Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (8)
- Computer and Systems Architecture (7)
- Data Storage Systems (6)
- Business (5)
- Communication (5)
-
- Communication Technology and New Media (5)
- Digital Communications and Networking (5)
- Library and Information Science (5)
- Operations Research, Systems Engineering and Industrial Engineering (5)
- Robotics (5)
- Science and Technology Studies (5)
- Social Media (5)
- Technology and Innovation (5)
- Business Intelligence (4)
- E-Commerce (4)
- Electrical and Computer Engineering (4)
- Information Literacy (4)
- Management Information Systems (4)
- Management Sciences and Quantitative Methods (4)
- Operational Research (4)
- Arts and Humanities (3)
- Computer Law (2)
- Computer Sciences (2)
- Education (2)
- Engineering Education (2)
- Forensic Science and Technology (2)
- Law (2)
- Legal Studies (2)
- Institution
- Publication
-
- Journal of International Technology and Information Management (4)
- SIGNED: The Magazine of The Hong Kong Design Institute (2)
- Dickinson Law Review (2017-Present) (1)
- Emerging Writers (1)
- Georgia Library Quarterly (1)
-
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Religion & Film (1)
- Missouri S&T’s Peer to Peer (1)
- Pro Rege (1)
- Purdue Journal of Service-Learning and International Engagement (1)
- Swarthmore Undergraduate History Journal (1)
Articles 1 - 16 of 16
Full-Text Articles in Computer Engineering
Love Machina, John C. Lyden
Love Machina, John C. Lyden
Journal of Religion & Film
This is a film review of Love Machina (2024), directed by Peter Sillen.
Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, Neel Shah
Cobol Cripples The Mind!: Academia And The Alienation Of Data Processing, Neel Shah
Swarthmore Undergraduate History Journal
This paper writes a social history of the programming language COBOL that focuses on its reception in academia. Through this focus, the paper seeks to understand the contentious relationship between data processing and the academy. In historicizing COBOL, the paper also illuminates the changing nature of the academy-industry-military triangle that was a mainstay of early computing.
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
The Future Of Artificial Intelligence, Alex Guerra
The Future Of Artificial Intelligence, Alex Guerra
Emerging Writers
Whether we like it or not Artificial Intelligence (AI) is coming, and we are not ready for it. AI has unimaginable potential and will revolutionize the world over the next few decades, but with this great potential we are faced with choices that could prove detrimental to humanity. This article examines the challenges AI presents and explores possible solutions to make AI align with human interests.
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
News - Screven-Jenkins Regional Library, Sharon Blank
News - Screven-Jenkins Regional Library, Sharon Blank
Georgia Library Quarterly
No abstract provided.
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
International Journal of Aviation, Aeronautics, and Aerospace
The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …
Me2b
SIGNED: The Magazine of The Hong Kong Design Institute
Fixing the internet's biggest flaw
The Viability Of Quantum Computing, Brennan Michael King
The Viability Of Quantum Computing, Brennan Michael King
Missouri S&T’s Peer to Peer
Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that electronics may …
Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson
Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson
Purdue Journal of Service-Learning and International Engagement
The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …
When Big Data Gets Too Big
SIGNED: The Magazine of The Hong Kong Design Institute
Computer modelling has long been used as a design tool, and big data is a massive resource on which to build these models. But when the datasets get too big for computers to handle, innovative design solutions are needed. And the urge to play has driven technology forward
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
Journal of Digital Forensics, Security and Law
In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Computers And Robotics, Wayne Tinga