Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (4)
- Pro Rege (2)
- RISK: Health, Safety & Environment (1990-2002) (2)
- Secrecy and Society (2)
- Trotter Review (2)
-
- Collaborative Librarianship (1)
- Consensus (1)
- Dickinson Law Review (2017-Present) (1)
- International Journal of School Social Work (1)
- Journal of Interdisciplinary Perspectives and Scholarship (1)
- Journal of International Agricultural and Extension Education (1)
- Journal of Science Education for Students with Disabilities (1)
- LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University (1)
- Liberty University Journal of Statesmanship & Public Policy (1)
- The Journal of Extension (1)
- The Qualitative Report (1)
- Themis: Research Journal of Justice Studies and Forensic Science (1)
Articles 1 - 24 of 24
Full-Text Articles in Social and Behavioral Sciences
Ensuring Responsible And Transparent Use Of Generative Ai In Extension, Paul A. Hill, Lendel K. Narine
Ensuring Responsible And Transparent Use Of Generative Ai In Extension, Paul A. Hill, Lendel K. Narine
The Journal of Extension
Generative artificial intelligence (AI) systems capable of generating human-like text, images, and ideas from existing data based on user-defined prompts, will inevitably impact Extension, including increasing efficiency, productivity, and performing tasks previously exclusive to humans. There are ethical and risk-related considerations surrounding the use of generative AI, including concerns about bias and unintended consequences. It is important for Extension to consider these implications and take steps to ensure that generative AI is used in a responsible and transparent manner. Extension must ensure that educators and staff have the necessary knowledge and skills to effectively utilize and integrate this technology.
Where Do Smallholder Farmers Get Their Information? An Exploration Of The Sources Of Agricultural Information In Northwest Cambodia., Presley Nickens, David Ader, Jean Pierre Enriquez, Ricky Bates, Tom Gill, Sovanneary Huot, Lyda Hok, Srean Pao
Where Do Smallholder Farmers Get Their Information? An Exploration Of The Sources Of Agricultural Information In Northwest Cambodia., Presley Nickens, David Ader, Jean Pierre Enriquez, Ricky Bates, Tom Gill, Sovanneary Huot, Lyda Hok, Srean Pao
Journal of International Agricultural and Extension Education
A significant emphasis on scaling up food security efforts is needed to achieve Sustainable Development Goal 2 (Zero Hunger) by 2030. Scaling up sustainable intensification efforts for Cambodian smallholder farmers is key since they face greater exposure to the uncertainties of climate change, globalizing markets, and rural-to-urban migration. One way to increase the effectiveness of efforts and the scaling up of sustainable intensification technologies is through improving access to information about production and marketing technologies. This study aimed to identify sources of information about sustainable technologies available to smallholders and barriers that may be preventing adoption. Information was gathered from …
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens
Secrecy and Society
State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …
Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe
Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe
Secrecy and Society
Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
Art And Internet Infrastructure, Liat Berdugo
Art And Internet Infrastructure, Liat Berdugo
Journal of Interdisciplinary Perspectives and Scholarship
In her essay Art and Internet Infrastructure, multimedia artist, curator, and professor Liat Berdugo contemplates and complicates our overreliance and relationship with networks and technology especially during shelter-in-place.
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Liberty University Journal of Statesmanship & Public Policy
Space is the future for humanity. Whether that is a future of amity and cooperation, or competition and conflict depends in large part to what America makes it. While America cannot afford to entirely abandon cooperation with the world in the final frontier, neither can it afford to cede the advantage in a new field of potential warfare to adversaries in China and Russia. What is needed is a moderate path of competition where necessary and cooperation where beneficial, in order to most fully advance the cause of American national security. By utilizing arms treaties to prevent Chinese domination, while …
Too Hard To Find With Too Little Time: What School Social Workers Want In Online Resources For Evidence-Based Practice, Michele Patak-Pietrafesa, Natasha K. Bowen, Ashley E. Stewart, Michael S. Kelly
Too Hard To Find With Too Little Time: What School Social Workers Want In Online Resources For Evidence-Based Practice, Michele Patak-Pietrafesa, Natasha K. Bowen, Ashley E. Stewart, Michael S. Kelly
International Journal of School Social Work
School mental health practitioners, including social workers, are mandated through federal, state, and professional entities to provide evidence-based practices to students. Nevertheless, rates of use of evidence-based practices among mental health professionals in schools remain low, even as knowledge about effective practices increases. This study aimed to further knowledge about how to promote and support the use of evidence-based practices among school practitioners using online technology. School social workers attending a summer professional development event took part in focus groups exploring (a) their current perceptions of evidence-based practices, (b) their experiences finding evidence-based practice information online, and (c) their preferences …
Social Media And Othering: Philosophy, Algorithms, And The Essence Of Being Human, Mark Ehlebracht
Social Media And Othering: Philosophy, Algorithms, And The Essence Of Being Human, Mark Ehlebracht
Consensus
No abstract provided.
An In-Depth Look Into Cybercrime, Brandon Mcdaniel
An In-Depth Look Into Cybercrime, Brandon Mcdaniel
Themis: Research Journal of Justice Studies and Forensic Science
Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people.
Reaction To Safety Equipment Technology In The Workplace And Implications: A Study Of The Firefighter’S Hood, Brian W. Ward
Reaction To Safety Equipment Technology In The Workplace And Implications: A Study Of The Firefighter’S Hood, Brian W. Ward
The Qualitative Report
In the 1990s the firefighter’s hood became a standard article of safety equipment worn by municipal firefighters, eliciting a negative reaction among many of these firefighters. I used data from interviews with 42 firefighters to explain why this reaction occurred. Data analysis revealed that negative reactions ultimately stemmed from the hood’s disruption of autonomy, repudiation of the complex mental and physical skill needed to perform tasks required of firefighters, and hindrance in negotiating the life-threatening environment created by a fire. These findings indicate that when introducing new safety equipment technology to emergency response workers, their reaction to this equipment, and …
Technology And The Biblical Story, Derek Schuurman
Technology And The Biblical Story, Derek Schuurman
Pro Rege
Editor's Note: This article is based on Derek Schuurman's chapel talk, given at Bethel University in St. Paul, Minnesota, on February 22, 2017. A video of the talk is available online at: https://vimeo.com/channels/bethelchapel/205900409
An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth
An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth
Journal of Science Education for Students with Disabilities
This study examined the potential relationship of accessible hands-on science learning experiences to the development of positive beliefs concerning one’s capacity to function in the sciences and motivation to consider science as a college major and career. Findings from Likert survey items given before and after engaging in accessible hands-on science laboratories show that students who were blind or had low vision (BLV) were more likely to agree with the following items after engaging in accessible science experiences: 1) I plan on enrolling as a science major in college; 2) My educational experiences, so far, have given me the …
Table Of Contents
Journal of International Technology and Information Management
Table of Contents for Volume 25 Number 4
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Mobile Learning: Designing A Socio-Technical Model To Empower Learning In Higher Education, Pimpaka Prasertsilp
Mobile Learning: Designing A Socio-Technical Model To Empower Learning In Higher Education, Pimpaka Prasertsilp
LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University
Mobile learning is a rapidly developing mode for teaching and learning to deliver content to learners. Additionally, mobile learning can aid both formal learning in traditional classrooms and informal settings outside classes. This paper explains how the mobility of learners can contribute to the process of acquiring knowledge, skills, and experiences, and further investigates how to design an effective model. This study also explores activities in which students can use mobile devices to facilitate their learning. Additionally, there are many factors that affect students’ learning outcomes. In this paper, researcher investigates how to design an effective socio-technical model by integrating …
Rfid, Gps, And 3g: Radio Wave Technologies And Privacy, Lori Bowen Ayre
Rfid, Gps, And 3g: Radio Wave Technologies And Privacy, Lori Bowen Ayre
Collaborative Librarianship
No abstract provided.
Democracy, Technology And The Civil Rights Project, Caesar L. Mcdowell, Marianne S. Castano
Democracy, Technology And The Civil Rights Project, Caesar L. Mcdowell, Marianne S. Castano
Trotter Review
Democracy has been defined as "a political system in which the whole people make, and are entitled to make, the basic determining decisions on important matters of public policy." While the United States is often touted as the world's leading proponent of democracy, many U.S. citizens find themselves unable to engage in one of the central acts of democracy—creating public voice through public engagement. Public engagement in the United States is constrained by our inability to talk through our shared, complementary and divergent values. This lack of public engagement and our inability to speak in a "public voice" is also …
Technological Revolution And The Black Studies Curriculum: A Course Proposal, Abdul Alkalimat
Technological Revolution And The Black Studies Curriculum: A Course Proposal, Abdul Alkalimat
Trotter Review
A technological revolution is changing the world. The computer is fast becoming the universal tool in all aspects of work, production and communication, and innovations in bio-technology are fast transforming agriculture and health. The main impact of this technological revolution has been to restructure the economy, both the centers of accumulation as well as the labor process. It is also restructuring the methods by which people communicate, form and maintain communities. In general, the objective basis of social life is being fundamentally changed.
This essay proposes a basic course that not only focuses on the technological revolution, but should be …
Technical Risk In The Mass Media: Introduction, Allan Mazur
Technical Risk In The Mass Media: Introduction, Allan Mazur
RISK: Health, Safety & Environment (1990-2002)
Special editor, Professor Mazur introduces and explains the origins of the symposium.
Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff
Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff
RISK: Health, Safety & Environment (1990-2002)
Challenging the "de minimis risk" concept, Dr. Fischhoff argues that risks ought not to be considered apart from a particular technology's benefits. He argues, too, that the acceptability of particular kinds of risks should not be determined without considering the views of all persons who may be exposed. Finally, building upon the "reasonable person" construct, he suggests ways those goals might be achieved.
Foundations Of Responsible Technology, Charles C. Adams
Foundations Of Responsible Technology, Charles C. Adams
Pro Rege
No abstract provided.