Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

941 Full-Text Articles 1174 Authors 427682 Downloads 73 Institutions

All Articles in Digital Communications and Networking

Faceted Search

941 full-text articles. Page 1 of 34.

Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon 2016 Kansas State University

Workflow Management System: A Customized Solution For Project Automation And Tracking, Amanda Harlan, Dhanushka Samarakoon

Kansas Library Association College and University Libraries Section Proceedings

K-State Libraries have many complex digital workflows that involve multiple people and departments. One, in particular, had the ongoing issues of tracking different stages, individual responsibilities, information gathering, notifications, and uploads done manually. Due to the inefficiency that this caused, it led to the development of an open source workflow management system (WMS)


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo 2016 University of Pennsylvania Law School

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the ...


Access All Around: A Niso Update On Open Access Discovery & Access Related Projects, Pascal Vincent Calarco, John G. Dove, Christine Stohn 2016 University of Windsor

Access All Around: A Niso Update On Open Access Discovery & Access Related Projects, Pascal Vincent Calarco, John G. Dove, Christine Stohn

Leddy Library Presentations

In this session, members of the NISO Discovery to Delivery Topic Committee will discuss NISO projects, recommendations and standards dealing with hot topics around discovery and access of electronic content. Presentations will include updates on open access discovery, specifically the recommended practice Access and License Indicators (ALI) and discussion of a new project proposal regarding discoverability of open access material. In addition, we will discuss two new projects. The first involves automatic transfer of packages and institutional entitlements from information providers to knowledge bases for the identification of institutional access rights using the KBART recommended practice. The second work item ...


How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr. 2016 Winthrop University

How Do Family Background And Self-Esteem Affect An Individual’S Perception Of Gender-Role Portrayal In Online Advertisements?, Cera T. Crowe, Aimee P. Meader Dr.

The Winthrop McNair Research Bulletin

The purpose of this study is to further understand the relationship of family background and how it affects self-esteem and the perception of gender roles in online imagery. This study focuses on how our history serves as a lens to see gender roles. The schema theory, created by Robert Axelrod, is a model suggesting that people have a “pre-existing assumption about the way the world is organized” (Axelford, 1974). Furthering this theory is Bem's (1981) Gender Schema Theory, which proposes that one's sexual self-concept affects how one structures items in memory. These theories, applied to the understood roles ...


Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, SIUC ISAT 2016 Southern Illinois University Carbondale

Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat

ASA Multidisciplinary Research Symposium

Enterprise Computing has quickly become of paramount importance for businesses vying to survive in today’s unlimited competition market. SAP software has become a front runner and leader of business and technical innovation in the enterprise computing industry. Major fortune 500 companies are using SAP software as their main operating software. As the need for individuals knowledgeable on SAP has increased dramatically, learning SAP is becoming important for the market of employment


Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman 2016 Bar-Ilan University

Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman

Journal of Aviation Technology and Engineering

Flight data recorders (FDRs, or black boxes) generate data that is collected on an embedded memory device. A well-known difficulty with these devices is that the embedded memory device runs out of space. To avoid getting into this problematic situation, the software of the FDR is designed to operate in a watchful mode, constantly working to minimize the use of memory space; otherwise a larger FDR would be needed. However, larger FDRs can be a problem because they have very rigorous requirements; thus, enlargement is costly. Outcomes of this research include the recommendation to send FDR data to a remote ...


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana 2016 Nova Southeastern University

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Conference on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the ...


After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino 2016 University of California - Berkeley

After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino

Claremont-UC Undergraduate Research Conference on the European Union

The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21st century. The leak revealed that the NSA was working with the British Government Communications Headquarters (GCHQ) on surveillance and data collection of individuals throughout Europe. Similarly, the NSA also colluded with the German Federal Intelligence Service (BND) on similar data collection and surveillance activities. Whereas the British government reacted relatively benignly to the revelations despite cries of government abuse, the German government reacted negatively to the revelations, eventually opening a rift between Washington ...


Streetplan: Hacking Streetmix To Do Community-Based Outreachon The Future Of Streets, William W. Riggs, Michael R. Boswell, Ryder Ross 2016 California Polytechnic State University - San Luis Obispo

Streetplan: Hacking Streetmix To Do Community-Based Outreachon The Future Of Streets, William W. Riggs, Michael R. Boswell, Ryder Ross

City & Regional Planning Studios and Projects

Streetplan is a tool that was created in 2016 building on the open-source, Code for America project, Streetmix. The goal was provide dynamic, participatory planning of streets, supporting traditional community based methods with a digital infrastructure that allowed for real-time information submission and dissemination. The tool allowed for urban planners and decision-makers to capture and then aggregate public feedback on the future vision on how streets can be made more healthy and livable.


Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan 2016 Purdue University

Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan

The Summer Undergraduate Research Fellowship (SURF) Symposium

As means to further supplement athletic performances increases, virtual reality is becoming helpful to sports in terms of cognitive training such as reaction, mentality, and game strategies. With the aid of haptic feedback, interaction with virtual objects increases by another dimension, in addition to the presence of visual and auditory feedback. This research presents an integrated system of a virtual reality environment, motion tracking system, and a haptic unit designed for the dorsal foot. The prototype simulates a scenario of virtual kicking and returns haptic response upon collision between the user’s foot and virtual object. The overall system was ...


Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang 2016 University of Tennessee, Knoxville

Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang

Doctoral Dissertations

Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where ...


User Identity Linkage By Latent User Space Modelling, Xin MU, Feida ZHU, Ee-Peng LIM, Jing XIAO, Jianzong WANG, Zhi-Hua ZHOU 2016 Singapore Management University

User Identity Linkage By Latent User Space Modelling, Xin Mu, Feida Zhu, Ee-Peng Lim, Jing Xiao, Jianzong Wang, Zhi-Hua Zhou

Research Collection School Of Information Systems

User identity linkage across social platforms is an important problem of great research challenge and practical value. In real applications, the task often assumes an extra degree of difficulty by requiring linkage across multiple platforms. While pair-wise user linkage between two platforms, which has been the focus of most existing solutions, provides reasonably convincing linkage, the result depends by nature on the order of platform pairs in execution with no theoretical guarantee on its stability. In this paper, we explore a new concept of “Latent User Space” to more naturally model the relationship between the underlying real users and their ...


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford 2016 University of Tennessee, Knoxville

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat ...


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh 2016 The University of Western Ontario

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


Digital Commons powered by bepress