Search (3 results, page 1 of 1)

  • × author_ss:"Acker, A."
  • × year_i:[2020 TO 2030}
  1. Carter, D.; Acker, A.; Sholler, D.: Investigative approaches to researching information technology companies (2021) 0.00
    4.4124527E-4 = product of:
      0.0066186786 = sum of:
        0.0066186786 = product of:
          0.013237357 = sum of:
            0.013237357 = weight(_text_:information in 256) [ClassicSimilarity], result of:
              0.013237357 = score(doc=256,freq=10.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.2602176 = fieldWeight in 256, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.046875 = fieldNorm(doc=256)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    Recent events reveal the potential for information technologies to threaten democratic participation and destabilize knowledge institutions. These are core concerns for researchers working within the area of critical information studies-yet these companies have also demonstrated novel tactics for obscuring their operations, reducing the ability of scholars to speak about how harms are perpetuated or to link them to larger systems. While scholars' methods and ethical conventions have historically privileged the agency of research participants, the current landscape suggests the value of exploring methods that would reveal actions that are purposefully hidden. We propose investigation as a model for critical information studies and review the methods and epistemological conventions of investigative journalists as a provocative example, noting that their orientation toward those in power enables them to discuss societal harms in ways that academic researchers often cannot. We conclude by discussing key topics, such as process accountability and institutional norms, that should feature in discussions of how academic researchers might position investigation in relation to their own work.
    Source
    Journal of the Association for Information Science and Technology. 72(2021) no.6, S.655-666
  2. Acker, A.: Emulation practices for software preservation in libraries, archives, and museums (2021) 0.00
    3.2888478E-4 = product of:
      0.0049332716 = sum of:
        0.0049332716 = product of:
          0.009866543 = sum of:
            0.009866543 = weight(_text_:information in 334) [ClassicSimilarity], result of:
              0.009866543 = score(doc=334,freq=8.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.19395474 = fieldWeight in 334, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=334)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    Emulation practices are computational, technical processes that allow for one system to reproduce the functions and results of another. This article reports on findings from research following three small teams of information professionals as they implemented emulation practices into their digital preservation programs at a technology museum, a university research library, and a university research archive and technology lab. Results suggest that the distributed teams in this cohort of preservationists have developed different emulation practices for particular kinds of "emulation encounters" in supporting different types of access. I discuss the implications of these findings for digital preservation research and emulation initiatives providing access to software or software-dependent objects, showing how implications of these findings have significance for those developing software preservation workflows and building emulation capacities. These findings suggest that different emulation practices for preservation, research access, and exhibition undertaken in libraries, archives, and museums result in different forms of access to preserved software-accessing information and experiential access. In examining particular types of access, this research calls into question software emulation as a single, static preservation strategy for information institutions and challenges researchers to examine new forms of access and descriptive representation emerging from these digital preservation strategies.
    Source
    Journal of the Association for Information Science and Technology. 72(2021) no.9, S.1148-1160
  3. Kriesberg, A.; Acker, A.: ¬The second US presidential social media transition : how private platforms impact the digital preservation of public records (2022) 0.00
    3.2888478E-4 = product of:
      0.0049332716 = sum of:
        0.0049332716 = product of:
          0.009866543 = sum of:
            0.009866543 = weight(_text_:information in 751) [ClassicSimilarity], result of:
              0.009866543 = score(doc=751,freq=8.0), product of:
                0.050870337 = queryWeight, product of:
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.028978055 = queryNorm
                0.19395474 = fieldWeight in 751, product of:
                  2.828427 = tf(freq=8.0), with freq of:
                    8.0 = termFreq=8.0
                  1.7554779 = idf(docFreq=20772, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=751)
          0.5 = coord(1/2)
      0.06666667 = coord(1/15)
    
    Abstract
    A second presidential social media transition in the United States occurred as Joe Biden took office on January 20, 2021. In the years since Barack Obama pioneered the use of platforms like Facebook and Twitter while President, Donald Trump shaped his Presidency around the use of Twitter, primarily through a personal account created before entering politics. In this paper, we examine Donald Trump's use of Twitter during his presidency as a lens through which to understand the ongoing archival preservation and data management challenges posed by social media platforms. The blurred lines between public and private records, deleting tweets, and the preservation issues that appeared after his suspension from Twitter and other platforms following the January 6, 2021 insurrection at the US Capitol all highlight an urgent, ongoing need by archivists, digital preservationists, and information scholars to consider how we might collect and manage social media records in an ever-changing information landscape. This paper draws primarily on publicly available information from existing preservation initiatives to analyze the state of digital preservation for presidential records. Our findings highlight how both public and private entities manage and provide access to Donald Trump's tweets, pointing to broader implications for social media data preservation.
    Source
    Journal of the Association for Information Science and Technology. 73(2022) no.11, S.1529-1542