Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Social and Behavioral Sciences

Encryption And Incrimination: The Evolving States Of Encrypted Drives, Shannon M. Oltmann Dec 2014

Encryption And Incrimination: The Evolving States Of Encrypted Drives, Shannon M. Oltmann

Information Science Faculty Publications

Individuals use encryption to safeguard many valid and legal applications but also to hide illegal activity. Several legal cases have drawn the limits of self-incrimination under the Fifth Amendment regarding providing passwords to access illegal information content,such as child pornography. The cases illustrate that certain knowledge of evidence amounts to a compelling need for access and that a subpoena for hard drive contents is more likely to succeed than requiring a witness to provide a password. Since known documents are not legally protected and biometric data can be compelled as evidence, there is no reason that known digital documents, biometric …


Web 2.0 Use And Knowledge Transfer: How Social Media Technologies Can Lead To Organizational Innovation, Namjoo Choi, Kuang-Yuan Huang, Aaron Palmer, Lenore Horowitz Nov 2014

Web 2.0 Use And Knowledge Transfer: How Social Media Technologies Can Lead To Organizational Innovation, Namjoo Choi, Kuang-Yuan Huang, Aaron Palmer, Lenore Horowitz

Information Science Faculty Publications

The concept of Web 2.0 has gained widespread prominence in recent years. The use of Web 2.0 applications on an individual level is currently extensive, and such applications have begun to be implemented by organizations in hopes of boosting collaboration and driving innovation. Despite this growing trend, only a small number of theoretical perspectives are available in the literature that discuss how such applications could be utilized to assist in innovation. In this paper, we propose a theoretical model explicating this phenomenon. We argue that organizational Web 2.0 use fosters the emergence and enhancement of informal networks, weak ties, boundary …


Online Deception In Social Media, Michail Tsikerdekis, Sherali Zeadally Sep 2014

Online Deception In Social Media, Michail Tsikerdekis, Sherali Zeadally

Information Science Faculty Publications

The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.


Multiple Account Identity Deception Detection In Social Media Using Nonverbal Behavior, Michail Tsikerdekis, Sherali Zeadally Aug 2014

Multiple Account Identity Deception Detection In Social Media Using Nonverbal Behavior, Michail Tsikerdekis, Sherali Zeadally

Information Science Faculty Publications

Identity deception has become an increasingly important issue in the social media environment. The case of

blocked users initiating new accounts, often called sockpuppetry, is widely known and past efforts, which have attempted to detect such users, have been primarily based on verbal behavior (e.g., using profile data or lexic al features in text). Although these methods yield a high detection accuracy rate, they are computationally inefficient for the social media environment, which often involves databases with large volumes of data. To date, little attention has been paid to detecting online decep- tion using nonverbal behavior. We present a detection …


Academic Libraries And Open Access Strategies, C. Sean Burns Feb 2014

Academic Libraries And Open Access Strategies, C. Sean Burns

Information Science Faculty Publications

With the rise of alternate discovery services, such as Google Scholar, in conjunction with the increase in open access content, researchers have the option to bypass academic libraries when they search for and retrieve scholarly information. This state of affairs implies that academic libraries exist in competition with these alternate services and with the patrons who use them, and as a result, may be disintermediated from the scholarly information seeking and retrieval process. Drawing from decision and game theory, bounded rationality, information seeking theory, citation theory, and social computing theory, this study investigates how academic librarians are responding as competitors …


Academic Libraries And Automation: A Historical Reflection On Ralph Halsted Parker, C. Sean Burns Jan 2014

Academic Libraries And Automation: A Historical Reflection On Ralph Halsted Parker, C. Sean Burns

Information Science Faculty Publications

This paper provides a historical account of Ralph Halsted Parker and his work to automate libraries in the early to middle parts of the twentieth century. One of Parker’s motivations to automate stemmed from a desire to professionalize academic librarianship, and this is evident in his administration as library director at the University of Missouri. Importantly, the motivation implies a simple means of judging the critical use of technology: that any substantive technology should be evaluated by how well it benefits librarians. Parker’s additional contributions included consulting and coauthoring, with Frederick G. Kilgour, the report that led to the Online …


Enhancing The Care Navigation Model: Potential Roles For Health Sciences Librarians, Jeffrey T. Huber, Robert M. Shapiro Ii, Heather J. Burke, Aaron Palmer Jan 2014

Enhancing The Care Navigation Model: Potential Roles For Health Sciences Librarians, Jeffrey T. Huber, Robert M. Shapiro Ii, Heather J. Burke, Aaron Palmer

Information Science Faculty Publications

This study analyzed the overlap between roles and activities that health care navigators perform and competencies identified by the Medical Library Association's (MLA's) educational policy statement. Roles and activities that health care navigators perform were gleaned from published literature. Once common roles and activities that health care navigators perform were identified, MLA competencies were mapped against those roles and activities to identify areas of overlap. The greatest extent of correspondence occurred in patient empowerment and support. Further research is warranted to determine the extent to which health sciences librarians might assume responsibility for roles and activities that health care navigators …