Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (115)
- University of Pennsylvania Carey Law School (41)
- University of Nebraska - Lincoln (31)
- Singapore Management University (17)
- Old Dominion University (15)
-
- Kansas State University Libraries (13)
- Selected Works (11)
- University of Georgia School of Law (7)
- University of South Florida (6)
- City University of New York (CUNY) (5)
- Embry-Riddle Aeronautical University (5)
- SIT Graduate Institute/SIT Study Abroad (5)
- New Jersey Institute of Technology (4)
- SelectedWorks (4)
- University of Arkansas, Fayetteville (4)
- University of Kentucky (4)
- Purdue University (3)
- University of Central Florida (3)
- Western Michigan University (3)
- Bowling Green State University (2)
- California Polytechnic State University, San Luis Obispo (2)
- Claremont Colleges (2)
- Institute of Business Administration (2)
- Johnson County Community College (2)
- Kean University (2)
- Penn State Dickinson Law (2)
- St. Mary's University (2)
- Syracuse University (2)
- University of Massachusetts Amherst (2)
- University of Nevada, Las Vegas (2)
- Keyword
-
- Internet (14)
- Social media (12)
- Privacy (11)
- Technology (10)
- ToC (10)
-
- Cybersecurity (9)
- Data mining (7)
- Innovation (7)
- Telecommunications (7)
- Communication (6)
- Information (6)
- Security (6)
- Blockchain (5)
- Cloud Computing (5)
- Cloud computing (5)
- Competition (5)
- Machine learning (5)
- Network economic effects (5)
- Social Media (5)
- TAM (5)
- Table (5)
- Twitter (5)
- Antitrust (4)
- Artificial intelligence (4)
- Blogs (4)
- China (4)
- Contents (4)
- Digital preservation (4)
- Editor (4)
- Healthcare (4)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (115)
- All Faculty Scholarship (41)
- Library Philosophy and Practice (e-journal) (21)
- Research Collection School Of Computing and Information Systems (13)
- Central Plains Network for Digital Asset Management (12)
-
- Military Cyber Affairs (6)
- Independent Study Project (ISP) Collection (5)
- Computer Science Theses & Dissertations (4)
- Computerized Conferencing and Communications Center Reports (4)
- Continuing Legal Education Presentations (4)
- Faculty Publications (4)
- Matt Schultz (4)
- Copyright, Fair Use, Scholarly Communication, etc. (3)
- Cybersecurity Undergraduate Research Showcase (3)
- Human-Machine Communication (3)
- Journal of Communication Pedagogy (3)
- Presentations (3)
- Annual ADFSL Conference on Digital Forensics, Security and Law (2)
- Center for Cybersecurity (2)
- Dickinson Law Review (2017-Present) (2)
- Electronic Theses and Dissertations (2)
- English Language Institute (2)
- Graduate Theses and Dissertations (2)
- Honors Projects (2)
- Information Science Faculty Publications (2)
- Open Access Theses & Dissertations (2)
- Open Educational Resources (2)
- Publications and Research (2)
- UNL Libraries: Faculty Publications (2)
- AFIT Patents (1)
- Publication Type
- File Type
Articles 1 - 30 of 358
Full-Text Articles in Social and Behavioral Sciences
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le
Posters-at-the-Capitol
Abstract
Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.
Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.
Results: There were 102 respondents …
Alice In Cyberspace 2024, Stanley Mierzwa
Alice In Cyberspace 2024, Stanley Mierzwa
Center for Cybersecurity
‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden
Copyright, Fair Use, Scholarly Communication, etc.
Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.
My Administration places the highest urgency …
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication: Complete Volume. Volume 6
Human-Machine Communication
This is the complete volume of HMC Volume 6.
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Social Networks And Their Impact On Social Values In The United Arab Emirates, Muhammad Al-Naqbi
Social Networks And Their Impact On Social Values In The United Arab Emirates, Muhammad Al-Naqbi
Journal of Police and Legal Sciences
The aim of the study was to measure the impact of social media networks on societal values in the United Arab Emirates (UAE). To achieve this objective, a questionnaire was used as a data collection tool, and a social survey method was employed within the study's community. A simple random sample of 50 individuals was selected from the employees of the Social Support Center and the Department of Social Care in the Emirate of Sharjah. The study found several results, including that social media networks contribute to learning unethical behaviors and the spread of extremist ideas that affect societal values. …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson
Journal of International Technology and Information Management
This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari
Journal of International Technology and Information Management
The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …
Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill
Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill
Journal of International Technology and Information Management
The interdependent learning process is regarded as a crucial part of e-learning success, but it has been largely ignored in e-learning empirical research. Grounded in constructivist and social constructivist theory, we present and test an e-learning success model consisting of eight e-learning critical success factors (CSF) derived from constructivist and social constructivist models. Three hundred seventy-two on-line students from a Midwestern university in the United States participated in the survey. The data collected from the survey was used to examine the partial least squares structural equation model. The results highlight the importance of self-regulated learning and dialogical processes to explain …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca
Human-Machine Communication
Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar
How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar
Information Systems Undergraduate Honors Theses
Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger
Honors Projects
As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …
Small Town To The World Wide Web: Designing A Website For A Local Business, Madison Cozzens
Small Town To The World Wide Web: Designing A Website For A Local Business, Madison Cozzens
Honors Projects
The Raspberry and The Rose is a small business in Medina, OH, and had a multitude of visual communication issues that needed to be solved. But what's an online presence without a website? "Small Town to the World Wide Web: Designing a Website for a Local Business" focuses on fulfilling a local business's need for a strong online presence. It dives into how a user's experience on the website can impact brand loyalty, foot traffic, and overall perception of a business. The ultimate goal of this project is to provide insight into how a non-e-commerce website can impact a business.
Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan
Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan
Center for Cybersecurity
Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events. Additionally, a proposed set of non-technical recovery preparation tasks are outlined to help organizations bring about cohesiveness and planning for dealing with the real potential of a ransomware event. Constraints from many …
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M
Library Philosophy and Practice (e-journal)
This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …