Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Social and Behavioral Sciences

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Digital Communications and Networking

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


How Can 5g Make Our Lives Better?, Firas Slewa Dawod Aug 2020

How Can 5g Make Our Lives Better?, Firas Slewa Dawod

English Language Institute

Our lives will be significantly improved with the advent of the new cellular wireless technology due to all its new features and applications. This Poster discusses the main features and application of 5G technology and its positive impact on society, in particular facilitating interactive and smart communities.


Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni Aug 2020

Indonesian Library User Behaviour During Covid 19 Pandemic On Digital Library Platform, Irhamni

English Language Institute

COVID-19 pandemic has significantly changed library user behavior, workplaces, and some public areas including in the library. During the COVID 19 pandemics, the digital library with a mobile app like ipusnas has facilitated to accessing library resources. The ipusnas has increased people's accessibility to library materials. This research focuses on the use of the digital library has a significant impact on library users behavior; it can influence how they read, access the library, and their interaction with the library resources.


Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson Jul 2020

Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson

Cybersecurity Undergraduate Research Showcase

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels Apr 2020

The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels

SMU Data Science Review

The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …


El Artista Está En Línea: E-Performance En El Tiempo De Covid-19, Ezequiel N. González Apr 2020

El Artista Está En Línea: E-Performance En El Tiempo De Covid-19, Ezequiel N. González

Independent Study Project (ISP) Collection

Esta investigación propone una lectura detallada y comparativa de varias e-performances creadas por el artista visual uruguayo Ernesto Rizzo y la performer argentina Susy Shock, trazando un corpus de trabajo creado durante la crisis de COVID-19 y compartido en Instagram desde finales de marzo a finales de mayo de 2020. Al centrarse en el giro digital del arte de performance debido a las particularidades de la cuarentena, esta investigación busca distinguir este momento de "e-performance", entendiendo cuáles serán sus ramificaciones para el/la artista y el arte de performance en general. Así, a través de una reflexión teórica sobre el terreno …


Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood Apr 2020

Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood

Independent Study Project (ISP) Collection

The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …


Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans Feb 2020

Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans

Presentations

No matter what member of the team you are or what type of library you are in - be it electronic resources manager, cataloger, head of acquisitions, ILS or systems administrator, or even repository coordinator - getting things done and meeting goals depends largely on how you communicate with one another and how you handle your time. Meeting goals and deadlines on both big and small projects in addition to your personal tasks can be achieved less painfully by making effective use of a few on point tools. This session will use the presenter's preferred platforms to show specific examples …


Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam Feb 2020

Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam

Faculty Publications

Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring application. …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Piecing Together Summon Over Alma Documentation, James M. Day Feb 2020

Piecing Together Summon Over Alma Documentation, James M. Day

Publications

Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal Jan 2020

Desarrollo De Un Esquema De Gestión Hídrica En El Sistema Acuífero Sap 3.1 Apoyado De La Tipificación De Suelos Y El Modelo Conceptual De Thöt, Maria Camila Soriano Espinosa, Camilo José Rodríguez Carvajal

Ingeniería Ambiental y Sanitaria

El presente proyecto tiene como objetivo principal desarrollar un esquema de gestión hídrica (EGH) en el sistema acuífero SAP 3.1, provincia llanos orientales, con base en la tipificación de suelos y el modelo conceptual de Tӧth, partiendo de que las aguas subterráneas se consideran una fuente alternativa de abastecimiento por su mejor calidad y el bajo costo de manejo en comparación al agua superficial, y teniendo en cuenta que el Departamento del Meta conoce la riqueza hídrica que está en su jurisdicción, no cuenta con una regulación adecuada en pro de una gestión hídrica a nivel subterráneo. La metodología empleada …


Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd Jan 2020

Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd

Journal of International Technology and Information Management

Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …


Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari Jan 2020

Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari

Journal of International Technology and Information Management

System success is considered to be an important element in accomplishing the goals of the organization; therefore evaluation of system success needs to be done in order to ensure that investment in Information System is successful. Most of Higher Learning Institutions (HLIs) in Tanzania have adopted the use of IS in providing service to their customers. Nevertheless, there is less evidence that system success evaluation has been done in order to identify the desired characteristics which could make IS more effective. Due to that, this study evaluates the effectiveness of Student Information System (SIS) used at the Institute of Finance …


An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang Jan 2020

An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang

Journal of International Technology and Information Management

Data management has become an important challenge. Good data management requires an effective approach to collecting, storing, and accessing data across the enterprise. In this paper, a knowledge modeling approach to data management is introduced with an emphasis on data requirements analysis. A knowledge model can provide a high-level view of organizational data by specifying the structure and relationships of the knowledge contents used in business processes. The proposed knowledge modeling approach is business process oriented and decision oriented. The description of the knowledge contents in the model is based on ontological specification. The model is comprised of five elements: …


Table Of Contents Jitim Vol 29 Issue 1, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 1, 2020

Journal of International Technology and Information Management

Table of contents


Table Of Contents Jitim Vol 29 Issue 2, 2020 Jan 2020

Table Of Contents Jitim Vol 29 Issue 2, 2020

Journal of International Technology and Information Management

Table of contents


Internet Of Things For Sustainable Community Development: Introduction And Overview, Abdul Salam Jan 2020

Internet Of Things For Sustainable Community Development: Introduction And Overview, Abdul Salam

Faculty Publications

The two-third of the city-dwelling world population by 2050 poses numerous global challenges in the infrastructure and natural resource management domains (e.g., water and food scarcity, increasing global temperatures, and energy issues). The IoT with integrated sensing and communication capabilities has the strong potential for the robust, sustainable, and informed resource management in the urban and rural communities. In this chapter, the vital concepts of sustainable community development are discussed. The IoT and sustainability interactions are explained with emphasis on Sustainable Development Goals (SDGs) and communication technologies. Moreover, IoT opportunities and challenges are discussed in the context of sustainable community …


The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani Jan 2020

The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani

Journal of International Technology and Information Management

This paper is based on a Ph.D. study investigating the critical challenges facing e-commerce adoption by entrepreneurs in Saudi Arabia, identifying the major driving factors, barriers, motivations, perceived advantages, potential problems and some practical solutions as well as future expectations from entrepreneurs’ perspectives. From the study findings, a set of practical recommendations were derived for the government, entrepreneurs and investors in Saudi Arabia to consider, to promote ecommerce entrepreneurship in the county.

The research was undertaken using a qualitative approach. Data collection techniques involved in-depth, semi-structured interviews, with (1) e-commerce entrepreneurs, and (2) government authorities, educational initiatives and private support …


Digital Technologies As Antecedents To Process Integration And Dynamic Capabilities In Healthcare: An Empirical Investigation, Tulika Chakravorty, Karunakar Jha, Sunil Barthwal, Samyadip Chakraborty Jan 2020

Digital Technologies As Antecedents To Process Integration And Dynamic Capabilities In Healthcare: An Empirical Investigation, Tulika Chakravorty, Karunakar Jha, Sunil Barthwal, Samyadip Chakraborty

Journal of International Technology and Information Management

Healthcare has been in focus over the past decade due to its criticality and continuous revolution. In this digital era, with the advent of various technologies, healthcare is undergoing a massive transformation. This study attempts to analyze the impacts of three major digital technologies which are being adopted in the healthcare sector which are electronic medical records (EMR), enterprise resource planning (ERP) and internet-of-things (IoT) enabled medical wearables in the hospital context. Focusing towards analyzing the impact of these technologies towards process-integration and further towards dynamic capabilities like quality, agility and responsiveness; the study framework is well-grounded by two theoretical-underpinnings …


Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi Jan 2020

Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi

Journal of International Technology and Information Management

Technology empowers entrepreneurs to pursue alternative funding through platforms like crowdfunding. This research explores significant startup funding factors using Crunchbase. Controlling for common factors (acquisition/funding-rounds/IPO), the research uniquely focuses on web attention - the visibility on social media - and its impact on funding. It also examines the moderating influence of startup’s home country culture (individualism/collectivism). Findings show stronger positive impact of web attention on startup funding for collectivist countries. While individualistic investors value personal goals, collectivists value collaborative goals - inclinations that align with crowdfunding behavior. Therefore while increasing web attention, crowdfunding efforts can be targeted towards collectivist countries.


Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi Jan 2020

Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi

Journal of International Technology and Information Management

the globalised economy comes with extra demand of ICT skills among the graduates. This is due to the demand if ICT technicalities in performing a number of basic activities in the workplaces. Majority of studies which concentrate with ICT skills on employability deals with technical enterprises. In non-technical companies such as construction, manufacturing and agriculture, ICT is studied as among the basic skill-set of graduates. However, recently, there has been special demand of graduates with basic ICT knowledge on recruitment processes. This indicates the growing demand of basic ICT skills among a broad range of professions. However, the type of …


Assessing The Influence Of Self-Efficacy On The Acceptance Of Mobile Phone Technology Within The Smes, Renatus Michael Mushi Jan 2020

Assessing The Influence Of Self-Efficacy On The Acceptance Of Mobile Phone Technology Within The Smes, Renatus Michael Mushi

Journal of International Technology and Information Management

Mobile phone technologies have proved to provide a significant transformation in performing various activities within companies, especially in least developed regions. Mobile phones provide opportunities for employees of organisations to work any time and anywhere. SMEs comprise of employees who perform multitasking job roles due to their small in size and low financial capabilities and most cases, some of them work remotely from their main offices.

Self-Efficacy is a belief that the user has enough skills to use technology to perform a task at hand. This is one of the factors influencing of acceptance of technologies at the workplaces such …