Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (6)
- Physical Sciences and Mathematics (6)
- Library and Information Science (5)
- Sociology (5)
- Databases and Information Systems (3)
-
- Criminology (2)
- Psychology (2)
- Quantitative, Qualitative, Comparative, and Historical Methodologies (2)
- Business (1)
- Business Administration, Management, and Operations (1)
- Cataloging and Metadata (1)
- Communication (1)
- Criminology and Criminal Justice (1)
- Forensic Science and Technology (1)
- Graphics and Human Computer Interfaces (1)
- Information Security (1)
- Legal Studies (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- OS and Networks (1)
- Other Computer Sciences (1)
- Personality and Social Contexts (1)
- Social Control, Law, Crime, and Deviance (1)
- Social Psychology (1)
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Social and Behavioral Sciences
Fall 2015 Notes From The Stacks, Central Washington University
Fall 2015 Notes From The Stacks, Central Washington University
Notes from the Stacks: CWU's Library Newsletter
No abstract provided.
Conference Report: The Inside Out Library: Collaboration, Inspiration, Transformation., Niamh Walker-Headon, Shona Thoma
Conference Report: The Inside Out Library: Collaboration, Inspiration, Transformation., Niamh Walker-Headon, Shona Thoma
Other Resources
Conference report co-written with Shona Thoma as part of the conditions of receipt of bursary to attend the Academic and Special Libraries Conference in 2015. Details the conference sessions attended by the authors.
Keeping Up With New Legal Titles, Patricia Alvayay
Keeping Up With New Legal Titles, Patricia Alvayay
Law Faculty Scholarly Articles
In this book review, Patty Alvayay discusses Rethinking Library Technical Services: Redefining Our Profession for the Future by Mary Beth Weber.
Gender Stereotypes Male Librarians Face Today, Heidi Blackburn
Gender Stereotypes Male Librarians Face Today, Heidi Blackburn
Criss Library Faculty Publications
According to the United States Bureau of Labor Statistics (USBLS) (2012), the library profession has seen a 48% (19,458) increase in males working in libraries since 1980 and the male influx is expected to increase (Minnesota, 2011) despite lingering professional stereotypes. Movies, books, and other popular media focus on the overall image of the librarian, as if only one type exists for both sexes (Duke, 1999; Garcia, 2011). These stereotypes may be misinterpreted on the faulty premise that men confront the same stereotypes in the library workplace as women. Social roles and norms are different for men and women and …
Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette
Investigating Categorization Preferences For Online Dating Sites, Scott Morrissette
CCE Theses and Dissertations
The purpose of the study was to determine whether a three-category (3C) system for classifying profiles on online dating sites provides advantages over a two-category (2C) system as decision makers evaluate a long list of profiles. Two groups of single heterosexual or bisexual women ages 20 to 30 reviewed a list of 60 male profiles on simulated online dating sites to choose which profiled man they would most like to learn more about. One group (n = 53) evaluated the profiles using a 2C system; the other group (n = 56) used a 3C system. After making their choice, women …
Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran
Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran
CCE Theses and Dissertations
The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …
Well-Being Technologies: Meditation Using Virtual Worlds, Laura Downey
Well-Being Technologies: Meditation Using Virtual Worlds, Laura Downey
CCE Theses and Dissertations
In a technologically overloaded world, is it possible to use technology to support well-being activities and enhance human flourishing? Proponents of positive technology and positive computing are striving to answer yes to that question. However, the impact of technology on well-being remains unresolved. Positive technology combines technology and positive psychology. Positive psychology focuses on well-being and the science of human flourishing. Positive computing includes an emphasis on designing with well-being in mind as a way to support human potential. User experience (UX) is critical to positive technology and positive computing. UX researchers and practitioners are advocating for experience-driven design and …
An Empirical Investigation Into The Role That Boredom, Relationships, Anxiety, And Gratification (Brag) Play In A Driver’S Decision To Text, Nathan White
CCE Theses and Dissertations
Texting while driving is a growing problem that has serious, and sometimes fatal, consequences. Despite laws enacted to curb this behavior, the problem continues to grow. Discovering factors that can reduce such risky behavior can significantly contribute to research, as well as save lives and reduce property damage. This study developed a model to explore the motivations that cause a driver to send messages. The model evaluates the effects that boredom, social relationships, social anxiety, and social gratification (BRAG) have upon a driver’s frequency of typing text messages. In addition, the perceived severity of the consequences and the presence of …
Scholarly Collaboration And Information & Communications Technologies (Icts) In Information Sciences : A Longitudinal Analysis Of The Research Collaboration Social Network, Xiao Liang
Legacy Theses & Dissertations (2009 - 2024)
This dissertation investigates the changing effect of geodesic, cultural (organization, profession, and country), and knowledge boundaries on scholarly collaboration. It also examines how the change can relate to the development of Information & Communication Technologies (ICTs).
Police Opinions Of Digital Evidence Response Handling In The State Of Georgia: An Examination From The Viewpoint Of Local Agencies’ Patrol Officers, Tanya Macneil
CCE Theses and Dissertations
This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views …
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
An Investigation Of The Factors Contributing To The Development Of Poorly Defined Is Strategies For Firms In The United States, Karen B. Lacaden
CCE Theses and Dissertations
Although empirical research has shown that a clearly defined information system (IS) strategy has a positive impact to a firm’s performance and a poorly defined IS strategy has a negative impact to a firms’ performance, firms still develop poorly defined IS strategies. Further compounding the problem, research has revealed that 87% of the business executives believe information systems are a critical enabler to their firms' strategic realization, yet only 33% of business executives involve the Chief Information Officer (CIO) in their firm’s business strategy development. The main goal of this research study is to empirically identify factors which impact development …