Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Social and Behavioral Sciences

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry Jan 2021

Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry

Journal of International Technology and Information Management

The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


Life Is A Lab: Developing A Communication Research Lab For Undergraduate And Graduate Education, Autumn P. Edwards, Chad Edwards, Patric R. Spence Jan 2018

Life Is A Lab: Developing A Communication Research Lab For Undergraduate And Graduate Education, Autumn P. Edwards, Chad Edwards, Patric R. Spence

Journal of Communication Pedagogy

Tips offered center on classroom discourse, curriculum choices, and potential assignments. In this article, we present tips for creating a thriving undergraduate and graduate communication research lab. Based on our experiences developing and co-directing the Communication and Social Robotics Labs (CSRLs), we offer 10 best practices for acquiring resources and recognition, building a strong lab community, and attaining faculty and student goals for scholarship and beyond. Our overarching approach is framed by Dewey’s (1916) pragmatist educational metaphysic, which stresses student- and subject-centered learning, enlarging experiences, and the co-construction of meaning and knowledge. Although our labs are focused on human-machine communication …


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson Oct 2017

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so children …


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Towards Digital Art In Information Society, Montse Arbelo, Joseba Franco Dec 2014

Towards Digital Art In Information Society, Montse Arbelo, Joseba Franco

CLCWeb: Comparative Literature and Culture

In their article "Towards Digital Art in Information Society" Montse Arbelo and Joseba Franco propose the development of the platform of a Network of Experimental Centers be formed by small groups of people who are qualified and who seek optimal operational effectiveness and who dedicate their resources to the production of digital content and we offer artechmedia <http://www.artechmedia.org> as a base point of departure. Such an international network in a collaborative structure based on national networks would make possible to coordinate existing resources to develop social networks, generate and promote content, engage in forums of discussion and creativity workshops, and …


Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff Jan 1994

Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff

RISK: Health, Safety & Environment (1990-2002)

Challenging the "de minimis risk" concept, Dr. Fischhoff argues that risks ought not to be considered apart from a particular technology's benefits. He argues, too, that the acceptability of particular kinds of risks should not be determined without considering the views of all persons who may be exposed. Finally, building upon the "reasonable person" construct, he suggests ways those goals might be achieved.


Nothing Recedes Like Success - Risk Analysis And The Organizational Amplification Of Risks, William R. Freudenburg Jan 1992

Nothing Recedes Like Success - Risk Analysis And The Organizational Amplification Of Risks, William R. Freudenburg

RISK: Health, Safety & Environment (1990-2002)

Professor Freudenburg believes that there is room for improvement in Risk analysis, particularly in drawing on systematic studies of human behavior in the calculation of real, empirical probabilities of failure. The need is argued to be especially acute where technological Risks are associated with low expected probabilities of failure and are managed by human organizations for extended periods of time. This permits complacency to set in.


Scientific Method, Anti-Foundationalism, And Public Decision-Making, Kristin Shrader-Frechette Jan 1990

Scientific Method, Anti-Foundationalism, And Public Decision-Making, Kristin Shrader-Frechette

RISK: Health, Safety & Environment (1990-2002)

An examination of the legitimacy of attacks on lay assessments of environmental or other technological Risk. The case is made that rational policy requires an epistemology in which what we believe about Risk is bootstrapped onto how we should act concerning Risk.