Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Nova Southeastern University (8)
- Old Dominion University (4)
- University of Wisconsin Milwaukee (2)
- Brigham Young University (1)
- California State University, San Bernardino (1)
-
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- Clemson University (1)
- Dartmouth College (1)
- East Tennessee State University (1)
- Harrisburg University of Science and Technology (1)
- Marshall University (1)
- Michigan Technological University (1)
- Minnesota State University, Mankato (1)
- Seattle Pacific University (1)
- St. Cloud State University (1)
- The University of Akron (1)
- Union College (1)
- University of Missouri, St. Louis (1)
- Virginia Commonwealth University (1)
- Walden University (1)
- Keyword
-
- Communication (2)
- Internet (2)
- Phishing (2)
- 3D VR anatomy (1)
- 3D printing (1)
-
- <p>Emergency management -- Planning.</p> <p>Information technology.</p> <p>Disaster relief.</p> (1)
- AI (1)
- AIMC (1)
- Accident (1)
- Account creation (1)
- Accumulation (1)
- Analogy (1)
- Analyze (1)
- And sexuality studies;communication technology and new media (1)
- Archival (1)
- Arrhenius (1)
- Art (1)
- Artificial cost new rules ghost rules (1)
- Artificial intelligence (1)
- Artificial intelligence-mediated communication (1)
- Artificial satellites (1)
- Bentham (1)
- Blockchain (1)
- Book Recommendation (1)
- Broadband communication systems (1)
- CD (1)
- CMC (1)
- CS1 (1)
- Cell phone systems (1)
- Cognition (1)
- Publication Year
- Publication
-
- CCE Theses and Dissertations (8)
- Theses and Dissertations (4)
- Computer Science Theses & Dissertations (3)
- All Graduate Theses, Dissertations, and Other Capstone Projects (1)
- All Theses (1)
-
- CMC Senior Theses (1)
- Culminating Projects in English (1)
- Dartmouth College Master’s Theses (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Dissertations, Theses, and Capstone Projects (1)
- Electronic Theses and Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Experiential Learning Projects (1)
- Graduate Program in International Studies Theses & Dissertations (1)
- Honors Projects (1)
- Honors Theses (1)
- Theses (1)
- Theses, Dissertations and Capstones (1)
- Walden Dissertations and Doctoral Studies (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 30 of 32
Full-Text Articles in Communication Technology and New Media
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
What Does One Billion Dollars Look Like?: Visualizing Extreme Wealth, William Mahoney Luckman
Dissertations, Theses, and Capstone Projects
The word “billion” is a mathematical abstraction related to “big,” but it is difficult to understand the vast difference in value between one million and one billion; even harder to understand the vast difference in purchasing power between one billion dollars, and the average U.S. yearly income. Perhaps most difficult to conceive of is what that purchasing power and huge mass of capital translates to in terms of power. This project blends design, text, facts, and figures into an interactive narrative website that helps the user better understand their position in relation to extreme wealth: https://whatdoesonebilliondollarslooklike.website/
The site incorporates …
Triple Helix: Ai-Artist-Audience Collaboration In A Performative Art Experience, Xuedan Zou
Triple Helix: Ai-Artist-Audience Collaboration In A Performative Art Experience, Xuedan Zou
Dartmouth College Master’s Theses
Imagine an art exhibition that morphs its content according to the audience’s experience like a chameleon, reflecting the audience’s mind and culture and turning the artist’s exhibition into the viewer’s. But when the viewers leave, the work fades back to the creator’s original work and waits for the next audience. In this project, my team introduced an interactive exhibition called "Triple Helix," where audience members were provided the opportunity to alter the artworks created by the artist, thus imbuing them with their own perspectives. This interactive exhibition was held at three physical-locations and online, and a comprehensive user study was …
Individual Differences In Vulnerability To Phishing, Fake News, And Vishing, Jeff Black
Individual Differences In Vulnerability To Phishing, Fake News, And Vishing, Jeff Black
All Theses
Digital deception, such as phishing emails, scam phone calls, and fake news, poses a threat to anyone using digital devices. Research on digital deception often points to individual differences like age, cognitive impulsivity, and digital literacy, but has only investigated different types of digital deception independent of each other. Therefore, it is unclear whether users vulnerable to one type of deception are also vulnerable to others, and why. The present research examined relationships between vulnerability to different types of deception, and how this vulnerability is associated with common individual differences like age, cognitive impulsivity, digital literacy, and gullibility, and exploratory …
Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne
Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne
Honors Projects
Book recommendation applications combine word-of-mouth recommendations with algorithms that can suggest books based on a user’s account activity, creating a robust system for finding new books to read. Current research on recommendation systems is purely quantitative, focusing on the efficacy of the system, and content analyses are only just beginning to be performed on mobile applications. I use previous content analyses on applications as a basis for creating a content analysis framework for book recommendation applications. This framework can be used to analyze what users find important in book recommendation apps and inform app creators about their users’ wants and …
Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy
Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy
CCE Theses and Dissertations
The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …
What Interactive Web Features Are Most Used, Travis Tyler
What Interactive Web Features Are Most Used, Travis Tyler
Experiential Learning Projects
The use of interactive features in websites has become common place on the internet. People use these tools to help navigate and understand the content related to that website. However, due the large variety of websites it can be tricky to understand what features are best to utilize based on the topic of your site. This paper seeks to address this issue by researching how users interact and utilized different features on different websites. Research is gathered via scholarly articles and direct data gathered from volunteers. This data shows users tend to favor more interactive tools to help with navigation, …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
CCE Theses and Dissertations
Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.
There is limited research on …
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung
CCE Theses and Dissertations
Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …
The Stained Glass Of Knowledge: On Understanding Novice Mental Models Of Computing, Briana Christina Bettin
The Stained Glass Of Knowledge: On Understanding Novice Mental Models Of Computing, Briana Christina Bettin
Dissertations, Master's Theses and Master's Reports
Learning to program can be a novel experience. The rigidity of programming can be at odds with beginning programmer's existing perceptions, and the concepts can feel entirely unfamiliar. These observations motivated this research, which explores two major questions: What factors influence how novices learn programming? and How can analogy by more appropriately leveraged in programming education?
This dissertation investigates the factors influencing novice programming through multiple methods. The CS1 classroom is observed as a "whole system", with consideration to the factors present in it that can influence the learning process. Learning's cognitive processes are elaborated to ground exploration into specifically …
Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan
Exploring Artificial Intelligence-Mediated Communication (Aimc) As A Sub-Field Of Communication Studies. A Textual Examination, Md Nurul Karim Bhuiyan
All Graduate Theses, Dissertations, and Other Capstone Projects
From the book "Speaking into the Air: A History of the Idea of Communication," written by John Durham Peters, we understand a notion about developing one’s destiny; people have the freedom to choose multiple paths to follow (Peters, 2012). If we reject this idea, it is also easy for people to come up with distinct explanations. Even though the meaning of the same issues might vary subject to who is interpreting them, the primary concepts can be interpreted as more or less the same. If we study these two--"artificial intelligence" and "communication"- simultaneously, we can assume some characteristics. Thus, this …
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
CCE Theses and Dissertations
Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …
Rhetsec_ | Rhetorical Security, Jennifer Mead
Rhetsec_ | Rhetorical Security, Jennifer Mead
Culminating Projects in English
Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …
Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse
Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse
Theses and Dissertations
Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media …
Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard
Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard
CCE Theses and Dissertations
Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.
Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
CCE Theses and Dissertations
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …
Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major
Social Media: On Tech-Caves, Virtual Panopticism, And The Science Fiction-Like State In Which We Unwittingly Find Ourselves, Michael Major
Theses
Making use of three historic philosophical thought experiments, this paper blends psychological perspectives with philosophical reasoning to show how social media is corrupting our perception of reality, the result of which is ultimately detrimental to society as a whole. This is accomplished by first using Plato’s “Allegory of the Cave” to analyze and discuss the ways in which social media is limiting humanity’s access to real knowledge. Next, Michel Foucault’s analysis of punishment in its social context, Discipline and Punish, is used to discuss the ways in which social media is adversely affecting our behavior. Finally, Robert Nozick’s “Experience …
Smartphone-Based Self Rescue System For Disaster Rescue, Xitong Zhou
Smartphone-Based Self Rescue System For Disaster Rescue, Xitong Zhou
Theses, Dissertations and Capstones
Recent ubiquitous earthquakes have been leading to mass destruction of electrical power and cellular infrastructures, and deprive the innocent lives across the world. Due to the wide-area earthquake disaster, unavailable power and communication infrastructure, limited man-power and resources, traditional rescue operations and equipment are inefficient and time-consuming, leading to the golden hours missed. With the increasing proliferation of powerful wireless devices, like smartphones, they can be assumed to be abundantly available among the disaster victims and can act as valuable resources to coordinate disaster rescue operations. In this paper, we propose a smartphone-based self-rescue system, also referred to as RescueMe, …
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long
CCE Theses and Dissertations
Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …
Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred
Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred
Williams Honors College, Honors Research Projects
Mikyla Wilfred
Major: Computer Science
Project Sponsor: Dr. Collard
Number of Project Credits: 3
Smart-Teleprompter
The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style …
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …
Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab
Magnopark, Smart Parking Detection Based On Cellphone Magnetic Sensor, Maryam Arab
Computer Science Theses & Dissertations
We introduce a solution that uses the availability of heavy crowds and their smart devices, to gain more result as to where potential parking is possible. By leveraging the raw magnetometer, gyroscope, and accelerometer data, we are able to detect parking spots through the natural movement exerted by the walking pedestrians on the sidewalks beside the streets. Dating back as far as 2013, a very large portion of pedestrians composing the crowds on the sidewalk, possessed at least one smart device in their hand or pocket14]. It is this statistic that fuels our application, in which we depend on crowds …
A Graph Based Departmental Spoken Dialogue System, Julia Isaac
A Graph Based Departmental Spoken Dialogue System, Julia Isaac
Honors Theses
Spoken dialogue systems are automatic, computer based systems that are a great way for people to receive important information. In this project, I created a spoken dialogue system that people can use to learn about the Computer Science Department at Union College. The system was built by populating an open source dialogue system using a graph based dialogue manager. I improved upon a previous working dialogue system by making the conversations sound more natural, improving the flexibility of the system and making the system more robust. To help with this process a corpus was created using about 200 different dialogues …
Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra
Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra
CCE Theses and Dissertations
The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.
The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …
A Look Into The Industry Of Video Games Past, Present, And Yet To Come, Chad Hadzinsky
A Look Into The Industry Of Video Games Past, Present, And Yet To Come, Chad Hadzinsky
CMC Senior Theses
Since its inception, the video game industry has been both a new medium for art and innovation as well as a major driving force in the advancements of many technologies. The often overlooked video game industry has turned from a hobby to a multi-billion dollar industry in its short, forty year life. People of all ages and genders across the world are playing video games at a higher clip than ever before. With so many new gamers and emerging technologies, it is an exciting time for the industry. The landscape is constantly changing and successful business models of the past …
Global Technical Communication And Content Management: A Study Of Multilingual Quality, Tatiana Batova
Global Technical Communication And Content Management: A Study Of Multilingual Quality, Tatiana Batova
Theses and Dissertations
The field of technical communication (TC) is facing a dilemma. Content management (CM) strategies and technologies that completely reshape writing and translation practices are adopted in an increasing number of TC work groups. One driving factor in CM adoption is the promise of improving quality of multilingual technical texts, all the while reducing time/cost of technical translation and localization. Yet, CM relies on automation and privileges consistency¯an approach that is problematic in global TC with its focus on adapting texts based on the characteristics of end-users.
To better understand the interdisciplinary dilemma of multilingual quality in CM, during my dissertation …
Social Media In Higher Education: Building Mutually Beneficial Student And Institutional Relationships Through Social Media., Megan L. Fuller
Social Media In Higher Education: Building Mutually Beneficial Student And Institutional Relationships Through Social Media., Megan L. Fuller
Electronic Theses and Dissertations
Social applications such as Facebook, YouTube, and Twitter have driven the public growth of Web 2.0. Universities and colleges are using social media to reach student prospects, keep contact with current students and alumni, and provide a mechanism for group collaboration and interaction in the classroom. Higher education institutions are influenced by current social media trends, and figuring out how to effectively interact with various constituencies within the social media environment can be challenging.
In this study, a group of higher education students were surveyed about their social media practices and preferences with a focus on education-related activities. The goal …
Investigating Student Gender And Grade Level Differences In Digital Citizenship Behavior, Robert Lyons
Investigating Student Gender And Grade Level Differences In Digital Citizenship Behavior, Robert Lyons
Walden Dissertations and Doctoral Studies
The rapid rise of technology, which has become embedded in all facets of 21st century society during the past decade, has fostered a corresponding rise in its misuse. Digital citizenship abuse, a relatively new phenomenon of this electronic age, is a rapidly growing global problem. Parents, schools, and society play roles in supporting appropriate online behavior. Schools must take the lead role to assess and address digital citizenship issues. This ex post facto study investigated the online actions of students in a medium-sized K-12 school district and explored possible causal relationships between online misbehavior and student grade and gender based …
Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells
Predicting The Longevity Of Dvdr Media By Periodic Analysis Of Parity, Jitter, And Ecc Performance Parameters, Daniel Patrick Wells
Theses and Dissertations
For the last ten years, DVD-R media have played an important role in the storage of large amounts of digital data throughout the world. During this time it was assumed that the DVD-R was as long-lasting and stable as its predecessor, the CD-R. Several reports have surfaced over the last few years questioning the DVD-R's ability to maintain many of its claims regarding archival quality life spans. These reports have shown a wide range of longevity between the different brands. While some DVD-Rs may last a while, others may result in an early and unexpected failure. Compounding this problem is …
Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi
Channel Management In Heterogeneous Cellular Networks, Mohammad Hadi Arbabi
Computer Science Theses & Dissertations
Motivated by the need to increase system capacity in the face of tight FCC regulations, modem cellular systems are under constant pressure to increase the sharing of the frequency spectrum among the users of the network.
Key to increasing system capacity is an efficient channel management strategy that provides higher capacity for the system while, at the same time, providing the users with Quality of Service guarantees. Not surprisingly, dynamic channel management has become a high profile topic in wireless communications. Consider a highly populated urban area, where mobile traffic loads are increased due to highway backups or sporting events. …