Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Social and Behavioral Sciences

2010

Institution
Keyword
Publication
File Type

Articles 1 - 20 of 20

Full-Text Articles in Computer Engineering

Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp Nov 2010

Attitudes Of Health Professionals To Electronic Data Sharing Within An Integrated Care Electronic Health Record (Icehr), Charyl O'Malley, Damon Berry, Mary Sharp

Conference Papers

It is estimated that 98,000 people die in hospitals yearly in the USA as a result of medical errors (Agency for Healthcare Research and Quality, 2009). Electronic Health Records (EHR) can offer improved patient safety. EHRs are being implemented by many countries, however, not all health professionals have welcomed them (MORI Social Research Institute, 2006). As outlined in the National Health Information Strategy (NHIS) document, Ireland has plans to introduce an EHR. Attitudes of health professionals are a significant factor for the successful implementation and adoption of a new clinical information system. This study aimed to gauge the attitude of …


Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …


Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang Nov 2010

Assessing Value Creation And Value Capture In Digital Business Ecosystems, Ravi S. Sharma, Francis Pereira, Narayan Ramasubbu, Margaret Tan, F. Ted Tschang

Research Collection Lee Kong Chian School of Business

Interest in business modeling of technology enterprises – the activity of designing the architecture for revenues, costs, products and/or services delivery and the overall value of an enterprise – has risen to prominence with the global crossing of the Internet chasm. However, as several studies have pointed out (c.f., Osterwalder, Pigneur & Tucci, 2005; Teece 2010; Zott & Amit, 2010), the investigations of business models and their fit with the strategy of an enterprise, have received little scholarly attention. In this article we formulate a framework, called ADVISOR, for modeling the business strategies of enterprises in the Interactive Digital Media …


Refining The Digital Device Hierarchy, F. Chevonne Dancer, David Dampier Oct 2010

Refining The Digital Device Hierarchy, F. Chevonne Dancer, David Dampier

Computer Sciences and Electrical Engineering Faculty Research

Smartphones are increasing in popularity due to functionality, portability, convenience and affordability. Because of this, examiners must acquire and analyze these devices when criminal activity is suspected to have occurred. In order to obtain this information, it has to be extracted in a way that is repeatable and testable. There are several process models available for use, but the ad-hoc approach is on the rise. The dilemmas are that ad-hoc approaches and the forensic investigative process models available are not well suited for the examination of such devices. These approaches may cause the validity of investigator skill and methods to …


Paper Chase: Resources To Organize Your Papers And Bibliographies, Sharon Bradley Sep 2010

Paper Chase: Resources To Organize Your Papers And Bibliographies, Sharon Bradley

Presentations

Shares data and information management software that is freely available on the Internet for personal and professional use. Includes overviews of Zotero, Evernote, and Mendeley, which enable users to format bibliographies as well as share and save important information as documents, photographs and audio files.


Personal Vs. Social, Magdalini Eirinaki Sep 2010

Personal Vs. Social, Magdalini Eirinaki

Faculty Publications

The last few years we witnessed an impressive growth in social networks and in applications that add value to their amassed information. At the same time, the continuing expansion of mobile platforms and applications (e.g. iPhone), combined with the overwhelming supply of information and services, makes effective personalization and context-awareness much required features. One may consider "personal" and "social" data management as comprising two distinct directions with conflicting characteristics. However, it can be argued that they complement each other and that in future applications they will ultimately converge. This "personal vs. social" predicament presents a number of interesting topics that …


Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili Sep 2010

Iphone 3gs Forensics: Logical Analysis Using Apple Itunes Backup Utility, Mona Bader, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The iPhone mobile is used worldwide due to its enhanced computing capabilities, increased storage capacity as well as its attractive touch interface. These characteristics made the iPhone a popular smart phone device. The increased use of the iPhone lead it to become a potential source of digital evidence in criminal investigations. Therefore, iPhone forensics turned into an essential practice for forensic and security practitioners today. This research aimed at investigating and examining the logical backup acquisition of the iPhone 3GS mobile device using the Apple iTunes backup utility. It was found that significant data of forensic value such as e-mail …


Informatics And Natural Computation: Final Report, Francis T. Marchese Jul 2010

Informatics And Natural Computation: Final Report, Francis T. Marchese

Cornerstone 3 Reports : Interdisciplinary Informatics

The purpose of this grant is to develop an interdisciplinary course in Informatics and Natural Computation that would service undergraduate computer, natural, and physical science majors. Informatics is the science of information, the practice of information processing, and the engineering of information systems. Informatics studies the structure, algorithms, behavior, and interactions of natural and artificial systems that store, process, access and communicate information. Natural computing refers to a collection of disciplines that unite nature with computing in three distinct ways:

1. Nature serves as a source of inspiration for the development of computational tools or systems that are used for …


Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne Wakeland, Una E. Medina Jul 2010

Comparing Discrete Simulation And System Dynamics: Modeling An Anti-Insurgency Influence Operation, Wayne Wakeland, Una E. Medina

Systems Science Faculty Publications and Presentations

This paper contrasts the tradeoffs of modeling the same dynamic problem at a micro scale and at a macro scale of analysis: discrete system simulation (DS) versus continuous system simulation or system dynamics (SD). Both are employed to model the influence of entertainment education on terrorist system decay, with implications for field application. Each method optimizes different design, scope/scale, data availability/accuracy, parameter settings, and system sensitivities. Whether the research served by the computer model is applied or theoretical, DS tends to be useful for understand low-level individual unit/step influences on system change over time, whereas SD tends to shine when …


System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne Wakeland Jul 2010

System Dynamics Implementation Of An Extended Brander And Taylor-Like Easter Island Model, Takuro Uehara, Yoko Nagase, Wayne Wakeland

Systems Science Faculty Publications and Presentations

We provide a system dynamics implementation of a dynamic ecological economics model. Dynamic economic models are often constrained to use functions, such as the Cobb-Douglas function, chosen “conveniently” to allow for analytic solutions. The C-D function, however, suffers from its fixed elasticity that does not allow for the substitutability between man-made capital and natural capital to change, which is vital for economic sustainability. Using system dynamics removes this constraint and enables more realistic ecological economics models containing functions not amenable to analytic solution. The base model is the natural resource and population growth model developed by Brander and Taylor (1998) …


Presentation On Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler Jun 2010

Presentation On Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler

UConn Library Presentations

No abstract provided.


Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler Jun 2010

Raw As Archival Still Image Format: A Consideration, Michael J. Bennett, F. Barry Wheeler

Published Works

Source materials like fine art, over-sized, fragile maps, and delicate artifacts have traditionally been digitally converted through the use of controlled lighting and high resolution scanners and camera backs. In addition the capture of items such as general and special collections bound monographs has recently grown both through consortial efforts like the Internet Archive's Open Content Alliance and locally at the individual institution level. These projects, in turn, have introduced increasingly higher resolution consumer-grade digital single lens reflex cameras or "DSLRs" as a significant part of the general cultural heritage digital conversion workflow. Central to the authors' discussion is the …


Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald May 2010

Synthetic Corpora: A Synergy Of Linguistics And Computer Animation, Jerry C. Schnepp, Rosalee Wolfe, John Mcdonald

Visual Communications and Technology Education Faculty Publications

Synthetic corpora enable the creation of computer-generated animations depicting sign language and are the complement of corpora containing videotaped exemplars. Any design for a synthetic corpus needs to accommodate linguistic processes as well as support the generation of believable, acceptable synthesized utterances. This paper explores one possibility for representing linguistic and extralinguistic processes that involve the face and reports on the outcomes of a user test evaluating the clarity of utterances synthesized by this approach.


Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff May 2010

Healthcare Professional Roles: The Ontology Model For E-Learning, Lorraine Carmody, Elizabeth Sherry, John Cardiff

Conference Papers

The paper aims to present the MEDeLEARN project, an ontology-driven virtual learning environment for Medical Information System training. The current training environment for healthcare professionals in the use of essential medical information systems in a large urban training hospital is based on conventional instructor-led training sessions. Problems arise due to the demanding nature of the hospital working environment, causing training to be cancelled or curtailed. This mode of training delivery is deemed to be inefficient and ineffective, with the danger of serious errors occurring as a consequence.

The project investigates whether a virtual learning environment can address the competency gap …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo Apr 2010

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


Application Planning, Jochen Albrecht, Clare Davies Jan 2010

Application Planning, Jochen Albrecht, Clare Davies

Publications and Research

No abstract provided.


Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk Jan 2010

Challenges For Human, Social, Cultural, And Behavioral Modeling, S. K. Numrich, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Today's military focus has moved away from the force-on-force battlefield of the past century and into the domain of irregular warfare and its companion security, stability, transition and reconstruction missions. With that change in focus has come a need to examine the operational environment from a wider perspective, one that includes the whole range of human experiences and circumstances. As the set of factors and list of players expands, the need for reliable modeling and simulation increases, if for no other reason than to help the human decision maker make sense of this expanded decision space. However, to do this, …


Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili Jan 2010

Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all cases have some sort of digital evidence involved in them (Rogers, 2006, p. 1) .The process of documenting and tagging digital devices is cumbersome and involves details that might not apply to other types of evidence, since each evidence item has unique physical characteristics (Hesitis & Wilbon, 2005, p. 17). The process becomes less manageable when a large number of digital devices are seized. This paper examines the information and issues investigators should be aware of when collecting digital devices at crime scenes. Furthermore, …


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo Jan 2010

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

All Faculty Scholarship

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …