, as fundamentally relational, data should be considered an open process that is always subject to re-constitution, new emergence, and even critique. It also has an internal connection to the normative (i.e. ethical and moral) aspects of research and research validity.

Structure wise, this paper integrates both theoretical and empirical reflections relevant to the context of comparative and international education. Drawing from Habermasian critical theory (Habermas, 1971, 1981), I first offer a critique of the positivist conceptualization of “data” as the objectified end of data collection, often approached as an instrumental action (i.e. a subject-object relation between the researcher and data). This conceptualization assumes that data has an independent and neutral status in relation to the researcher. Such an abstract approach strips data away from a rich, complex, and fluid relational context where communicative actions among and within multiple actors remain primary, and obscures the fact that to intuit what data is already involves a hermeneutic process of understanding.

To take “data” seriously and critically is to foreground this communicative context; by doing so we can better acknowledge its dialogical and reflective nature inherent in any communicative action. In this way we are able to take up issues of identities, power, the impact of false ideology and various oppressive forces, and their intersectionality facing the researcher, the participant(s), and the immediate and broader research contexts. This suggests that to approach data critically requires researchers’ constant self-reflection to detect, resist, and hopefully transcend conditions that derail us from an ideal speech situation (Habermas, 1984, 1987) where all that are involved and impacted by the data can participate in its constitution without distorting power. It also calls for consciousness raising and facilitating the emancipatory interest (Habermas, 1971) for both participants and researchers during the very constituting process of data towards self-integration, authenticity, and the resonance between knowing and being. Thinking data in this way inevitably taps into the ethical aspect of research and research validity as well, which will also be articulated in the paper.

To echo my theoretical discussion outlined above, I provide an empirical example of a critical narrative study about long-term practitioners influenced by Eastern spiritual traditions and highlight aspects related to data constitution during this project. In particular, I share how our (my participants’ and my) understanding of “data” evolved during the research process as we navigated our relationships, and how such understanding impacts the focus, scope, and process of the study. I illustrate the open, dialogical, and reflexive nature of data as it manifested in this project, and how it shapes and challenges our understanding of validity. I also articulate how and when the researcher and participants’ identities, their processes of self-development, and their emancipatory interests became relevant to the constitution of data in this study.

2014 - American Sociological Association Annual Meeting Pages: unavailable || Words: 342 words || 
Info
5. Detterman, Linda. and Hoelter, Lynette. "From Data Sharing to Data Stewardship: Meeting Data Sharing Requirements Now and into the Future" Paper presented at the annual meeting of the American Sociological Association Annual Meeting, Hilton San Francisco Union Square and Parc 55 Wyndham San Francisco, San Francisco, CA, Aug 15, 2014 Online <PDF>. 2019-12-10 <http://citation.allacademic.com/meta/p720562_index.html>
Publication Type: Poster
Review Method: Peer Reviewed
Abstract: There exists growing desire and requirements for scientific research data collected by federal funds to be shared publicly and without charge. Agencies such as the NSF and NIH require data management plans as part of research proposals and the Office of Science and Technology Policy (OSTP) is requiring federal agencies to develop plans to increase public access to results of federally funded research.

To be effectively shared, data must be described and documented, discoverable online, and accessible, today and into the future. And sharing data into the future requires that data sharing entities are sustainable. Data sharing and storage, discoverability and accessibility is not free from costs. Sustainability requires funding.

ICPSR, a center within the Institute for Social Research at The University of Michigan, has been sharing and archiving social science research data for over 50 years. This session will explore several data management models and examples including:

-Fee for access model - pooled funding for data curation and preservation for access by the pooling members
-Agency-funded model – agency or foundation funded model providing free public access
-Fee for deposit model – fee for deposit of data to provide free public access

The session will also cover restricted-use data sharing in the public access environment.

This session is useful to research scientists and those working with scientists who are interested and required to share their research data. Tips for accessing public data access products will be provided as well as resources for creating data management plans for grant applications.

Pages: Previous - 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 951 - Next  Jump:

©2019 All Academic, Inc.   |   All Academic Privacy Policy