Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 40 of 40

Full-Text Articles in Library and Information Science

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham Jan 2019

An Investigation Into The Impact Of Social Networking On Knowledge Sharing, James Harold Gorham

CCE Theses and Dissertations

Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, …


Topic Development In The Freshman Engineering Paper: Finding A Focus, Edward J. Eckel Jan 2019

Topic Development In The Freshman Engineering Paper: Finding A Focus, Edward J. Eckel

University Libraries Faculty & Staff Publications

Topic development and focus are relatively neglected areas of the student research process. This study examined how students in a freshman engineering writing class developed initial research paper topics into focused thesis statements. A mixed methods approach was used, incorporating online surveys, qualitative interviews, and a rubric to track topic development and assess thesis statement focus. The survey results and student comments indicated that participants were more competent at the mechanics of finding sources and writing than at developing appropriately scoped thesis statements. Closer collaboration between writing instructors and librarians is urged to more effectively support and scaffold topic development.


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali Jan 2019

Accessibility And Decay Of Web Citations In Computer Science Journals, Mohsen Jalali

Library Philosophy and Practice (e-journal)

The aim of this research is to scrutiny the accessibility and decay of web citations (URLs) used in refereed articles published by 27 Computer Science open access journals as indexed by Scopus. To do this, at first, we downloaded 1000 articles of Computer Science open access journals from 2009 to 2018. After acquiring articles, their web citations are extracted and analyzed from the accessibility and decay point of view. Moreover, for initially missed web citations complementary pathways such as using Google search engine are employed. Then, data collected are analyzed using descriptive statistical methods. Research findings indicated that 80.7% of …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.


Table Of Contents Jitim Vol 28 Issue 4, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 4, 2019

Journal of International Technology and Information Management

Table of Contents