Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Wollongong (4408)
- Selected Works (1077)
- Wright State University (632)
- SelectedWorks (274)
- Syracuse University (188)
-
- University of Massachusetts Amherst (129)
- California State University, San Bernardino (87)
- Nova Southeastern University (76)
- University of Nebraska at Omaha (70)
- University of Nevada, Las Vegas (48)
- University of Nebraska - Lincoln (48)
- Old Dominion University (39)
- Western Kentucky University (36)
- City University of New York (CUNY) (36)
- Eastern Illinois University (32)
- Embry-Riddle Aeronautical University (29)
- University of Pennsylvania (29)
- University of Massachusetts Boston (28)
- Eastern Michigan University (26)
- Claremont Colleges (26)
- University of Pennsylvania Carey Law School (26)
- University of Pittsburgh School of Law (26)
- University of Tennessee, Knoxville (24)
- Purdue University (23)
- University of Kentucky (18)
- Clemson University (17)
- University of New Hampshire (16)
- College of DuPage (13)
- University of South Florida (13)
- Iowa State University (13)
- Keyword
-
- Computer Science and Engineering (312)
- Analysis (158)
- Technology (155)
- System (129)
- Systems (128)
-
- Study (126)
- Model (126)
- Steel (122)
- Performance (117)
- Energy (111)
- High (103)
- Control (99)
- Data (97)
- Design (93)
- Effect (89)
- Semantic Web (81)
- Networks (81)
- Power (80)
- Method (78)
- Approach (77)
- During (75)
- Development (71)
- Oceanography (70)
- Thermal energy (70)
- Ocean energy (70)
- Richard Meyer (70)
- Ocean thermal energy conversion (70)
- OTEC (70)
- Meyer-Roney OTEC Library (70)
- OTEC Liaison (70)
- Publication Year
- Publication
-
- Faculty of Engineering and Information Sciences - Papers: Part A (2924)
- Faculty of Engineering and Information Sciences - Papers: Part B (1471)
- Kno.e.sis Publications (541)
- Amit P. Sheth (345)
- BEADS: Journal of the Society of Bead Researchers (185)
-
- Computer Science and Engineering Faculty Publications (90)
- Journal of International Technology and Information Management (86)
- The OTEC Liaison (70)
- Michael Friedewald (49)
- Faisal I Hai (44)
- Faculty Books and Monographs (38)
- Masters Theses (36)
- International Dimensions of Ethics Education in Science and Engineering (36)
- Scott J. Wallsten (36)
- Manuel Fernández-Esquinas (35)
- National Center for Digital Government (34)
- Professor Katina Michael (27)
- Associate Professor Adam Rennie (27)
- Faculty Scholarship at Penn Law (26)
- Philip Shapira (25)
- Master's Theses and Doctoral Dissertations (25)
- Dr Philip Ciufo (23)
- Professor Willy Susilo (21)
- DLTS Faculty Publications (21)
- Buddhima Indraratna (20)
- Dr Lasantha G Meegahapola (19)
- Daniel P Aldrich (19)
- Robert Hoppe (18)
- Articles (18)
- NSTec UNLV Symposium (17)
- Publication Type
Articles 1 - 30 of 7968
Full-Text Articles in Social and Behavioral Sciences
“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert
“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert
Secrecy and Society
Because of the asymmetries in knowledge regarding the underlying hidden mechanisms as well as because of the importance of intentional deception, entertainment magic is often presented as an exercise in power, manipulation, and control. This article challenges such portrayals and through doing so common presumptions about how secrets are kept. It does so through recounting the experiences of the author as a beginner learning a craft. Regard for the choices and tensions associated with the accomplishment of mutually recognized deception in entertainment magic are marshalled to consider how it involves ‘reciprocal action’ between the audience and the performer. Attending to ...
Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell
Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell
Secrecy and Society
Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields ...
Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin
Towards A More Effective Bidirectional Lstm-Based Learning Model For Human-Bacterium Protein-Protein Interactions, Huaming Chen, Jun Shen, Lei Wang, Yaochu Jin
Faculty of Engineering and Information Sciences - Papers: Part B
The identification of protein-protein interaction (PPI) is one of the most important tasks to understand the biological functions and disease mechanisms. Although numerous databases of biological interactions have been published in debt to advanced high-throughput technology, the study of inter-species protein-protein interactions, especially between human and bacterium pathogens, remains an active yet challenging topic to harness computational models tackling the complex analysis and prediction tasks. In this paper, we comprehensively revisit the prediction task of human-bacterium protein-protein interactions (HB-PPI), which is a first ever endeavour to report an empirical evaluation in learning and predicting HB-PPI based on machine learning models ...
A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong
A Hybrid Unsupervised Clustering-Based Anomaly Detection Method, Guo Pu, Lijuan Wang, Jun Shen, Fang Dong
Faculty of Engineering and Information Sciences - Papers: Part B
In recent years, machine learning-based cyber intrusion detection methods have gained increasing popularity. The number and complexity of new attacks continue to rise; therefore, effective and intelligent solutions are necessary. Unsupervised machine learning techniques are particularly appealing to intrusion detection systems since they can detect known and unknown types of attacks as well as zero-day attacks. In the current paper, we present an unsupervised anomaly detection method, which combines Sub-Space Clustering (SSC) and One Class Support Vector Machine (OCSVM) to detect attacks without any prior knowledge. The proposed approach is evaluated using the well-known NSL-KDD dataset. The experimental results demonstrate ...
Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall
Mlc Tracking For Lung Sabr Is Feasible, Efficient And Delivers High-Precision Target Dose And Lower Normal Tissue Dose, Jeremy Booth, Vincent Caillet, Adam Briggs, Nicholas G. Hardcastle, Georgios Angelis, Dasantha Jayamanne, Meegan Shepherd, Alexander Podreka, Kathryn Szymura, Doan Nguyen, Per Poulsen, Ricky O'Brien, Benjamin Harris, Carol Haddad, Thomas Eade, Paul Keall
Faculty of Engineering and Information Sciences - Papers: Part B
Background and purpose: The purpose of this work is to present the clinical experience from the first-in-human trial of real-time tumor targeting via MLC tracking for stereotactic ablative body radiotherapy (SABR) of lung lesions. Methods and materials: Seventeen patients with stage 1 non-small cell lung cancer (NSCLC) or lung metastases were included in a study of electromagnetic transponder–guided MLC tracking for SABR (NCT02514512). Patients had electromagnetic transponders inserted near the tumor. An MLC tracking SABR plan was generated with planning target volume (PTV) expanded 5 mm from the end-exhale gross tumor volume (GTV). A clinically approved comparator plan was ...
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system ...
Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison
Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison
Articles
The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Journal of International Technology and Information Management
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with ...
Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner
Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner
Human–Wildlife Interactions
Common pest birds in the United States include the non-native European starling (Sturnus vulgaris), house sparrow (Passer domesticus), and the pigeon (Columba livia domestica), as well as native birds including Canada geese (Branta canadensis) and gull species (Laridae). Large concentrations of pest birds can create human health hazards and monetary losses due to consumption of crops, depredation, and fecal contamination and accumulation. Fecal contamination hazards include the potential spread of zoonotic diseases including antimicrobial-resistant zoonoses and human injury due to the accumulation of fecal material on walking surfaces. Additionally, fecal accumulation causes structural and aesthetic damage due to the accelerated ...
Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus
Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus
Journal of Media Literacy Education
Reviewing the history of media literacy education might help us to identify how creating media as an approach can contribute to fostering knowledge, understanding technical issues, and to establishing a critical attitude towards technology and data. In a society where digital devices and services are omnipresent and decisions are increasingly based on data, critical analysis must penetrate beyond the “outer shell” of machines – their interfaces – through the technology itself, and the data, and algorithms, which make these devices and services function. Because technology and data constitute the basis of all communication and collaboration, media literate individuals must in the ...
Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes
Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes
The Journal of Sociotechnical Critique
As Artificial Intelligence (AI) systems shift to interact with new domains and populations, so does AI ethics: a relatively nascent subdiscipline that frequently concerns itself with questions of “fairness” and “accountability.” This fairness-centred approach has been criticized for (amongst other things) lacking the ability to address discursive, rather than distributional, injustices. In this paper I simultaneously validate these concerns, and work to correct the relative silence of both conventional and critical AI ethicists around disability, by exploring the narratives deployed by AI researchers in discussing and designing systems around autism. Demonstrating that these narratives frequently perpetuate a dangerously dehumanizing model ...
“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder
“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder
The Journal of Sociotechnical Critique
When it comes to social robotics (robots that engage human social responses via “eyes” and other facial features, voice-based natural-language interactions, and even evocative movements), ethicists, particularly in European and North American traditions, are divided over whether and why they might be morally considerable. Some argue that moral considerability is based on internal psychological states like consciousness and sentience, and debate about thresholds of such features sufficient for ethical consideration, a move sometimes criticized for being overly dualistic in its framing of mind versus body. Others, meanwhile, focus on the effects of these robots on human beings, arguing that psychological ...
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
The Journal of Sociotechnical Critique
Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.
Antitrust And Platform Monopoly, Herbert J. Hovenkamp
Antitrust And Platform Monopoly, Herbert J. Hovenkamp
Faculty Scholarship at Penn Law
Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.
Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive ...
Lab Notes
Scientia
Paleo Showcase; Expert Opinions; School of Nursing Director Appointed; EPISTEM Porject; CSH Honors Award Recipients; Diversity Fellowship
Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal
Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
This study examines the concept of E-volunteerism via the modes of information network, as it is a new term in the field of voluntary work and its diverse domains. The study discusses this new practice in terms of meanings and relevance to the scientific progress as well as the current global and technological revolution, particularly the great development in information network (Internet). To achieve this, the study adopted the inductive method and the content analysis of the various related texts. This study also sheds light on the ways people approach E- volunteerism, and devises methods for indi-viduals/groups/institutions to ...
Diversity Of Idea Flows And Economic Growth, Alex Pentland
Diversity Of Idea Flows And Economic Growth, Alex Pentland
Journal of Social Computing
What role does access to diverse ideas play in economic growth? New forms of geo-located communications and economic data allow measurement of human interaction patterns and prediction of economic outcomes for individuals, communities, and nations at a fine granularity, with the strongest predictors of income, productivity, and growth being measures of diversity and frequency of physical interaction between communities (clusters of interaction). This finding provides both new investment opportunities and new methods of risk assessment. Access and use of these data raise privacy and security risks, and the final section of the paper describes how these challenges can be controlled.
Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West
Darks And Stripes: Effects Of Clothing On Weight Perception, Kirill Martynov, Kiran Garimella, Robert West
Journal of Social Computing
In many societies, appearing slim (corresponding to a small body-mass index) is considered attractive. The fashion industry has been attempting to cater to this trend by designing outfits that can enhance the appearance of slimness. Two anecdotal rules, widespread in the world of fashion, are to choose dark clothes and avoid horizontal stripes, in order to appear slim. Thus far, empirical evidence has been unable to conclusively determine the validity of these rules, and there is consequently much controversy regarding the impact of both color and patterns on the visual perception of weight. In this paper, we aim to close ...
Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu
Predicting Tie Strength Of Chinese Guanxi By Using Big Data Of Social Networks, Xin Gao, Jar-Der Luo, Kunhao Yang, Xiaoming Fu, Loring Liu, Weiwei Gu
Journal of Social Computing
This paper poses a question: How many types of social relations can be categorized in the Chinese context? In social networks, the calculation of tie strength can better represent the degree of intimacy of the relationship between nodes, rather than just indicating whether the link exists or not. Previou research suggests that Granovetter measures tie strength so as to distinguish strong ties from weak ties, and the Dunbar circle theory may offer a plausible approach to calculating 5 types of relations according to interaction frequency via unsupervised learning (e.g., clustering interactive data between users in Facebook and Twitter). In ...
A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang
A Pattern Recognition Framework For Detecting Changes In Chinese Internet Management System, Yu-Sung Su, Yanqin Ruan, Siyu Sun, Yu-Tzung Chang
Journal of Social Computing
Past studies on the Chinese internet management system have revealed a smart internet management system that takes advantage of time to filter content with collective action potential. How and why such a system was institutionalized? We offer a historical institutional analysis to explain the way in which the system evolved. We implement social network analysis to examine the Weibo posts of recurrent events, the elections in Area A in 2016 and 2018, to identify pattern changes in the system. There are two aspects of the changes: the centralization of the command line to a single authority and the implementation of ...
Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran
Measuring Cities With Software-Defined Sensors, Charlie Catlett, Pete Beckman, Nicola Ferrier, Howard Nusbaum, Michael E. Papka, Marc G. Berman, Rajesh Sankaran
Journal of Social Computing
The Chicago Array of Things (AoT) project, funded by the US National Science Foundation, created an experimental, urban-scale measurement capability to support diverse scientific studies. Initially conceived as a traditional sensor network, collaborations with many science communities guided the project to design a system that is remotely programmable to implement Artificial Intelligence (AI) within the devices—at the "edge" of the network—as a means for measuring urban factors that heretofore had only been possible with human observers, such as human behavior including social interaction. The concept of "software-defined sensors" emerged from these design discussions, opening new possibilities, such as ...
Social Computing Unhinged, James Evans
Social Computing Unhinged, James Evans
Journal of Social Computing
Social computing is ubiquitous and intensifying in the 21st Century. Originally used to reference computational augmentation of social interaction through collaborative filtering, social media, wikis, and crowdsourcing, here I propose to expand the concept to cover the complete dynamic interface between social interaction and computation, including computationally enhanced sociality and social science, socially enhanced computing and computer science, and their increasingly complex combination for mutual enhancement. This recommends that we reimagine Computational Social Science as Social Computing, not merely using computational tools to make sense of the contemporary explosion of social data, but also recognizing societies as emergent computers of ...
Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson
Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson
Texas A&M Law Review
Employing facial recognition technology implicates anti-discrimination law under Title VII of the Civil Rights Act when used as a factor in employment decisions. The very technological breakthroughs that made facial recognition technology commercially viable—data compression and artificial intelligence— also contribute to making facial recognition technology discriminatory in its effect on members of classes protected by Title VII. This Article first explains how facial recognition technology works and its application in employee background checks. Then, it analyzes whether the use of facial recognition technology in background checks violates Title VII under the disparate impact theory of liability due to the ...
Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson
Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson
Kansas Library Association College and University Libraries Section Proceedings
Abstract
Self service technology (SST) is inundating the library world with more efficient forms of service for the library user experience. There are different types of SST and each type creates challenges and opportunities in the academic library. This multi-varied approach provides quality support to users who are unfamiliar with the technology, and offers time expediency to those who are adept at using SST. This persuasive paper will show what Kansas academic libraries currently have in the form of SST and encourage libraries to adopt new methods of service. The goal is to get you excited about SST and relieve ...
Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein
Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein
Northwest Journal of Teacher Education
This is a meditation on the role of absence during the COVID-19, especially the ways absences are felt and experienced. It explores the roles of bodies as both symbols and material. Bodies are both thought through the logic of borders and difference but also as the raw resources of scientific investigations. This is all examined within and against “education” both in my and in my students’ (pre and in-service teachers) classes and our anxieties of not knowing the what or how we of our jobs in these conditions.
A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha
A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha
Library Philosophy and Practice (e-journal)
The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and ...
Iowa Climate Statement 2020: Will Covid-19 Lessons Help Us Survive Climate Change?, David Courard-Hauri, Gene Takle, Ulrike Passe, Mahdi Al-Kaisi, Karin Allenspach, Craig A. Anderson, Rajeev Arora, William D. Beavis, Diane F. Birt, Cinzia Cervato, Silvia Cianzio, James L. Cornette, Richard M. Cruse, Radford Davis, Kathleen Delate, Iddo Friedberg, Charles E. Glatz, Bill Gutowski, Steven J. Hall, Thomas C. Harrington, Emily Heaton, Theodore J. Heindel, Brian Hornbuckle, Ming-Chen Hsu, Albert E. Jergens, Frederick Kirschenmann, Erwin Klaas, Owen Kolstad, Dennis Lavrov, Matt Liebman, Laura C. Merrick, James Michael, Chris Minion, Kenneth J. Moore, Ajay Nair, Marit Nilsen-Hamilton, James L. Pease, Reuben J. Peters, Paola G. Pittoni, James W. Raich, Mark Rasmussen, Jane Rongerude, Kurt A. Rosentrater, Ann E. Russell, James A. Roth, Patrick S. Schnable, Mack Shelley, William W. Simpkins, Robert C. Summerfelt, David A. Swenson, Elwynn Taylor, Grant L. Thompson, Alan D. Wanamaker, Andrea Susan Wheeler, Brian J. Wilsey, Sam Wormley, Et Al.
Iowa Climate Statement 2020: Will Covid-19 Lessons Help Us Survive Climate Change?, David Courard-Hauri, Gene Takle, Ulrike Passe, Mahdi Al-Kaisi, Karin Allenspach, Craig A. Anderson, Rajeev Arora, William D. Beavis, Diane F. Birt, Cinzia Cervato, Silvia Cianzio, James L. Cornette, Richard M. Cruse, Radford Davis, Kathleen Delate, Iddo Friedberg, Charles E. Glatz, Bill Gutowski, Steven J. Hall, Thomas C. Harrington, Emily Heaton, Theodore J. Heindel, Brian Hornbuckle, Ming-Chen Hsu, Albert E. Jergens, Frederick Kirschenmann, Erwin Klaas, Owen Kolstad, Dennis Lavrov, Matt Liebman, Laura C. Merrick, James Michael, Chris Minion, Kenneth J. Moore, Ajay Nair, Marit Nilsen-Hamilton, James L. Pease, Reuben J. Peters, Paola G. Pittoni, James W. Raich, Mark Rasmussen, Jane Rongerude, Kurt A. Rosentrater, Ann E. Russell, James A. Roth, Patrick S. Schnable, Mack Shelley, William W. Simpkins, Robert C. Summerfelt, David A. Swenson, Elwynn Taylor, Grant L. Thompson, Alan D. Wanamaker, Andrea Susan Wheeler, Brian J. Wilsey, Sam Wormley, Et Al.
Agronomy Reports
The current SARS-CoV2 pandemic is a social, humanitarian, and economic crisis that was predicted by experts but made worse by a failure to act proactively on those warnings. As scientists teaching and studying climate and its impacts, we believe there are three important lessons from the current pandemic that apply to our understanding of climate mitigation and adaptation in Iowa.
Using Fitbit Competitions To Increase Physical Activity In College Students, Omar Ramirez, Vipa Bernhardt
Using Fitbit Competitions To Increase Physical Activity In College Students, Omar Ramirez, Vipa Bernhardt
The Macksey Journal
Background: According to the World Health Organization (2018), physical inactivity is a leading risk factors for global mortality. Only one in four college students meet the current federal Physical Activity Guidelines for Americans of engaging in ≥150 minutes per week of exercise (Raynor and Jankowiak, 2010). The advancement of technology, especially in the acquisition of physical activity data, combined with the desire for virtual social interaction, has not been studied in college students. It is unknown if physical activity trackers and accompanying mobile apps, such as Fitbit, could motivate college students to be more physically active. It was hypothesized that ...
Data And Information As Our New Transport Infrastructure: An Exploration Into How The Modern Transport System Is Being Shaped By Information Communication Technology, Adam Davidson
Dissertations, Theses, and Capstone Projects
This dissertation is focuses on the role that data and information has in creating and altering behavior related to transportation. To do so, it lays out a theoretical model of technological transition and then follows it up with three case studies. The theoretical model provides a structure to consider how different actors in our transportation ecosystem – users, firms, policy actors – mix with technological evolution to uphold or incrementally recreate our transportation landscape. The case studies stand on their own to highlight important findings about how data and information are impacting transportation scenarios, but collectively reinforce the theoretical models.
The theory ...
Effect Of Social Media Addiction On Reading Culture: A Study Of Nigerian Students, Isaac E. Anyira, Obiora Kingsley Udem
Effect Of Social Media Addiction On Reading Culture: A Study Of Nigerian Students, Isaac E. Anyira, Obiora Kingsley Udem
Library Philosophy and Practice (e-journal)
The main purpose of this study is to examine the effects of social media addiction on reading culture of Nigerian students in higher institutions of learning. An online survey was sent to 1500 students of higher institutions in Nigeria during the Lockdown necessitated by the outbreak of the dreaded Corona Virus (Covid-19) Pandemic. A total of 1300 questionnaires were completed and returned. This implies 86.7% return rate. Data was analyzed using graphical charts. The findings of the study showed that social media mostly used by student include Facebook, followed by WhatsApp, YouTube, Pinterest, Twitter, Instagram, Wordpress, Snapchat, Reddit, respectively ...