Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Library and Information Science

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


In Our Very Blood: The Use Of Social Media In The 2018 West Virginia Teachers' Strike, Everette Scott Sikes May 2021

In Our Very Blood: The Use Of Social Media In The 2018 West Virginia Teachers' Strike, Everette Scott Sikes

Doctoral Dissertations

The 2018 West Virginia teachers’ strike exemplifies the changing shape of social movements and events of dissent and protest in the digital age. The use of information communication technologies (ICT) and social media have changed the ways such events develop and unfold. These technologies offer new tools for organizing and strategizing, for generating large numbers of participants, and for communicating crucial information while reducing temporal and spatial barriers. The teachers’ strike presents an opportunity to increase our understandings of these issues and to widen the scope of research in the field of information sciences to include the impact of ICTs …


Adoption Of A Self-Care Therapy Mobile App: Application Of Uses And Gratification Theory, Self-Efficacy, And Response Efficacy, Sue Lim May 2021

Adoption Of A Self-Care Therapy Mobile App: Application Of Uses And Gratification Theory, Self-Efficacy, And Response Efficacy, Sue Lim

Theses and Dissertations

This study examines factors that influence people’s decision to adopt a self-care therapy chatbot utilizing the uses and gratification theory, self-efficacy, and response efficacy frameworks. Existing literature has shown a large gap between supply and demand of mental health services as well as major barriers that prevent people from seeking services. Therapy chatbots offer the potential to address the gap and the barriers. This research used Woebot, a widely used and clinical evaluated therapy bot, and examined the influence of 6 uses and obtained gratification variables, two self-efficacy scales, and response efficacy on intentions of use. Quantitative analysis of the …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …