Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 7968

Full-Text Articles in Social and Behavioral Sciences

“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert Jan 2021

“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert

Secrecy and Society

Because of the asymmetries in knowledge regarding the underlying hidden mechanisms as well as because of the importance of intentional deception, entertainment magic is often presented as an exercise in power, manipulation, and control. This article challenges such portrayals and through doing so common presumptions about how secrets are kept. It does so through recounting the experiences of the author as a beginner learning a craft. Regard for the choices and tensions associated with the accomplishment of mutually recognized deception in entertainment magic are marshalled to consider how it involves ‘reciprocal action’ between the audience and the performer. Attending to ...


Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell Jan 2021

Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell

Secrecy and Society

Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields ...


Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin Jan 2021

Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin

Faculty of Engineering and Information Sciences - Papers: Part B

The identification of protein-protein interaction (PPI) is one of the most important tasks to understand the biological functions and disease mechanisms. Although numerous databases of biological interactions have been published in debt to advanced high-throughput technology, the study of inter-species protein-protein interactions, especially between human and bacterium pathogens, remains an active yet challenging topic to harness computational models tackling the complex analysis and prediction tasks. In this paper, we comprehensively revisit the prediction task of human-bacterium protein-protein interactions (HB-PPI), which is a first ever endeavour to report an empirical evaluation in learning and predicting HB-PPI based on machine learning models ...


A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong Jan 2021

A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong

Faculty of Engineering and Information Sciences - Papers: Part B

In recent years, machine learning-based cyber intrusion detection methods have gained increasing popularity. The number and complexity of new attacks continue to rise; therefore, effective and intelligent solutions are necessary. Unsupervised machine learning techniques are particularly appealing to intrusion detection systems since they can detect known and unknown types of attacks as well as zero-day attacks. In the current paper, we present an unsupervised anomaly detection method, which combines Sub-Space Clustering (SSC) and One Class Support Vector Machine (OCSVM) to detect attacks without any prior knowledge. The proposed approach is evaluated using the well-known NSL-KDD dataset. The experimental results demonstrate ...


Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall Jan 2021

Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall

Faculty of Engineering and Information Sciences - Papers: Part B

Background and purpose: The purpose of this work is to present the clinical experience from the first-in-human trial of real-time tumor targeting via MLC tracking for stereotactic ablative body radiotherapy (SABR) of lung lesions. Methods and materials: Seventeen patients with stage 1 non-small cell lung cancer (NSCLC) or lung metastases were included in a study of electromagnetic transponder–guided MLC tracking for SABR (NCT02514512). Patients had electromagnetic transponders inserted near the tumor. An MLC tracking SABR plan was generated with planning target volume (PTV) expanded 5 mm from the end-exhale gross tumor volume (GTV). A clinically approved comparator plan was ...


The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya Jan 2021

The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya

Journal of International Technology and Information Management

This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system ...


Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison Jan 2021

Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison

Articles

The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.


Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd Jan 2021

Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd

Journal of International Technology and Information Management

This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with ...


Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner Dec 2020

Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner

Human–Wildlife Interactions

Common pest birds in the United States include the non-native European starling (Sturnus vulgaris), house sparrow (Passer domesticus), and the pigeon (Columba livia domestica), as well as native birds including Canada geese (Branta canadensis) and gull species (Laridae). Large concentrations of pest birds can create human health hazards and monetary losses due to consumption of crops, depredation, and fecal contamination and accumulation. Fecal contamination hazards include the potential spread of zoonotic diseases including antimicrobial-resistant zoonoses and human injury due to the accumulation of fecal material on walking surfaces. Additionally, fecal accumulation causes structural and aesthetic damage due to the accelerated ...


Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus Dec 2020

Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus

Journal of Media Literacy Education

Reviewing the history of media literacy education might help us to identify how creating media as an approach can contribute to fostering knowledge, understanding technical issues, and to establishing a critical attitude towards technology and data. In a society where digital devices and services are omnipresent and decisions are increasingly based on data, critical analysis must penetrate beyond the “outer shell” of machines – their interfaces – through the technology itself, and the data, and algorithms, which make these devices and services function. Because technology and data constitute the basis of all communication and collaboration, media literate individuals must in the ...


Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes Dec 2020

Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes

The Journal of Sociotechnical Critique

As Artificial Intelligence (AI) systems shift to interact with new domains and populations, so does AI ethics: a relatively nascent subdiscipline that frequently concerns itself with questions of “fairness” and “accountability.” This fairness-centred approach has been criticized for (amongst other things) lacking the ability to address discursive, rather than distributional, injustices. In this paper I simultaneously validate these concerns, and work to correct the relative silence of both conventional and critical AI ethicists around disability, by exploring the narratives deployed by AI researchers in discussing and designing systems around autism. Demonstrating that these narratives frequently perpetuate a dangerously dehumanizing model ...


“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder Nov 2020

“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder

The Journal of Sociotechnical Critique

When it comes to social robotics (robots that engage human social responses via “eyes” and other facial features, voice-based natural-language interactions, and even evocative movements), ethicists, particularly in European and North American traditions, are divided over whether and why they might be morally considerable. Some argue that moral considerability is based on internal psychological states like consciousness and sentience, and debate about thresholds of such features sufficient for ethical consideration, a move sometimes criticized for being overly dualistic in its framing of mind versus body. Others, meanwhile, focus on the effects of these robots on human beings, arguing that psychological ...


Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller Nov 2020

Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller

The Journal of Sociotechnical Critique

Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.


Antitrust And Platform Monopoly, Herbert J. Hovenkamp Nov 2020

Antitrust And Platform Monopoly, Herbert J. Hovenkamp

Faculty Scholarship at Penn Law

Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.

Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive ...


Lab Notes Nov 2020

Lab Notes

Scientia

Paleo Showcase; Expert Opinions; School of Nursing Director Appointed; EPISTEM Porject; CSH Honors Award Recipients; Diversity Fellowship


Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal Nov 2020

Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

This study examines the concept of E-volunteerism via the modes of information network, as it is a new term in the field of voluntary work and its diverse domains. The study discusses this new practice in terms of meanings and relevance to the scientific progress as well as the current global and technological revolution, particularly the great development in information network (Internet). To achieve this, the study adopted the inductive method and the content analysis of the various related texts. This study also sheds light on the ways people approach E- volunteerism, and devises methods for indi-viduals/groups/institutions to ...


Diversity Of Idea Flows And Economic Growth, Alex Pentland Nov 2020

Diversity Of Idea Flows And Economic Growth, Alex Pentland

Journal of Social Computing

What role does access to diverse ideas play in economic growth? New forms of geo-located communications and economic data allow measurement of human interaction patterns and prediction of economic outcomes for individuals, communities, and nations at a fine granularity, with the strongest predictors of income, productivity, and growth being measures of diversity and frequency of physical interaction between communities (clusters of interaction). This finding provides both new investment opportunities and new methods of risk assessment. Access and use of these data raise privacy and security risks, and the final section of the paper describes how these challenges can be controlled.


Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West Nov 2020

Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West

Journal of Social Computing

In many societies, appearing slim (corresponding to a small body-mass index) is considered attractive. The fashion industry has been attempting to cater to this trend by designing outfits that can enhance the appearance of slimness. Two anecdotal rules, widespread in the world of fashion, are to choose dark clothes and avoid horizontal stripes, in order to appear slim. Thus far, empirical evidence has been unable to conclusively determine the validity of these rules, and there is consequently much controversy regarding the impact of both color and patterns on the visual perception of weight. In this paper, we aim to close ...


Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu Nov 2020

Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu

Journal of Social Computing

This paper poses a question: How many types of social relations can be categorized in the Chinese context? In social networks, the calculation of tie strength can better represent the degree of intimacy of the relationship between nodes, rather than just indicating whether the link exists or not. Previou research suggests that Granovetter measures tie strength so as to distinguish strong ties from weak ties, and the Dunbar circle theory may offer a plausible approach to calculating 5 types of relations according to interaction frequency via unsupervised learning (e.g., clustering interactive data between users in Facebook and Twitter). In ...


A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang Nov 2020

A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang

Journal of Social Computing

Past studies on the Chinese internet management system have revealed a smart internet management system that takes advantage of time to filter content with collective action potential. How and why such a system was institutionalized? We offer a historical institutional analysis to explain the way in which the system evolved. We implement social network analysis to examine the Weibo posts of recurrent events, the elections in Area A in 2016 and 2018, to identify pattern changes in the system. There are two aspects of the changes: the centralization of the command line to a single authority and the implementation of ...


Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran Nov 2020

Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran

Journal of Social Computing

The Chicago Array of Things (AoT) project, funded by the US National Science Foundation, created an experimental, urban-scale measurement capability to support diverse scientific studies. Initially conceived as a traditional sensor network, collaborations with many science communities guided the project to design a system that is remotely programmable to implement Artificial Intelligence (AI) within the devices—at the "edge" of the network—as a means for measuring urban factors that heretofore had only been possible with human observers, such as human behavior including social interaction. The concept of "software-defined sensors" emerged from these design discussions, opening new possibilities, such as ...


Social Computing Unhinged, James Evans Nov 2020

Social Computing Unhinged, James Evans

Journal of Social Computing

Social computing is ubiquitous and intensifying in the 21st Century. Originally used to reference computational augmentation of social interaction through collaborative filtering, social media, wikis, and crowdsourcing, here I propose to expand the concept to cover the complete dynamic interface between social interaction and computation, including computationally enhanced sociality and social science, socially enhanced computing and computer science, and their increasingly complex combination for mutual enhancement. This recommends that we reimagine Computational Social Science as Social Computing, not merely using computational tools to make sense of the contemporary explosion of social data, but also recognizing societies as emergent computers of ...


Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson Nov 2020

Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson

Texas A&M Law Review

Employing facial recognition technology implicates anti-discrimination law under Title VII of the Civil Rights Act when used as a factor in employment decisions. The very technological breakthroughs that made facial recognition technology commercially viable—data compression and artificial intelligence— also contribute to making facial recognition technology discriminatory in its effect on members of classes protected by Title VII. This Article first explains how facial recognition technology works and its application in employee background checks. Then, it analyzes whether the use of facial recognition technology in background checks violates Title VII under the disparate impact theory of liability due to the ...


Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson Oct 2020

Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson

Kansas Library Association College and University Libraries Section Proceedings

Abstract

Self service technology (SST) is inundating the library world with more efficient forms of service for the library user experience. There are different types of SST and each type creates challenges and opportunities in the academic library. This multi-varied approach provides quality support to users who are unfamiliar with the technology, and offers time expediency to those who are adept at using SST. This persuasive paper will show what Kansas academic libraries currently have in the form of SST and encourage libraries to adopt new methods of service. The goal is to get you excited about SST and relieve ...


Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein Oct 2020

Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein

Northwest Journal of Teacher Education

This is a meditation on the role of absence during the COVID-19, especially the ways absences are felt and experienced. It explores the roles of bodies as both symbols and material. Bodies are both thought through the logic of borders and difference but also as the raw resources of scientific investigations. This is all examined within and against “education” both in my and in my students’ (pre and in-service teachers) classes and our anxieties of not knowing the what or how we of our jobs in these conditions.


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and ...


Iowa Climate Statement 2020: Will Covid-19 Lessons Help Us Survive Climate Change?, David Courard-Hauri, Gene Takle, Ulrike Passe, Mahdi Al-Kaisi, Karin Allenspach, Craig A. Anderson, Rajeev Arora, William D. Beavis, Diane F. Birt, Cinzia Cervato, Silvia Cianzio, James L. Cornette, Richard M. Cruse, Radford Davis, Kathleen Delate, Iddo Friedberg, Charles E. Glatz, Bill Gutowski, Steven J. Hall, Thomas C. Harrington, Emily Heaton, Theodore J. Heindel, Brian Hornbuckle, Ming-Chen Hsu, Albert E. Jergens, Frederick Kirschenmann, Erwin Klaas, Owen Kolstad, Dennis Lavrov, Matt Liebman, Laura C. Merrick, James Michael, Chris Minion, Kenneth J. Moore, Ajay Nair, Marit Nilsen-Hamilton, James L. Pease, Reuben J. Peters, Paola G. Pittoni, James W. Raich, Mark Rasmussen, Jane Rongerude, Kurt A. Rosentrater, Ann E. Russell, James A. Roth, Patrick S. Schnable, Mack Shelley, William W. Simpkins, Robert C. Summerfelt, David A. Swenson, Elwynn Taylor, Grant L. Thompson, Alan D. Wanamaker, Andrea Susan Wheeler, Brian J. Wilsey, Sam Wormley, Et Al. Oct 2020

Iowa Climate Statement 2020: Will Covid-19 Lessons Help Us Survive Climate Change?, David Courard-Hauri, Gene Takle, Ulrike Passe, Mahdi Al-Kaisi, Karin Allenspach, Craig A. Anderson, Rajeev Arora, William D. Beavis, Diane F. Birt, Cinzia Cervato, Silvia Cianzio, James L. Cornette, Richard M. Cruse, Radford Davis, Kathleen Delate, Iddo Friedberg, Charles E. Glatz, Bill Gutowski, Steven J. Hall, Thomas C. Harrington, Emily Heaton, Theodore J. Heindel, Brian Hornbuckle, Ming-Chen Hsu, Albert E. Jergens, Frederick Kirschenmann, Erwin Klaas, Owen Kolstad, Dennis Lavrov, Matt Liebman, Laura C. Merrick, James Michael, Chris Minion, Kenneth J. Moore, Ajay Nair, Marit Nilsen-Hamilton, James L. Pease, Reuben J. Peters, Paola G. Pittoni, James W. Raich, Mark Rasmussen, Jane Rongerude, Kurt A. Rosentrater, Ann E. Russell, James A. Roth, Patrick S. Schnable, Mack Shelley, William W. Simpkins, Robert C. Summerfelt, David A. Swenson, Elwynn Taylor, Grant L. Thompson, Alan D. Wanamaker, Andrea Susan Wheeler, Brian J. Wilsey, Sam Wormley, Et Al.

Agronomy Reports

The current SARS-CoV2 pandemic is a social, humanitarian, and economic crisis that was predicted by experts but made worse by a failure to act proactively on those warnings. As scientists teaching and studying climate and its impacts, we believe there are three important lessons from the current pandemic that apply to our understanding of climate mitigation and adaptation in Iowa.


Using Fitbit Competitions To Increase Physical Activity In College Students, Omar Ramirez, Vipa Bernhardt Sep 2020

Using Fitbit Competitions To Increase Physical Activity In College Students, Omar Ramirez, Vipa Bernhardt

The Macksey Journal

Background: According to the World Health Organization (2018), physical inactivity is a leading risk factors for global mortality. Only one in four college students meet the current federal Physical Activity Guidelines for Americans of engaging in ≥150 minutes per week of exercise (Raynor and Jankowiak, 2010). The advancement of technology, especially in the acquisition of physical activity data, combined with the desire for virtual social interaction, has not been studied in college students. It is unknown if physical activity trackers and accompanying mobile apps, such as Fitbit, could motivate college students to be more physically active. It was hypothesized that ...


Data And Information As Our New Transport Infrastructure: An Exploration Into How The Modern Transport System Is Being Shaped By Information Communication Technology, Adam Davidson Sep 2020

Data And Information As Our New Transport Infrastructure: An Exploration Into How The Modern Transport System Is Being Shaped By Information Communication Technology, Adam Davidson

Dissertations, Theses, and Capstone Projects

This dissertation is focuses on the role that data and information has in creating and altering behavior related to transportation. To do so, it lays out a theoretical model of technological transition and then follows it up with three case studies. The theoretical model provides a structure to consider how different actors in our transportation ecosystem – users, firms, policy actors – mix with technological evolution to uphold or incrementally recreate our transportation landscape. The case studies stand on their own to highlight important findings about how data and information are impacting transportation scenarios, but collectively reinforce the theoretical models.

The theory ...


Effect Of Social Media Addiction On Reading Culture: A Study Of Nigerian Students, Isaac E. Anyira, Obiora Kingsley Udem Aug 2020

Effect Of Social Media Addiction On Reading Culture: A Study Of Nigerian Students, Isaac E. Anyira, Obiora Kingsley Udem

Library Philosophy and Practice (e-journal)

The main purpose of this study is to examine the effects of social media addiction on reading culture of Nigerian students in higher institutions of learning. An online survey was sent to 1500 students of higher institutions in Nigeria during the Lockdown necessitated by the outbreak of the dreaded Corona Virus (Covid-19) Pandemic. A total of 1300 questionnaires were completed and returned. This implies 86.7% return rate. Data was analyzed using graphical charts. The findings of the study showed that social media mostly used by student include Facebook, followed by WhatsApp, YouTube, Pinterest, Twitter, Instagram, Wordpress, Snapchat, Reddit, respectively ...