Open Access. Powered by Scholars. Published by Universities.®
Communication Technology and New Media Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Comprehensive cyber defense (1)
- Cyber defense (1)
- Cybersecurity (1)
- Disaster Response (1)
- Eliciting Expert Knowledge (1)
-
- Engineering Education (1)
- Frameworks (1)
- Human Computer Interaction (1)
- Human Robot Interaction (1)
- Infrastructure projects (1)
- Large organizations (1)
- Orienteering Problem (1)
- Role-Playing Game (1)
- Search and Rescue (1)
- Similarity (1)
- Social Presence (1)
- Social Robots (1)
- Stakeholder analysis (1)
- Stakeholder biases (1)
- Stakeholder managers (1)
Articles 1 - 4 of 4
Full-Text Articles in Communication Technology and New Media
Contributions Of Role-Playing Games: Advantages Of Incorporating Social Media In Disaster Response, Erin Mullin
Contributions Of Role-Playing Games: Advantages Of Incorporating Social Media In Disaster Response, Erin Mullin
Graduate Theses and Dissertations
After a disaster, emergency managers need to know who needs help, what type of help they need, and how soon they need it. Traditionally, they have relied on 911 calls and ground assessments to collect this information. Because the needs of a population are not able to be identified in a timely manner by ground assessments and because individuals are often unable to get through to 911, many civilians in distress turn to social media outlets as a last-ditch effort to obtain the services they need. Due to the uncertainty concerning the accuracy of social media posts, responding to disaster …
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan
Engineering Management & Systems Engineering Theses & Dissertations
Stakeholder analysis is the first step in the planning of most infrastructure projects. Selecting and then applying the best method for a project’s stakeholder analysis is extremely important for correctly assessing stakeholder opinions. Social media platforms allow stakeholders to participate directly in analysis. However, as with most other analysis methods, social media introduces inherent biases.
Social media is a powerful tool for communication and networking, and it also provides a valuable source of information for analyzing user opinions about infrastructure projects. By using data collected from Twitter, analysts can create networks to represent connections among users, quantify their similarities, and …
The Social Presence Of Jibo, Parisa Farhadi
The Social Presence Of Jibo, Parisa Farhadi
Graduate Research Theses & Dissertations
This research is an attempt to investigate how a social robot is perceived by users at the first encounter. And to find out whether a social robot like Jibo is understood merely as a kind of a technological object or a social entity. Previous studies in Human-Robot Interaction have considered social presence as a mediator in users’ social responses toward robots; however, the focus of this study is the social presence itself and investigates whether Jibo produces a sense of presence during initial encounters. To this end, the current study examines individuals’ perceptions of and responses to Jibo. Participants (N=8) …
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith
CCE Theses and Dissertations
There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …