We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In situations ranging from border control to policing and welfare, governments are using automated facial recognition technology (FRT) to collect taxes, prevent crime, police cities and control immigration. FRT involves the processing of a person's facial image, usually for identification, categorisation or counting. This ambitious handbook brings together a diverse group of legal, computer, communications, and social and political science scholars to shed light on how FRT has been developed, used by public authorities, and regulated in different jurisdictions across five continents. Informed by their experiences working on FRT across the globe, chapter authors analyse the increasing deployment of FRT in public and private life. The collection argues for the passage of new laws, rules, frameworks, and approaches to prevent harms of FRT in the modern state and advances the debate on scrutiny of power and accountability of public authorities which use FRT. This book is also available as Open Access on Cambridge Core.
This book brings together the vast research literature about gender and technology to help designers understand what a gender perspective and a focus on intersectionality can contribute to designing information technology systems and artifacts, and to assist organizations as they work to develop work cultures that are supportive of women and marginalized genders and people. Drawing on empirical and analytical studies of women's work and technology in many parts of the world, the book addresses how to make invisible aspects of work visible; how to recognize women's skills without falling into the trap of gender stereotyping; how to engage in improving working conditions; and how to defend care of life situations and needs against a managerial logic. It addresses challenges for design, including many overlooked and undervalued aspects, such as the complexities involved in human–machine interactions, as well as the need to create safe spaces for research subjects.
Information literacy research is growing in importance, as evidenced by the steady increase in dissertations and research papers in this area. However, significant theoretical gaps remain.
Information Literacy Through Theory provides an approachable introduction to theory development and use within information literacy research. It provides a space for key theorists in the field to discuss, interrogate and reflect on the applicability of theory within information literacy research, as well as the implications for this work within a variety of contexts. Each chapter considers a particular theory as its focal point, from information literacy and the social to information literacy through an equity mindset, and unpacks what assumptions the theory makes about key concepts and the ways in which the theory enables or constrains our understanding of information literacy.
This book will provide a focal point for researchers, practitioners and students interested in the creation and advancement of conceptually rich information literacy research and practice.
The book shows how humor has changed since the advent of the internet: new genres, new contexts, and new audiences. The book provides a guide to such phenomena as memes, video parodies, photobombing, and cringe humor. Included are also in-depth discussions of the humor in phenomena such as Dogecoin, the joke currency, and the use of humor by the alt-right. It also shows how the cognitive mechanisms of humor remain unchanged. Written by a well-known specialist in humor studies, the book is engaging and readable, but also based on extensive scholarship.
This chapter establishes an explicit link between foreign aid inflows and development indicators classified in the multidimensional setting of the SDGs. This linkage is not a black box as it takes advantage of the model’s causal chains describing budget allocations and indicator performance. First, we create counterfactuals by removing aid flows. Hence, we can estimate aid impacts and assess their statistical significance at the indicator or country levels during the first decade of the 21st century. Second, we produce a validation exercise comparing our results with econometric evidence found in a well-known sector-level study (access and sanitation of water) using a subset of our data.
This chapter introduces a model in which a government allocates financial resources across several policy issues (development dimensions), and a set of public servants (or agencies) that, through government programmes, transform public spending into policy outcomes. We start by describing the macro-level dynamics and the relevant equations involved. Then, we introduce a political economy game between the government and its officials (or public servants). First, we describe the public servants’ decision making in an environment of uncertainty through reinforcement learning. Second, we elaborate on the problem of the government (or central authority) and how we can specify its heuristic strategy. Finally, we provide an overview of the entire structure of the model.
This chapter elaborates on the calibration and validation procedures for the model. First, we describe our calibration strategy in which a customised optimisation algorithm makes use of a multi-objective function, preventing the loss of indicator-specific error information. Second, we externally validate our model by replicating two well-known statistical patterns: (1) the skewed distribution of budgetary changes and (2) the negative relationship between development and corruption. Third, we internally validate the model by showing that public servants who receive more positive spillovers tend to be less efficient. Fourth, we analyse the statistical behaviour of the model through different tests: validity of synthetic counterfactuals, parameter recovery, overfitting, and time equivalence. Finally, we make a brief reference to the literature on estimating SDG networks.
This chapter introduces the reader to the problem of policy prioritisation and why quantitative/computational analytic frameworks are much needed. We explain the various academic- and policy-oriented motivations for developing the Policy Priority Inference research programme. We apply this computational framework in the study of the SDGs and the feasibility of the 2030 Agenda of sustainable development.
This chapter formulates an analytical toolkit that incorporates an intricate – yet realistic – chain of causal mechanisms to explain the expenditure–development relationship. First, we explain several reasons why we take a complexity perspective for modelling the expenditure–development link and why we choose agent-based modelling as a suitable tool for assessing policy impacts in sustainable development. Second, we introduce the concept of social mechanisms and explain how we apply them to measure the impact of budgetary allocations when systemic effects are relevant. Third, we compare different concepts of causality and explain the advantages of an account that simulates counterfactual scenarios where policy interventions are absent.
This chapter provides a comprehensive framework to understand and quantify structural bottlenecks in a setting of multidimensional sustainable development. First, we formalise the idea of an idiosyncratic bottleneck when thinking in a hypothetical situation where a government has all the necessary resources to guarantee the success of its existing programmes (i.e., the budgetary frontier). Second, we compare the development gaps between the baseline and counterfactual outputs to assess how sensitive are the different indicators when they operate at the budgetary frontier. Third, we combine this information with the historical performance of indicators to develop a methodology that identifies idiosyncratic bottlenecks. Finally, we elaborate on a flagging system to differentiate between idiosyncratic bottlenecks according to the ‘urgency’ to unblock them.
This chapter studies the feasibility of the SDGs to improve our understanding of the empirical link between government expenditure and development outcomes. First, we explain the strategy to produce prospective (counterfactual or otherwise) analyses with the computational model and two metrics to evaluate advances in development gaps. Second, we present simulation results showing the development gaps by 2030 when the historical budget, in real terms, is preserved during the remaining years of the current decade. Third, we conduct sensitivity analyses that involve changes in the overall budget size that modify the value observed at the historical period used for calibration. Fourth, we present some reflections on the results.
This chapter analyses the connections between public funding, the rule of law, and multidimensional development. First, via simulation, we document a negative relationship between the budget size and the proportion of embezzled resources (or wasted resources due to inefficiencies). Second, our result suggests that reallocating public funds from other issues to programmes associated with the rule of law can mitigate corruption up to a certain point. Third, we find that the worse the country’s performance, the easier to remain in a development trap, as it becomes more cumbersome to realise a successful allocation profile (i.e., to decipher the proper mix of rule-of-law funding and overall budget size).