Search (2 results, page 1 of 1)

  • × author_ss:"Acker, A."
  • × year_i:[2020 TO 2030}
  1. Carter, D.; Acker, A.; Sholler, D.: Investigative approaches to researching information technology companies (2021) 0.02
    0.022760313 = product of:
      0.09104125 = sum of:
        0.05915282 = weight(_text_:studies in 256) [ClassicSimilarity], result of:
          0.05915282 = score(doc=256,freq=4.0), product of:
            0.15812531 = queryWeight, product of:
              3.9902744 = idf(docFreq=2222, maxDocs=44218)
              0.03962768 = queryNorm
            0.37408823 = fieldWeight in 256, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.9902744 = idf(docFreq=2222, maxDocs=44218)
              0.046875 = fieldNorm(doc=256)
        0.031888437 = product of:
          0.06377687 = sum of:
            0.06377687 = weight(_text_:area in 256) [ClassicSimilarity], result of:
              0.06377687 = score(doc=256,freq=2.0), product of:
                0.1952553 = queryWeight, product of:
                  4.927245 = idf(docFreq=870, maxDocs=44218)
                  0.03962768 = queryNorm
                0.32663327 = fieldWeight in 256, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.927245 = idf(docFreq=870, maxDocs=44218)
                  0.046875 = fieldNorm(doc=256)
          0.5 = coord(1/2)
      0.25 = coord(2/8)
    
    Abstract
    Recent events reveal the potential for information technologies to threaten democratic participation and destabilize knowledge institutions. These are core concerns for researchers working within the area of critical information studies-yet these companies have also demonstrated novel tactics for obscuring their operations, reducing the ability of scholars to speak about how harms are perpetuated or to link them to larger systems. While scholars' methods and ethical conventions have historically privileged the agency of research participants, the current landscape suggests the value of exploring methods that would reveal actions that are purposefully hidden. We propose investigation as a model for critical information studies and review the methods and epistemological conventions of investigative journalists as a provocative example, noting that their orientation toward those in power enables them to discuss societal harms in ways that academic researchers often cannot. We conclude by discussing key topics, such as process accountability and institutional norms, that should feature in discussions of how academic researchers might position investigation in relation to their own work.
  2. Acker, A.: Emulation practices for software preservation in libraries, archives, and museums (2021) 0.00
    0.004176224 = product of:
      0.033409793 = sum of:
        0.033409793 = weight(_text_:libraries in 334) [ClassicSimilarity], result of:
          0.033409793 = score(doc=334,freq=4.0), product of:
            0.13017908 = queryWeight, product of:
              3.2850544 = idf(docFreq=4499, maxDocs=44218)
              0.03962768 = queryNorm
            0.25664487 = fieldWeight in 334, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              3.2850544 = idf(docFreq=4499, maxDocs=44218)
              0.0390625 = fieldNorm(doc=334)
      0.125 = coord(1/8)
    
    Abstract
    Emulation practices are computational, technical processes that allow for one system to reproduce the functions and results of another. This article reports on findings from research following three small teams of information professionals as they implemented emulation practices into their digital preservation programs at a technology museum, a university research library, and a university research archive and technology lab. Results suggest that the distributed teams in this cohort of preservationists have developed different emulation practices for particular kinds of "emulation encounters" in supporting different types of access. I discuss the implications of these findings for digital preservation research and emulation initiatives providing access to software or software-dependent objects, showing how implications of these findings have significance for those developing software preservation workflows and building emulation capacities. These findings suggest that different emulation practices for preservation, research access, and exhibition undertaken in libraries, archives, and museums result in different forms of access to preserved software-accessing information and experiential access. In examining particular types of access, this research calls into question software emulation as a single, static preservation strategy for information institutions and challenges researchers to examine new forms of access and descriptive representation emerging from these digital preservation strategies.

Authors