Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (72)
- LANGUAGE (31)
- AUTISM (17)
- Emerging Technologies (15)
- Privacy (14)
-
- Social Implications of ICT (13)
- Location-Based Services (12)
- National Security (12)
- NEUROSEMANTICS (11)
- Technology (11)
- Surveillance (10)
- Uberveillance (10)
- Libraries (9)
- Northern Ohio Data and Information Service (NODIS) (9)
- Cyber (8)
- Cyber Operations (8)
- Ethics (8)
- Global Positioning Systems (8)
- Computer science (7)
- Emergency Management (7)
- Security (7)
- Usability (7)
- Works by David Morgan Lochhead (7)
- Austerity (6)
- DYSLEXIA (6)
- Monitoring (6)
- Policing (6)
- Tracking (6)
- Twitter (6)
- VISUO-SPATIAL (6)
- Publication Year
- Publication
-
- Philadelphia University, Jordan (79)
- Marcel Adam Just (78)
- Rudolf Kaehr (31)
- Professor Katina Michael (27)
- Dr Deogratias Harorimana (23)
-
- Jan Kallberg (18)
- Amber Settle (12)
- Dr. David Morgan Lochhead (11)
- Associate Professor Katina Michael (10)
- Ellen Cyran (9)
- Leslie Marsh (9)
- David LO (7)
- William Osei-Poku (7)
- Amanda Izenstark (5)
- Dr. David M Cook (5)
- Kyriakos MOURATIDIS (5)
- Shih-Fen CHENG (5)
- Sonya S. Gaither (5)
- George H Baker (4)
- John Hooker (4)
- Kathleen P King (4)
- Lorrie F Cranor (4)
- Manoj Maharaj (4)
- Matthias Bärwolff (4)
- NADIM AKHTAR KHAN (4)
- Christopher H Hoebeke (3)
- Hillary Corbett (3)
- Jason A Bengtson (3)
- John Mark Ockerbloom (3)
- Jose P Zagal (3)
Articles 1 - 30 of 523
Full-Text Articles in Social and Behavioral Sciences
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Eric A. Kowalik
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
David Dampier
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.
Analysis Of Flickr, Snapchat, And Twitter Use For The Modeling Of Visitor Activity In Florida State Parks, Hartwig H. Hochmair, Levente Juhasz
Analysis Of Flickr, Snapchat, And Twitter Use For The Modeling Of Visitor Activity In Florida State Parks, Hartwig H. Hochmair, Levente Juhasz
Levente Juhasz
Spatio-temporal information attached to social media posts allows analysts to study human activity and travel behavior. This study analyzes contribution patterns to the Flickr, Snapchat, and Twitter platforms in over 100 state parks in Central and Northern Florida. The first part of the study correlates monthly visitor count data with the number of Flickr images, snaps, or tweets, contributed within the park areas. It provides insight into the suitability of these different social media platforms to be used as a proxy for the prediction of visitor numbers in state parks. The second part of the study analyzes the spatial distribution …
The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G Mark Grimes, Justin Scott Giboney
The Effect Of Conversational Agent Skill On User Behavior During Deception, Ryan M. Schuetzler, G Mark Grimes, Justin Scott Giboney
Ryan Schuetzler
No abstract provided.
Shayna T. Blum: Design Research, Shayna Blum
In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E
In The Beginning... A Legacy Of Computing At Marshall University, Jack L. Dickinson, Arnold R. Miller Ed.E
Arnold R. Miller
This book provides a brief history of the early computing technology at Marshall University, Huntington, W.Va., in the forty years: 1959-1999. This was before the move to Intel and Windows based servers. After installation of an IBM Accounting Machine in 1959, which arguably does not fit the modern definition of a computer, the first true computer arrived in 1963 and was installed in a room below the Registrar’s office. For the next twenty years several departments ordered their own midrange standalone systems to fit their individual departmental requirements. These represented different platforms from different vendors, and were not connected to …
2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard
2018 Florida Data Science For Social Good - Annual Report, Karthikeyan Umapathy, F. Dan Richard
Karthikeyan Umapathy
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Identification And Parasocial Relationships With Characters From Star Wars: The Force Awakens., Alice E. Hall
Identification And Parasocial Relationships With Characters From Star Wars: The Force Awakens., Alice E. Hall
Alice Hall
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Learning To Love Data (Week): Creating Data Services Awareness On Campus, Katie M. Wissel, Lisa Deluca
Kathryn Wissel, MBA, MI
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
The Efficacy Of Using Virtual Reality For Job Interviews And Its Effects On Mitigating Discrimination, David M. Cook, Rico Beti, Faris Al-Khatib
Dr. David M Cook
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
An Investigation Into Trust And Security In The Mandatory And Imposed Use Of Financial Icts Upon Older People, David Michael Cook
Dr. David M Cook
Care needs to be taken to reduce the number of people who are fearful and mistrustful of using ICT where that usage is forced upon them without choice or alternative. The growing incidence of mandatory and imposed online systems can result in confusion, misuse, fear, and rejection by people with only rudimentary ICT skills. A cohort where a high percentage of such people occur is older people, defined in this study as people over the age of 60 Examples of compulsory ICT interactions include some banks limiting bank statement access through online rather than paper-based options. Other examples include the …
Uav Sensor Operator Training Enhancement Through Heat Map Analysis, Ashish Amresh, John Femiani, Jason Fairfield, Adam Fairfield
Uav Sensor Operator Training Enhancement Through Heat Map Analysis, Ashish Amresh, John Femiani, Jason Fairfield, Adam Fairfield
Ashish Amresh
Heat map based data visualization and mining is an emerging area in game engine design and architecture. Employed by many state of the art game engines and popular commercial games, this technology helps populate and collate player activity and behavior to better inform the system for further action. Simulation and serious games can tremendously benefit by applying heat map based visualization for the purposes of analyzing and tracking player behavior. Heat maps are time varying texture maps that represent a chosen activity over a certain grid at any particular interval of elapsed time. In this paper results of applying a …
Libraries And Second Life: Getting Started In Virtual Reality, Susan Acampora
Libraries And Second Life: Getting Started In Virtual Reality, Susan Acampora
Susan Acampora
No abstract provided.
Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews
Segmenting Human Trajectory Data By Movement States While Addressing Signal Loss And Signal Noise, Sungsoon Hwang, Cynthia Vandemark, Navdeep Dhatt, Sai Yalla, Ryan Crews
Sungsoon Hwang
The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo
The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo
Tony Wasserman
Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer
Stacked Generalization: An Introduction To Super Learning, Ashley Naimi, Laura Balzer
Laura B. Balzer
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Vr Usability From Elderly Cohorts: Preparatory Challenges In Overcoming Technology Rejection, George Coldham, David M. Cook
Dr. David M Cook
The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser
The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser
Johnny Wong
Technology has become an increasingly integral part of life. For example, technology allows individuals to stay in touch with loved ones, obtain medical services through telehealthcare, and enjoy an overall higher quality of life. Particularly for older adults, using technology increases the likelihood that they will maintain their independence and autonomy. Long-distance caregiving has recently become a feasible option where caregivers for older adults can access reports and information about their loved one’s patterns that day (e.g., food and medication intake). Technology may be able to offset age-related challenges (e.g., caregiving, accessing healthcare, decreased social networks) by applying technology to …
Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471
Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471
Jody C Fagan
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
Shining A Light On A University Special Collection With Data Visualization, Lisa Deluca, Katie M. Wissel
Shining A Light On A University Special Collection With Data Visualization, Lisa Deluca, Katie M. Wissel
Kathryn Wissel, MBA, MI
C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski
Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski
Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Irresistible Bargains: Navigating The Surveillance Society, Robert M. Pallitto
Robert M Pallitto
Towards Decrypting Attractiveness Via Multi-Modality Cue, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan
Towards Decrypting Attractiveness Via Multi-Modality Cue, Tam Nguyen, Si Liu, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan
Tam Nguyen
Decrypting the secret of beauty or attractiveness has been the pursuit of artists and philosophers for centuries. To date, the computational model for attractiveness estimation has been actively explored in the computer vision and multimedia community, yet with the focus mainly on facial features. In this article, we conduct a comprehensive study on female attractiveness conveyed by single/multiple modalities of cues, that is, face, dressing and/or voice; the aim is to discover how different modalities individually and collectively affect the human sense of beauty. To extensively investigate the problem, we collect the Multi-Modality Beauty (M2B) dataset, which is annotated with …
Introduction, Tracy Mitrano
The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook
The Changing Values Of Digital Legacies: E-Books And The Challenges Of Data Mobility And The Perceived Value Of Books, Derani Nathasha Dissanayake, David M. Cook
Dr. David M Cook
Two Roads, One Destination: A Journey Of Discovery, Karen Joc, Peta J. Hopkins, Jessie Donaghey, Wendy Abbott
Two Roads, One Destination: A Journey Of Discovery, Karen Joc, Peta J. Hopkins, Jessie Donaghey, Wendy Abbott
Peta Hopkins
The adoption of resource discovery platforms has been a growing trend in libraries. However, few libraries have reported on the transition from one discovery layer to another, and only a few institutions have discussed two discovery layers available in the same institution at the same time. Bond University Library recently implemented Alma as its library management system, and with this change a new discovery platform, Primo, was implemented to supersede the existing Summon platform. This paper presents the results of a usability study undertaken at Bond University Library in the move from one discovery layer to another.
Choosing A Repository Platform: Open Source Vs. Hosted Solutions, Hillary Corbett, Jimmy Ghaphery, Lauren Work, Sam Byrd
Choosing A Repository Platform: Open Source Vs. Hosted Solutions, Hillary Corbett, Jimmy Ghaphery, Lauren Work, Sam Byrd
Hillary Corbett
Discusses selection of a locally hosted, open-source system (DSpace/Fedora) versus a cloud-hosted, proprietary system (Digital Commons), it is important to note that these examples are merely illustrative. Libraries have a range of choices for repository software that includes open source and proprietary in any number of support environments, and exemplary repositories are flourishing on a variety of systems, both open source and proprietary. This chapter focuses on the differences between proprietary and open-source solutions, but also demonstrates how and why libraries choose a repository system. In writing about this process, we realized that it was important to acknowledge that there …