Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Theses/Dissertations

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 32

Full-Text Articles in Communication Technology and New Media

What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman Feb 2024

What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman

Dissertations, Theses, and Capstone Projects

The word “billion” is a mathematical abstraction related to “big,” but it is difficult to understand the vast difference in value between one million and one billion; even harder to understand the vast difference in purchasing power between one billion dollars, and the average U.S. yearly income. Perhaps most difficult to conceive of is what that purchasing power and huge mass of capital translates to in terms of power. This project blends design, text, facts, and figures into an interactive narrative website that helps the user better understand their position in relation to extreme wealth: https://whatdoesonebilliondollarslooklike.website/

The site incorporates …


Triple Helix: Ai-Artist-Audience Collaboration In A Performative Art Experience, Xuedan Zou Dec 2023

Triple Helix: Ai-Artist-Audience Collaboration In A Performative Art Experience, Xuedan Zou

Dartmouth College Master’s Theses

Imagine an art exhibition that morphs its content according to the audience’s experience like a chameleon, reflecting the audience’s mind and culture and turning the artist’s exhibition into the viewer’s. But when the viewers leave, the work fades back to the creator’s original work and waits for the next audience. In this project, my team introduced an interactive exhibition called "Triple Helix," where audience members were provided the opportunity to alter the artworks created by the artist, thus imbuing them with their own perspectives. This interactive exhibition was held at three physical-locations and online, and a comprehensive user study was …


Individual Differences In Vulnerability To Phishing, Fake News, And Vishing, Jeff Black May 2023

Individual Differences In Vulnerability To Phishing, Fake News, And Vishing, Jeff Black

All Theses

Digital deception, such as phishing emails, scam phone calls, and fake news, poses a threat to anyone using digital devices. Research on digital deception often points to individual differences like age, cognitive impulsivity, and digital literacy, but has only investigated different types of digital deception independent of each other. Therefore, it is unclear whether users vulnerable to one type of deception are also vulnerable to others, and why. The present research examined relationships between vulnerability to different types of deception, and how this vulnerability is associated with common individual differences like age, cognitive impulsivity, digital literacy, and gullibility, and exploratory …


Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne May 2022

Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne

Honors Projects

Book recommendation applications combine word-of-mouth recommendations with algorithms that can suggest books based on a user’s account activity, creating a robust system for finding new books to read. Current research on recommendation systems is purely quantitative, focusing on the efficacy of the system, and content analyses are only just beginning to be performed on mobile applications. I use previous content analyses on applications as a basis for creating a content analysis framework for book recommendation applications. This framework can be used to analyze what users find important in book recommendation apps and inform app creators about their users’ wants and …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


What Interactive Web Features Are Most Used, Travis Tyler Dec 2021

What Interactive Web Features Are Most Used, Travis Tyler

Experiential Learning Projects

The use of interactive features in websites has become common place on the internet. People use these tools to help navigate and understand the content related to that website. However, due the large variety of websites it can be tricky to understand what features are best to utilize based on the topic of your site. This paper seeks to address this issue by researching how users interact and utilized different features on different websites. Research is gathered via scholarly articles and direct data gathered from volunteers. This data shows users tend to favor more interactive tools to help with navigation, …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle Jan 2021

Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle

CCE Theses and Dissertations

Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.

There is limited research on …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …


The Stained Glass Of Knowledge: On Understanding Novice Mental Models Of Computing, Briana Christina Bettin Jan 2020

The Stained Glass Of Knowledge: On Understanding Novice Mental Models Of Computing, Briana Christina Bettin

Dissertations, Master's Theses and Master's Reports

Learning to program can be a novel experience. The rigidity of programming can be at odds with beginning programmer's existing perceptions, and the concepts can feel entirely unfamiliar. These observations motivated this research, which explores two major questions: What factors influence how novices learn programming? and How can analogy by more appropriately leveraged in programming education?

This dissertation investigates the factors influencing novice programming through multiple methods. The CS1 classroom is observed as a "whole system", with consideration to the factors present in it that can influence the learning process. Learning's cognitive processes are elaborated to ground exploration into specifically …


Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan Jan 2020

Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan

All Graduate Theses, Dissertations, and Other Capstone Projects

From the book "Speaking into the Air: A History of the Idea of Communication," written by John Durham Peters, we understand a notion about developing one’s destiny; people have the freedom to choose multiple paths to follow (Peters, 2012). If we reject this idea, it is also easy for people to come up with distinct explanations. Even though the meaning of the same issues might vary subject to who is interpreting them, the primary concepts can be interpreted as more or less the same. If we study these two--"artificial intelligence" and "communication"- simultaneously, we can assume some characteristics. Thus, this …


Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell Jan 2020

Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell

CCE Theses and Dissertations

Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse May 2019

Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse

Theses and Dissertations

Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media …


Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard Jan 2019

Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard

CCE Theses and Dissertations

Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.

Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major Apr 2018

Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major

Theses

Making use of three historic philosophical thought experiments, this paper blends psychological perspectives with philosophical reasoning to show how social media is corrupting our perception of reality, the result of which is ultimately detrimental to society as a whole. This is accomplished by first using Plato’s “Allegory of the Cave” to analyze and discuss the ways in which social media is limiting humanity’s access to real knowledge. Next, Michel Foucault’s analysis of punishment in its social context, Discipline and Punish, is used to discuss the ways in which social media is adversely affecting our behavior. Finally, Robert Nozick’s “Experience …


Smartphone-Based Self Rescue System For Disaster Rescue, Xitong Zhou Jan 2018

Smartphone-Based Self Rescue System For Disaster Rescue, Xitong Zhou

Theses, Dissertations and Capstones

Recent ubiquitous earthquakes have been leading to mass destruction of electrical power and cellular infrastructures, and deprive the innocent lives across the world. Due to the wide-area earthquake disaster, unavailable power and communication infrastructure, limited man-power and resources, traditional rescue operations and equipment are inefficient and time-consuming, leading to the golden hours missed. With the increasing proliferation of powerful wireless devices, like smartphones, they can be assumed to be abundantly available among the disaster victims and can act as valuable resources to coordinate disaster rescue operations. In this paper, we propose a smartphone-based self-rescue system, also referred to as RescueMe, …


Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred Jan 2018

Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred

Williams Honors College, Honors Research Projects

Mikyla Wilfred

Major: Computer Science

Project Sponsor: Dr. Collard

Number of Project Credits: 3

Smart-Teleprompter

The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab Jul 2016

Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab

Computer Science Theses & Dissertations

We introduce a solution that uses the availability of heavy crowds and their smart devices, to gain more result as to where potential parking is possible. By leveraging the raw magnetometer, gyroscope, and accelerometer data, we are able to detect parking spots through the natural movement exerted by the walking pedestrians on the sidewalks beside the streets. Dating back as far as 2013, a very large portion of pedestrians composing the crowds on the sidewalk, possessed at least one smart device in their hand or pocket14]. It is this statistic that fuels our application, in which we depend on crowds …


A Graph Based Departmental Spoken Dialogue System, Julia Isaac Jun 2016

A Graph Based Departmental Spoken Dialogue System, Julia Isaac

Honors Theses

Spoken dialogue systems are automatic, computer based systems that are a great way for people to receive important information. In this project, I created a spoken dialogue system that people can use to learn about the Computer Science Department at Union College. The system was built by populating an open source dialogue system using a graph based dialogue manager. I improved upon a previous working dialogue system by making the conversations sound more natural, improving the flexibility of the system and making the system more robust. To help with this process a corpus was created using about 200 different dialogues …


Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra Jan 2016

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra

CCE Theses and Dissertations

The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.

The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …


A Look Into The Industry Of Video Games Past, Present, And Yet To Come, Chad Hadzinsky Jan 2014

A Look Into The Industry Of Video Games Past, Present, And Yet To Come, Chad Hadzinsky

CMC Senior Theses

Since its inception, the video game industry has been both a new medium for art and innovation as well as a major driving force in the advancements of many technologies. The often overlooked video game industry has turned from a hobby to a multi-billion dollar industry in its short, forty year life. People of all ages and genders across the world are playing video games at a higher clip than ever before. With so many new gamers and emerging technologies, it is an exciting time for the industry. The landscape is constantly changing and successful business models of the past …


Global Technical Communication And Content Management: A Study Of Multilingual Quality, Tatiana Batova May 2013

Global Technical Communication And Content Management: A Study Of Multilingual Quality, Tatiana Batova

Theses and Dissertations

The field of technical communication (TC) is facing a dilemma. Content management (CM) strategies and technologies that completely reshape writing and translation practices are adopted in an increasing number of TC work groups. One driving factor in CM adoption is the promise of improving quality of multilingual technical texts, all the while reducing time/cost of technical translation and localization. Yet, CM relies on automation and privileges consistency¯an approach that is problematic in global TC with its focus on adapting texts based on the characteristics of end-users.

To better understand the interdisciplinary dilemma of multilingual quality in CM, during my dissertation …


Social Media In Higher Education: Building Mutually Beneficial Student And Institutional Relationships Through Social Media., Megan L. Fuller May 2011

Social Media In Higher Education: Building Mutually Beneficial Student And Institutional Relationships Through Social Media., Megan L. Fuller

Electronic Theses and Dissertations

Social applications such as Facebook, YouTube, and Twitter have driven the public growth of Web 2.0. Universities and colleges are using social media to reach student prospects, keep contact with current students and alumni, and provide a mechanism for group collaboration and interaction in the classroom. Higher education institutions are influenced by current social media trends, and figuring out how to effectively interact with various constituencies within the social media environment can be challenging.

In this study, a group of higher education students were surveyed about their social media practices and preferences with a focus on education-related activities. The goal …


Investigating Student Gender And Grade Level Differences In Digital Citizenship Behavior, Robert Lyons Jan 2011

Investigating Student Gender And Grade Level Differences In Digital Citizenship Behavior, Robert Lyons

Walden Dissertations and Doctoral Studies

The rapid rise of technology, which has become embedded in all facets of 21st century society during the past decade, has fostered a corresponding rise in its misuse. Digital citizenship abuse, a relatively new phenomenon of this electronic age, is a rapidly growing global problem. Parents, schools, and society play roles in supporting appropriate online behavior. Schools must take the lead role to assess and address digital citizenship issues. This ex post facto study investigated the online actions of students in a medium-sized K-12 school district and explored possible causal relationships between online misbehavior and student grade and gender based …


Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells Jul 2008

Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells

Theses and Dissertations

For the last ten years, DVD-R media have played an important role in the storage of large amounts of digital data throughout the world. During this time it was assumed that the DVD-R was as long-lasting and stable as its predecessor, the CD-R. Several reports have surfaced over the last few years questioning the DVD-R's ability to maintain many of its claims regarding archival quality life spans. These reports have shown a wide range of longevity between the different brands. While some DVD-Rs may last a while, others may result in an early and unexpected failure. Compounding this problem is …


Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi Aug 2007

Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi

Computer Science Theses & Dissertations

Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.

Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …