Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 14 of 14
Full-Text Articles in Social and Behavioral Sciences
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
News - Screven-Jenkins Regional Library, Sharon Blank
News - Screven-Jenkins Regional Library, Sharon Blank
Georgia Library Quarterly
No abstract provided.
Life Is A Lab: Developing A Communication Research Lab For Undergraduate And Graduate Education, Autumn P. Edwards, Chad Edwards, Patric R. Spence
Life Is A Lab: Developing A Communication Research Lab For Undergraduate And Graduate Education, Autumn P. Edwards, Chad Edwards, Patric R. Spence
Journal of Communication Pedagogy
Tips offered center on classroom discourse, curriculum choices, and potential assignments. In this article, we present tips for creating a thriving undergraduate and graduate communication research lab. Based on our experiences developing and co-directing the Communication and Social Robotics Labs (CSRLs), we offer 10 best practices for acquiring resources and recognition, building a strong lab community, and attaining faculty and student goals for scholarship and beyond. Our overarching approach is framed by Dewey’s (1916) pragmatist educational metaphysic, which stresses student- and subject-centered learning, enlarging experiences, and the co-construction of meaning and knowledge. Although our labs are focused on human-machine communication …
Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson
Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson
Purdue Journal of Service-Learning and International Engagement
The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea
Journal of Digital Forensics, Security and Law
In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …
Towards Digital Art In Information Society, Montse Arbelo, Joseba Franco
Towards Digital Art In Information Society, Montse Arbelo, Joseba Franco
CLCWeb: Comparative Literature and Culture
In their article "Towards Digital Art in Information Society" Montse Arbelo and Joseba Franco propose the development of the platform of a Network of Experimental Centers be formed by small groups of people who are qualified and who seek optimal operational effectiveness and who dedicate their resources to the production of digital content and we offer artechmedia <http://www.artechmedia.org> as a base point of departure. Such an international network in a collaborative structure based on national networks would make possible to coordinate existing resources to develop social networks, generate and promote content, engage in forums of discussion and creativity workshops, and …
Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff
Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff
RISK: Health, Safety & Environment (1990-2002)
Challenging the "de minimis risk" concept, Dr. Fischhoff argues that risks ought not to be considered apart from a particular technology's benefits. He argues, too, that the acceptability of particular kinds of risks should not be determined without considering the views of all persons who may be exposed. Finally, building upon the "reasonable person" construct, he suggests ways those goals might be achieved.
Nothing Recedes Like Success - Risk Analysis And The Organizational Amplification Of Risks, William R. Freudenburg
Nothing Recedes Like Success - Risk Analysis And The Organizational Amplification Of Risks, William R. Freudenburg
RISK: Health, Safety & Environment (1990-2002)
Professor Freudenburg believes that there is room for improvement in Risk analysis, particularly in drawing on systematic studies of human behavior in the calculation of real, empirical probabilities of failure. The need is argued to be especially acute where technological Risks are associated with low expected probabilities of failure and are managed by human organizations for extended periods of time. This permits complacency to set in.
Scientific Method, Anti-Foundationalism, And Public Decision-Making, Kristin Shrader-Frechette
Scientific Method, Anti-Foundationalism, And Public Decision-Making, Kristin Shrader-Frechette
RISK: Health, Safety & Environment (1990-2002)
An examination of the legitimacy of attacks on lay assessments of environmental or other technological Risk. The case is made that rational policy requires an epistemology in which what we believe about Risk is bootstrapped onto how we should act concerning Risk.