Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 55

Full-Text Articles in Technology and Innovation

The Eco-Smart Can, Darack B. Nanto Dec 2016

The Eco-Smart Can, Darack B. Nanto

Undergraduate Honors Theses

I noticed that maintenance workers had the same itinerary when emptying trashcans, meanwhile some trashcans needed to be emptied urgently. Traditionally, ETSU maintenance operate on daily routes to pick trash on designated time, regardless the level of the containers. The time, resources and labor invested in collecting the trash could be saved. Therefore, I decided to use the Internet of Things (IoT) to create a device that will optimize trash collection, to reduce costs and pollution.


Cpn-Dam Business Meeting, Amanda Harlan Nov 2016

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4:50-4:55pm Closing statements


Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau Nov 2016

Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau

Central Plains Network for Digital Asset Management

In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the …


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh Nov 2016

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types are contributed …


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson Nov 2016

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its …


Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin Nov 2016

Mommma: Master Objects Migration And Metadata Mapping Activity, Daniel W. Noonan, Darnelle O. Melvin

Central Plains Network for Digital Asset Management

So you’ve got nearly 2 million digital files from 8 collecting units with minimum, scattered or unknown metadata—how do you prepare to migrate those objects into a digital preservation repository that acts as a “light archive” providing access to your digital collections? This presentation will delve into data wrangling efforts, the creation of workflows, and the challenges encountered while preparing digital resources for migration from a limited access FTP server into a preservation environment created in FEDORA, layered with Hydra heads for access and other functional requirements. We will discuss project planning, the de-duplication efforts, development of a collection assessment …


Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez Nov 2016

Quick-Start Guide To Digital Preservation For Audio, Sandy Rodriguez

Central Plains Network for Digital Asset Management

This presentation focuses on practical strategies and use of open-source tools in order to establish “good enough” preservation management practices for digital audio files. Using her experience at the Marr Sound Archives, University of Missouri—Kansas City, the presenter will discuss assessing current practices, identifying gaps, prioritizing, making recommendations, and selecting and implementing a suite of open-source tools to improve the preservation process. Tools demonstrated in the presentation are AVPreserve’s BWF MetaEdit, MDQC, and Fixity.


Digital Preservation Efforts At Usm, Elizabeth La Beaud Nov 2016

Digital Preservation Efforts At Usm, Elizabeth La Beaud

Central Plains Network for Digital Asset Management

The University of Southern Mississippi (USM) has steadily been working to improve its digital preservation infrastructure over the past four years. In 2013, with funding from a NEH Preservation Assistance Grant, consultants Tom Clareson and Liz Bishoff conducted a digital preservation readiness assessment and jump started USM’s education on the topic. Since then, USM has added geographically distributed backups, manual fixity checks, manual metadata logs, and manual file format migrations to its arsenal with varying degrees of success. The influx in needed manpower and technical infrastructure precipitated a financial commitment from the university and the purchase of a robust digital …


3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh Nov 2016

3d Model Creation And Management In An Academic Digital Repository, Marcia Mcintosh

Central Plains Network for Digital Asset Management

3D printing and scanning is new digital horizon for digital asset managers. Many fields have a history of utilizing 3D scanning and printing such as medicine, dentistry, art, entertainment, architecture, and archaeology. Now, many cultural heritage institution are also beginning to explore the unique benefits 3D models and prints can provide to constituents interested in their collections. The University of North Texas Digital Libraries embarked on a case study to gain a better understanding of 3D scanning and to determine its capacity to host and provide access to 3D models. This presentation will explore the workflows, metadata, and preservation of …


Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr Nov 2016

Common Management Gaps In The Life Cycle Of Digitized Objects, Jocelyn Wehr

Central Plains Network for Digital Asset Management

Presented from the perspective of someone responsible for creating the digital objects that will eventually be included in a digital preservation program, this poster session will identify common issues that make the management and preservation of digital objects more challenging. Digital preservation needs to be talked about within the digitization workflow, because it takes a lot of work to produce the best digital objects possible. We are often focused on the immediate use of the digital objects and less focused on their long-term use. Even with best practices in mind, there is often an immediate need (patron orders, for example) …


Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness Nov 2016

Numbers, Numbers, Numbers—Is It Working?! Meaningful Measurement Of Digital Collections, Allison Ringness

Central Plains Network for Digital Asset Management

After a digital project is completed and made available online, the work is not over: digital projects managers must quantify the value of these digital collections. There are a plethora of tools to measure usage, but inferring value from usage requires careful interpretation of the data. After interpretation, the results must be communicated effectively to administrators. This poster will identify sources of digital collection use data, identify pitfalls in these sources, explore ways to derive meaning from use data, and suggest strategies for communicating value measurements to library administrators.

This poster presentation is the first 15 minutes of video with …


Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson Nov 2016

Collaborating Across Workflows: Managing Creative Assets From Legacy Works, Patrice-Andre Prud'homme, Jennifer Hunt Johnson

Central Plains Network for Digital Asset Management

From the perspective of two distinct workflows, this presentation will illustrate how library departments, Digital Collections and Conservation collaborate on the production of digital assets. In essence, both digitization and analog preservation workflows aim to guarantee that collections are easily retrieved and usable. This case study will illustrate two examples. The first one is more linear yet regional; it aims to create digital assets to engage the community by means of crowdsourced transcription. The second one is hands-on, as it addresses the long-term research value of the physical material for use in classrooms by Special Collections. While these workflows may …


Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis Nov 2016

Eyes On The Prize: Delivering Archival Content With Synchronized Transcripts In Hydra, Irene Taylor, Shannon Davis

Central Plains Network for Digital Asset Management

Regarded as the definitive work on the Civil Rights Movement, the documentary series, Eyes on the Prize, has been seen by millions since its PBS debut in 1987. However, what remains unseen is the nearly 85 hours of interview outtakes that provide further insight into the series’ original stories of struggle, resistance, and perseverance. Through the Eyes on the Prize Digitization and Reassembly project, funded by the National Historical Publications and Records Commission, Washington University Libraries has made the complete, never-before-seen interviews and TEI XML encoded, synchronized transcripts freely accessible through its newly developed Hydra digital repository.

This session …


The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion Nov 2016

The Yellow Brick Road To Digitization: Two Small Kansas Colleges And Their Journey, Gloria Creed-Dikeogu, Danielle Dion

Central Plains Network for Digital Asset Management

In 2015, The Council of Independent Colleges (CIC) offered small private academic member colleges an opportunity to compete by writing collection proposals, for a three year grant digitizing teaching and research collections, funded by the Andrew C. Mellon Foundation. Forty-two CIC member teams were selected to participate in the Consortium on Digital Resources for Teaching and Research. Teams consisted of a librarian, and a faculty member, who worked with CIC and Artstor staff, using Artstor Shared Shelf to digitize proposed collections. Teams made digital collections accessible and usable in the classroom, wrote yearly project reports for CIC and attended yearly …


The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor Nov 2016

The James Merrill Digital Archive: Channeling The Collaborative Spirit(S), Shannon Davis, Joel Minor

Central Plains Network for Digital Asset Management

The James Merrill Papers, housed in Washington University Libraries Special Collections, contains manuscripts, drafts, and other materials from the renowned poet. In 2013, work began to digitize and deliver a selection of the Merrill Papers towards his epic poem, The Book of Ephraim. Because the Libraries’ already used Omeka digital exhibit software for a number of projects, the materials were delivered in an Omeka exhibit, The James Merrill Digital Archive. The process of transforming an archival collection into a digital exhibit required the expertise and input of many collaborators including library staff in Special Collections and Scholarly Publishing, and students …


Design, Implementation, And Evaluation Of A User Training Program For Integrating Health Information Technology Into Clinical Processes, Ze He Nov 2016

Design, Implementation, And Evaluation Of A User Training Program For Integrating Health Information Technology Into Clinical Processes, Ze He

Doctoral Dissertations

Health information technology (IT) implementation can be costly, and remains a challenging problem with mixed outcomes on patient safety and quality of care. Systems engineering and IT management experts have advocated the use of sociotechnical models to understand the impact of health IT on user and organizational factors. Sociotechnical models suggest the need for user-centered implementation approaches, such as user training and support, and focus on processes to mitigate the negative impact and facilitate optimal IT use during training. The training design and development should also follow systematic processes guided by instructional development models. It should take into account of …


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira Oct 2016

Exploring Public Values Implications Of The I-Corps Program, Jan Youtie, Philip Shapira

Philip Shapira

This paper examines how the concept of public values can be operationalized in an ongoing public initiative to stimulate innovation in an emerging technology. Our study focuses on Innovation Corps (I-Corps)—a program initiated in 2011 by the National Science Foundation (NSF) to accelerate the process of commercializing science-driven discoveries. The I-Corps method has since spread rapidly across multiple US agencies. Separately, there has also been heightened attention to the early anticipation and mitigation of the implications of emerging science and technology. Drawing on the case of nanotechnology, the paper considers how public values related to nanotechnology commercialization can be integrated …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Using Building Information Modeling (Bim) And The Last Planner System (Lps) To Reduce Construction Process Delay, Zaid K. Ai Hussein Oct 2016

Using Building Information Modeling (Bim) And The Last Planner System (Lps) To Reduce Construction Process Delay, Zaid K. Ai Hussein

Masters Theses & Specialist Projects

The construction industry suffers from many practical problems and challenges; most being related to construction management. One of the most common recurring problems in construction projects is delay. Delay is a primary factor that can have an effect on project duration, scheduled delivery date, as well as the overhead cost of the project. This study investigated the problem of delays in construction projects. The research focused on the combination of Building Information Modeling (BIM) and Last Planner System (LPS) together to measure the execution time of construction projects. The aim of this study was to determine whether using BIM and …


Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees Oct 2016

Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees

Independent Study Project (ISP) Collection

On January 6, 2016, the Moroccan telecommunications regulatory agency, the ANRT, announced a ban onVoice Over Internet Protocol(VoIP) calling services such as Skype, WhatsApp, and Viber. The ban triggered sweeping opposition among the Moroccan public, opening discussion of digital rights, censorship, and Internet governance. Considering liberal democratic rights in the 2011 Moroccan Constitution and a history of censorship, this study analyzes the official justification of the ANRT alongside additional explanations involving business interests and the security services. The purpose of this study is to gauge the perceptions of Moroccans on the decision of the ANRT and provide a holistic explanation. …


Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee Sep 2016

Keeping It Physical: Convergence On A Physicality Requirement For Patentability Of Software-Related Inventions Under The European Patent Convention And United States Law, Kevin Afghani, Duke W. Yee

Journal of Intellectual Property Law

No abstract provided.


Managing Technology In Financial Innovation, Frederick Betz Sep 2016

Managing Technology In Financial Innovation, Frederick Betz

Engineering and Technology Management Faculty Publications and Presentations

The topic of managing technology had traditionally focused upon the manufacturing industries; but the service industries grew to become a major sector of industry and commerce. We examine how to manage technology in the financial commercial sector. What is innovation in the financial sector? How does innovation occur in the financial sector? What are the criteria of technology safety in financial innovations? Why did financial innovation contribute to financial instabilities, such as the Global Financial Crisis of 2007-08? Why had governmental agencies failed to properly regulate the financial sector for safety? How did U.S. government financial agencies handle that financial …


Building A Pathway To Engineering For Our Daughters – Brick By Brick, Ali P. Gordon Aug 2016

Building A Pathway To Engineering For Our Daughters – Brick By Brick, Ali P. Gordon

UCF Forum

As a father of young elementary and middle school-aged kids, I’m also curious to know exactly how my undergrad students came to be interested in mechanical engineering. An exchange with a UCF student might go like this: “You did a great job on the exam. Congrats! By the way, how did you get interested in mechanical engineering, anyway?” I mentally log the answers for my kids’ future benefit.


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …