Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Utilizing Researchgate Social Network By Iranian Engineering, Amir Reza Asnafi, Maryam Rahmani Ma In Knowledge And Information Scienc Aug 2017

Utilizing Researchgate Social Network By Iranian Engineering, Amir Reza Asnafi, Maryam Rahmani Ma In Knowledge And Information Scienc

Library Philosophy and Practice (e-journal)

This study aimed to assess the role of Researchgate in the development of scientific- scholarly activities among Faculty Members of University of Tehran's Engineering College. This study is Survey and descriptive research and data collection tools, including profiles of researchers at the Researchgate and questionnaire. The study population included faculty members of University of Tehran's Engineering College in 2016 was 242 researcher were earned RG score. The sample 144 subjects who were selected via stratified random sampling method and the questionnaire distributed 144 questionnaires were collected and then Results were analyzed using SPSS software From the perspective of engineering researchers, …


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell Apr 2017

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Information Technology Services: Publications

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students would be …