Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Social and Behavioral Sciences

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management ...


Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr. Nov 2019

Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr.

Library Philosophy and Practice (e-journal)

We are witness to see exponential growth of the social media network since the year 2002. Leading social media networking sites used by people are Twitter, Snapchats, Facebook, Google, and Instagram, etc. The latest global digital report (Chaffey and Ellis-Chadwick 2019) states that there exist more than 800 million current online social media users, and the number is still exploding day by day. Users share their day to day activities such as their photos and locations etc. on social media platforms. This information gets consumed by third party users, like marketing companies, researchers, and government firms. Depending upon the purpose ...


The Art Of Selecting Phd Students: Combination Of Bibliometric And Ahp Approach, Preeti Mulay Dr., Rahul Raghvendra Joshi Prof., Sophia Gaikwad Dr. Nov 2019

The Art Of Selecting Phd Students: Combination Of Bibliometric And Ahp Approach, Preeti Mulay Dr., Rahul Raghvendra Joshi Prof., Sophia Gaikwad Dr.

Library Philosophy and Practice (e-journal)

For the PhD guide or the advisor selecting the accurate PhD scholar is the most elephantine task. It actually requires an art for the perfect selection; as the length, breadth, depth and volume of PhD work is spread across the years and this relationship between the scholar and the guide should start and flourish positively for the immense experience throughout the PhD process. Hence it was essential to understand bibliometric details including how many researchers have already published their contributions in the form of papers and patents, in the Scopus database. In addition to the bibliometric details, in this study ...


Personality Prediction Through Curriculam Vitae Analysis Involving Password Encryption And Prediction Analysis, Gagandeep Kaur, Shruti Maheshwari Nov 2019

Personality Prediction Through Curriculam Vitae Analysis Involving Password Encryption And Prediction Analysis, Gagandeep Kaur, Shruti Maheshwari

Library Philosophy and Practice (e-journal)

A recruitment process requires an eligibility check, an aptitude evaluation and a psychometric analysis of prospective candidates. The work puts forward an application where the system allows employers to post new job offerings and registered candidates can apply. The application estimates applicant’s emotional aptitude through a psychometric analysis based on a test whereas the professional standard is verified via a technical aptitude test. OCEAN Model is used to assess emotional quotient and predict the personality traits. Machine learning techniques such as Logistic Regression are used for modelling the personality predictor. The details of the candidates are kept secure by ...


Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma Nov 2019

Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma

Library Philosophy and Practice (e-journal)

Scientometrics is a quantitative analysis of scholarly literature related to a particular subject or area (well defined by some limits, scope and coverage), which helps to understand different aspects about the scholarly literature’s growth in various dimensions of knowledge. Similarly, this study is a quantitative analysis of the Global research trends in cyber security. Some works related to scientometrics of ‘deception, counter-deception in cyberspace’ had been published in 2011, but we have focused on ‘cyber security’ as the topic of research. For analysis we have utilised the published data available in Scopus database, which is directly related to ‘cyber ...


Bibliometric Survey On Incremental Clustering Algorithms, Archana Chaudhari, Rahul Raghvendra Joshi, Preeti Mulay, Ketan Kotecha, Parag Kulkarni Sep 2019

Bibliometric Survey On Incremental Clustering Algorithms, Archana Chaudhari, Rahul Raghvendra Joshi, Preeti Mulay, Ketan Kotecha, Parag Kulkarni

Library Philosophy and Practice (e-journal)

For clustering accuracy, on influx of data, the parameter-free incremental clustering research is essential. The sole purpose of this bibliometric analysis is to understand the reach and utility of incremental clustering algorithms. This paper shows incremental clustering for time series dataset was first explored in 2000 and continued thereafter till date. This Bibliometric analysis is done using Scopus, Google Scholar, Research Gate, and the tools like Gephi, Table2Net, and GPS Visualizer etc. The survey revealed that maximum publications of incremental clustering algorithms are from conference and journals, affiliated to Computer Science, Chinese lead publications followed by India then United States ...


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based ...


Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali Jul 2019

Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali

Library Philosophy and Practice (e-journal)

Presently, information professionals are progressively dependent on information and communication technologies to complete their everyday tasks. As, result dependence on PC frameworks, programming and data innovation-related technologies are increasing for better working and providing quality services. Therefore, to understand, analyze and evaluate the acceptance and use of this technology several models of technology acceptance and use have been formulated in information science literature. Using eight such models, Venkatesh, Morris, Davis and Davis proposed a unified model called the Unified Theory of Acceptance and Use of Technology or (UTAUT) model. The UTAUT model has been studied and analyzed in various spheres ...


Returns On Library Investment: A Study Of The Leading Engineering And Technology Institutes In India, Shivendra Singh, Ramesh Pandita Mr. May 2019

Returns On Library Investment: A Study Of The Leading Engineering And Technology Institutes In India, Shivendra Singh, Ramesh Pandita Mr.

Library Philosophy and Practice (e-journal)

The study is based on the secondary data compiled by the Ministry of Human Resource & Development, Govt., of India for the period 2012-13, 2013-14 & 2014-15 and was released as the ranking list of Institutes of Engineering and Technology in India for the year 2016. The study aims to assess the Returns on Investment (ROI) of the twenty leading libraries of the Institutes of Engineering and Technology in India in the form of institutional research output. An attempted has also been made to rank the each individual library on the basis of seven different parameters chosen for the study and worked ...


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani Jan 2019

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is consist ...


Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali Jan 2019

Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali

Library Philosophy and Practice (e-journal)

The aim of this research is to scrutiny the accessibility and decay of web citations (URLs) used in refereed articles published by 27 Computer Science open access journals as indexed by Scopus. To do this, at first, we downloaded 1000 articles of Computer Science open access journals from 2009 to 2018. After acquiring articles, their web citations are extracted and analyzed from the accessibility and decay point of view. Moreover, for initially missed web citations complementary pathways such as using Google search engine are employed. Then, data collected are analyzed using descriptive statistical methods. Research findings indicated that 80.7 ...