Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

Technology Capacity Development Through Oss Implementation: The Case Of Public Higher Education Institutions In Ethiopia, Nigussie Tadesse Mengesha Dec 2010

Technology Capacity Development Through Oss Implementation: The Case Of Public Higher Education Institutions In Ethiopia, Nigussie Tadesse Mengesha

The African Journal of Information Systems

The Open Source Software (OSS) literature gives little attention to the study and practice of domain specific end-user OSS implementation in general and in the public sector of developing countries (DCs) in particular. This paper, however, investigates the trajectories of two OSS-based information systems (IS) implementation projects in a developing country (DC) context with the aim to uncover the practice-based learning and resource sharing evident among locally situated and globally dispersed developers and users. The result of the interpretative case study research shows that the OSS philosophy and practice of software development, implementation and ownership, facilitates for the emergence of …


The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells Oct 2010

The Mississippi Digital Library’S Civil Rights Thesaurus: An Evolving Authority Control Tool For Civil Rights-Related Headings In Metadata Records, Kathleen L. Wells

The Southeastern Librarian

The online Civil Rights Thesaurus (CRT) at the University of Southern Mississippi (USM) had its beginnings in the digitization of civil rights materials in the university’s McCain Library and Archives in the early 2000s. The materials included oral history interviews, letters, newspaper clippings, photographs, and other items from the rich history of the civil rights movement in Mississippi, including materials from the Freedom Summer of 1964. In addition to the creation of digitized images, making these materials available online as the Civil Rights in Mississippi Digital Archive included the formulation of descriptive records using Dublin Core metadata and the development …


2010 - The Fifteenth Annual Symposium Of Student Scholars Apr 2010

2010 - The Fifteenth Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Fifteenth Annual Symposium of Student Scholars, held on April 27, 2010. Includes abstracts from the presentations and posters.


The Location Decisions Of Foreign Investors In China: Untangling The Effect Of Wages Using A Control Function Approach, Xuepeng Liu, Mary E. Lovely, Jan Ondrich Feb 2010

The Location Decisions Of Foreign Investors In China: Untangling The Effect Of Wages Using A Control Function Approach, Xuepeng Liu, Mary E. Lovely, Jan Ondrich

Faculty and Research Publications

There is almost no support for the proposition that capital is attracted to low wages from firm-level studies. We examine the location choices of 2,884 firms investing in China between 1993 and 1996 to offer two main contributions. First, we find that the location of labor-intensive activities is highly elastic to provincial wage differences. Generally, investors' wage sensitivity declines as the skill intensity of the industry increases. Second, we find that unobserved location-specific attributes exert a downward bias on estimated wage sensitivity. Using a control function approach, we estimate a downward bias of 50% to 90% in wage coefficients estimated …


Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck Jan 2010

Save Gas Using Your Office Computer From Home, Steve Duckworth, Damon Armour, Jeff Heck

Georgia Library Quarterly

The article discusses the protocols used to establish remote computer connections from home. The Remote Desktop Protocol (RDP) used in Windows 7 connecting to a Windows 2008 server reportedly allows the playing of high-definition video using Media Player. It is stated that commercial product connections which may bypass security infrastructure are risky because of the home computer's possible insecurity and that home devices used for business purposes may be legally searched by the state.