Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (99)
- Selected Works (57)
- Clemson University (23)
- University of Nebraska - Lincoln (18)
- SelectedWorks (14)
-
- University of Nevada, Las Vegas (14)
- University of Tennessee, Knoxville (13)
- University of Massachusetts Amherst (11)
- Western Kentucky University (8)
- City University of New York (CUNY) (4)
- Old Dominion University (4)
- Purdue University (4)
- Seattle Pacific University (4)
- Syracuse University (4)
- UIC School of Law (4)
- Western University (4)
- William & Mary (4)
- Sacred Heart University (3)
- University of Nebraska at Omaha (3)
- George Fox University (2)
- Olivet Nazarene University (2)
- University of Kentucky (2)
- University of New Hampshire (2)
- University of Rhode Island (2)
- Bryn Mawr College (1)
- Bucknell University (1)
- Chapman University (1)
- College of DuPage (1)
- Georgia Southern University (1)
- Kansas State University Libraries (1)
- Keyword
-
- Scientific Collaboration (11)
- Scientific Data Practices (11)
- ToC (10)
- Privacy (9)
- Technology (9)
-
- Deep Subseafloor Biosphere Data Practices (8)
- Bibliometrics (7)
- Citizen Science/Citizen Cyberscience (7)
- Data (7)
- Patents (7)
- Public Engagement with Science (7)
- Libraries (6)
- Published Research (6)
- Climate Science Data Practices (5)
- Comparative (5)
- Information (5)
- Information technology (5)
- Internet (5)
- PTRC (5)
- Patent (5)
- Science and technology policy (5)
- Social media (5)
- Table (5)
- Academic libraries (4)
- Astronomy Data Practices (4)
- Communication (4)
- Contents (4)
- Data management (4)
- E-Science (4)
- Editor (4)
- Publication Year
- Publication
-
- Journal of International Technology and Information Management (98)
- Journal of the Patent and Trademark Resource Center Association (23)
- Peter Darch (17)
- Library Philosophy and Practice (e-journal) (16)
- DataONE Sociocultural and Usability & Assessment Working Groups (10)
-
- Li Tang (9)
- Library Faculty Publications (9)
- DLTS Faculty Publications (8)
- Ethics in Science and Engineering National Clearinghouse (8)
- Michael J. Paulus, Jr. (8)
- Christine L. Borgman (5)
- Dissertations, Theses, and Masters Projects (4)
- J. R. Joel Flores-Mariscal (4)
- Library Faculty Presentations (4)
- SPU Works (4)
- Wilhelm Peekhaus (4)
- JoAnn M. Brooks (3)
- Librarian Publications (3)
- Publications and Research (3)
- School of Information Studies - Faculty Scholarship (3)
- UIC Law Open Access Faculty Scholarship (3)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (2)
- Criss Library Faculty Proceedings & Presentations (2)
- FIMS Publications (2)
- Faculty Scholarship – Library Science (2)
- Kelly M. Barrick (2)
- Library Impact Statements (2)
- Loni Hagen (2)
- Philip Shapira (2)
- Ryan Ingersoll (2)
- Publication Type
Articles 1 - 30 of 322
Full-Text Articles in Library and Information Science
“That Means Nothing To Me As A Normal Person Who Doesn't Know About Patents”: Usability Testing Of Google Patents And Patent Public Search With Undergraduate Engineering Students, Graham Sherriff, Molly Rogers
“That Means Nothing To Me As A Normal Person Who Doesn't Know About Patents”: Usability Testing Of Google Patents And Patent Public Search With Undergraduate Engineering Students, Graham Sherriff, Molly Rogers
Journal of the Patent and Trademark Resource Center Association
Patent searching is an important research tool for undergraduate engineering students, yet it requires special topic knowledge to conduct successfully. Patent database websites have the ability to alleviate or add to the complexity of patent searching, depending on their usability. Prompted by the launch of the US Patent and Trademark Office’s Patent Public Search (PPS) website in early 2022, the authors investigated the usability of PPS and Google Patents. The study's objective was to gain insights into the ways in which the websites of commonly-used patent databases support undergraduate students’ patent searching activities. The study examined students’ performance of typical …
A Case Study Of The Complicated History Of Rice University’S First Patents, Hannah G. Edlund
A Case Study Of The Complicated History Of Rice University’S First Patents, Hannah G. Edlund
Journal of the Patent and Trademark Resource Center Association
Digitization and online public databases have made patent searches a much simpler pursuit in recent years. However, uncovering a pre-digital era patent’s history and context remains challenging. A search for the first patents assigned to Rice University highlighted associated issues. Older patent formats often do not clearly indicate inventor-assignee relationships, and applications and official communications are not available online. To determine how Rice came to own three 1948 patents, extensive archival research was required. Were these patents assigned to the University by inventors, independent of its support or funding, or was their work performed at and for Rice, thus obliging …
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman
Theses/Capstones/Creative Projects
This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky
Journal of International Technology and Information Management
This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi
Journal of International Technology and Information Management
The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …
Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli
Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli
Doctoral Dissertations
Research data management (RDM) describes a broad array of processes and activities aimed at ensuring that data are documented, organized, findable, and preserved for future access. In January 2023, the National Institutes of Health will begin enforcing the strictest data management requirements of a U.S. federal agency to date, including potential consequences for organizations whose researchers fail to demonstrate compliance with commitments to data management and sharing. This dissertation makes two major assessment-based contributions in support of organizational preparedness for policy compliance. First, it reports the results of a pilot study at a high research institution for a survey instrument, …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Ptrc Customer Assessment Survey And Best Practices, John Schlipp, Christian Sheehy
Ptrc Customer Assessment Survey And Best Practices, John Schlipp, Christian Sheehy
Journal of the Patent and Trademark Resource Center Association
Assessment of customer activities in academic, public, and special libraries demonstrates their impact and value to library administrators and constituents. In turn, this assists in securing and maintaining advocacy and financial support. Although many formal and informal assessment best practices have evolved to measure the quantitative and qualitative impact of information literacy instruction, few if any best practices have been established to measure impact specific to Patent & Trademark Resource Center (PTRC) customers. This article reviews the results of a survey of PTRC Libraries and their customer assessment practices. Such analysis reveals best practices for other PTRCs to build upon …
Patents And Market Research: Librarians Partnering To Assist Bioengineering Senior Design Teams, Jennifer L. Groff, Meredith Futral
Patents And Market Research: Librarians Partnering To Assist Bioengineering Senior Design Teams, Jennifer L. Groff, Meredith Futral
Journal of the Patent and Trademark Resource Center Association
Clemson’s business and engineering librarians have partnered to create a two-step, efficient process to assist Bioengineering Senior Design students in understanding patents and patent searching and market research. Clemson University’s required two-semester Bioengineering Senior Design program matches teams of students with regional clinicians to develop biomedical devices that they research, design, prototype, and test. In the first semester of the program, in which the business and engineering librarians are involved, students take BioE4010-Bioengineering Design Theory. BioE4010 is offered in both the Fall and Spring semesters, but enrollment is significantly higher in the fall. For example, in the Fall of 2021 …
Digital Equity: Difficulties Of Implementing The 1:1 Computing Initiative In Low-Income Areas, Demetric D. Williams
Digital Equity: Difficulties Of Implementing The 1:1 Computing Initiative In Low-Income Areas, Demetric D. Williams
Dissertations
Successful One-to-One Computing Initiative implementation requires educators to communicate and collaborate effectively with everyone in the learning community. However, other factors such as teacher’s professional development, student’s perception, and parent’s perception often affect the implementation of the One-to-One Computing Initiative. School districts, which serve low-income areas in Mississippi, have difficulties ensuring students and communities have access to the information technology they need to participate outside the school setting. The concept is often called digital equity. However, when officials do not address the capacity, there is a vital threat to the participants’ civic, cultural, employment, lifelong learning, and access to essential …
Critical Thinking In The Age Of Misinformation: Information Literacy For Citizenship, Tamra Ortgies-Young, Jennfer Lobo Meeks, Barbara Robertson
Critical Thinking In The Age Of Misinformation: Information Literacy For Citizenship, Tamra Ortgies-Young, Jennfer Lobo Meeks, Barbara Robertson
Georgia International Conference on Information Literacy
As recent political events across the globe have shed a light on the fragility of democratic values, the role of the University in creating a framework for civic education becomes more urgent. Informed, caring and engaged citizenry must be a goal of higher education. Students currently face the emergence of faulty types of information - such as misinformation and disinformation, which undermines the notion of collective or public inquiry, not only within universities, but also within society as a whole. This challenge must be acknowledged and addressed by academic institutions.
Session presenters will provide an overview of their work, “Critical …
Use Of Whatsapp Technology In Library Services: Case Study Of National Defence University Library, Islamabad, Pakistan, Abid Hussain
Use Of Whatsapp Technology In Library Services: Case Study Of National Defence University Library, Islamabad, Pakistan, Abid Hussain
Library Philosophy and Practice (e-journal)
Abstract
Purpose
This study aimed to investigate the interest and use of WhatsApp technology among the library users of National Defence University Pakistan.
Design/methodology/approach
A questionnaire in google forms was created shared with the students of five departments of National Defence University Pakistan via email. The data were tabulated and analyzed using SPSS 22 for this paper.
Findings
This study revealed that WhatsApp is a robust and state of the art technology that could be embedded with digital library services to approach the library's patrons. This technology will help the library users getting quality services. Some technical and human resource …
Jitim Front Cover Vol 31 1 2022
Jitim Front Cover Vol 31 1 2022
Journal of International Technology and Information Management
Table of Content JITIM Vol 31. issue 1, 2022
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi
Journal of International Technology and Information Management
Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Jitim Table Of Contents - Vol. 31 Issue 2 - 2022
Journal of International Technology and Information Management
JITIM ToC
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis
Journal of International Technology and Information Management
Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya
Journal of International Technology and Information Management
Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.
Journal of International Technology and Information Management
Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …
Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod
Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod
Proceedings from the Document Academy
Information manipulation for deception continues to evolve at a remarkable rate. Artificial intelligence has greatly reduced the burden of combing through documents for evidence of manipulation; but it has also enabled the development of clever modes of deception.
In this study, we modeled deception attacks by examining phishing emails that successfully evaded detection by the Microsoft 365 filtering system. The sample population selected for this study was the University of North Texas students, faculty, staff, alumni and retirees who maintain their university email accounts. The model explains why certain individuals and organizations are selected as targets, and identifies potential counter …
Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman
Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman
FORCES Initiative: Strategy, Security, and Social Systems
This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Barriers For Library And Information Science Researchers From Developing Countries: What The “Library Philosophy And Practice Phenomenon” Tells Us, Brady Lund
Library Philosophy and Practice (e-journal)
This short commentary introduces and discusses the “Library Philosophy and Practice (LPP) Phenomenon,” wherein a scholarly journal published in a developed country has an extremely large number of authors from developing countries, relative to the typical journal. Elements of journals that fit the LPP phenomenon are discussed, as well as what this phenomenon says about barriers to scholarly publishing for researchers from developing nations. Implications for journals that lack diverse authorship from developing nations are listed. This phenomenon may be studied in other disciplines to further illuminate divides in the scholarly realm.
Undergraduate Students’ Use Of Electronic Resources In Academic Libraries In Selected Universities In Nigeria, Williams Nwagwu
Undergraduate Students’ Use Of Electronic Resources In Academic Libraries In Selected Universities In Nigeria, Williams Nwagwu
Library Philosophy and Practice (e-journal)
The objective of this study is to investigate the factors influencing the use of electronic resources by undergraduate students in academic libraries in selected Universities in Oyo State, Nigeria. Data was collected from 352 undergraduate students, 51.42% females and 48.58% males, from three universities in Southwest Nigeria. Data was analysed using binary logistic regression to understand the odds that favour use or non-use of the resources. The model successfully distinguished between the types of electronic resources and use non-use of the e-resources, and only three of the ten variables namely e-books, reference books and reference database made unique statistically significant …
Occasional Groups In Crowdsourcing Platforms, Mahboobeh Harandi
Occasional Groups In Crowdsourcing Platforms, Mahboobeh Harandi
Dissertations - ALL
Contributors to online crowdsourcing systems generally work independently on pieces of the product but in some cases, task interdependencies may require collaboration to develop a final product. These collaborations though take a distinctive form because of the nature of crowdsourced work. Collaboration may be implicit instead of explicit. Individuals engaged in a group conversation may not stay with the group for long, i.e., the group is an ``occasional group.'' Occasional group interactions are often not well supported by systems, as they are not designed for team work. This dissertation examines the characteristics and work of occasional groups in the Gravity …
The Public Innovations Explorer: A Geo-Spatial & Linked-Data Visualization Platform For Publicly Funded Innovation Research In The United States, Seth Schimmel
Dissertations, Theses, and Capstone Projects
The Public Innovations Explorer (https://sethsch.github.io/innovations-explorer/app/index.html) is a web-based tool created using Node.js, D3.js and Leaflet.js that can be used for investigating awards made by Federal agencies and departments participating in the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) grant-making programs between 2008 and 2018. By geocoding the publicly available grants data from SBIR.gov, the Public Innovations Explorer allows users to identify companies performing publicly-funded innovative research in each congressional district and obtain dynamic district-level summaries of funding activity by agency and year. Applying spatial clustering techniques on districts' employment levels across major economic sectors provides users …
Intellectual Property, Secrets, And Declassified Information. Mastering United States Government Information: Sources And Services, Christopher C. Brown, Libraries Unlimited, 2020., Suzanne Reinman
Journal of the Patent and Trademark Resource Center Association
No abstract provided.
Stalking The Wild X Patent, Barbara J. Hampton