Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Science and Technology Studies

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar Dec 2017

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Digital Reformation.Pdf, Michael Paulus, Bruce Baker Oct 2017

Digital Reformation.Pdf, Michael Paulus, Bruce Baker

SPU Works

Digital information and communication technologies are rapidly changing how we understand our identities and institutions. Five hundred years ago, new printing technologies created conditions that enabled the Protestant reformation and profoundly changed the world. Today, we are in the midst of a digital revolution. But what is being reformed, and what are we reforming? This session will explore the nature of our present information age and the theological questions it raises, touching on theological principles, cultural critiques, and spiritual practices that can help us reflect on digital reformation and transformation.


Digital Reformation.Pdf, Michael J. Paulus Jr., Bruce D. Baker, Mike Langford Oct 2017

Digital Reformation.Pdf, Michael J. Paulus Jr., Bruce D. Baker, Mike Langford

Michael J. Paulus, Jr.

Digital information and communication technologies are rapidly changing how we understand our identities and institutions. Five hundred years ago, new printing technologies created conditions that enabled the Protestant reformation and profoundly changed the world. Today, we are in the midst of a digital revolution. But what is being reformed, and what are we reforming? This session will explore the nature of our present information age and the theological questions it raises, touching on theological principles, cultural critiques, and spiritual practices that can help us reflect on digital reformation and transformation.


Pursuing Best Performance In Research Data Management By Using The Capability Maturity Model And Rubrics, Jian Qin, Kevin Crowston, Arden Kirkland Oct 2017

Pursuing Best Performance In Research Data Management By Using The Capability Maturity Model And Rubrics, Jian Qin, Kevin Crowston, Arden Kirkland

DataONE Sociocultural and Usability & Assessment Working Groups

Objective: To support the assessment and improvement of research data management (RDM) practices to increase its reliability, this paper describes the development of a capability maturity model (CMM) for RDM. Improved RDM is now a critical need, but low awareness of – or lack of – data management is still common among research projects.

Methods: A CMM includes four key elements: key practices, key process areas, maturity levels, and generic processes. These elements were determined for RDM by a review and synthesis of the published literature on and best practices for RDM.

Results: The RDM CMM includes …


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech Oct 2017

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology, …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


The Use Of Reflective Questioning As A Peer Coaching Strategy In An Asynchronous Online Cognitive Apprenticeship, Jennifer Ashley Scott Brown Oct 2017

The Use Of Reflective Questioning As A Peer Coaching Strategy In An Asynchronous Online Cognitive Apprenticeship, Jennifer Ashley Scott Brown

STEMPS Theses & Dissertations

The cognitive apprenticeship framework melds situated, authentic learning with social learning theory. The learning strategies included in a cognitive apprenticeship are modeling, coaching, scaffolding, articulation, reflection, and exploration. Previous research indicates that the most beneficial strategy for the learner is coaching, and is also the most time-consuming strategy for the instructor. However, no previous research has been conducted to determine which coaching strategies can be utilized in order to lessen the burden on the instructor, while being beneficial to the learner.

The purpose of this study was to explore the use of guided reflective questions as a strategy for enhancing …


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew Jun 2017

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


A Tale Of Two Chemists: Academic Journals And The Technology Of Science Communication, Shawn Martin May 2017

A Tale Of Two Chemists: Academic Journals And The Technology Of Science Communication, Shawn Martin

Shawn Martin

No abstract provided.


Internship In Science Writing Bes 581, Michael Cerbo Apr 2017

Internship In Science Writing Bes 581, Michael Cerbo

Library Impact Statements

No abstract provided.


University Policy As A Barrier To Sharing Software In Science, Laura Soito Feb 2017

University Policy As A Barrier To Sharing Software In Science, Laura Soito

Laura Soito

Background: From data collection to analysis and the presentation of research results, scientific research relies on software and an increasing number of researchers not only use, but create software as a part of their work. While there is increasing interest in sharing computer programs in an effort to reduce duplicative effort and improve the reproducibility of science, researchers have noted that university policies related to software sharing can be confusing and hard to navigate. In an effort to better understand social and cultural barriers to software sharing in the academic environment, this study benchmarks current academic policy with respect to …


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz Jan 2017

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …


Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker Jan 2017

Table Of Contents Jitim Vol 26 Issue 1, 2017, Robert P. Schumaker

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 1, 2017


Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783 Jan 2017

Myomlab As An Enabling E-Learning Technology: Bridging The Gap Between Student- And Instructor-Centered Learning, Mahesh Gupta 8524783

Journal of International Technology and Information Management

Technology is continually allowing educators to combine didactic and democratic approaches to facilitate learning and producing successful managers. This paper discusses how one such technology, myOMlab—integrated within a learning management system, Blackboard—can deliver core operations management course, catered primarily to working students i.e., interns and future managers. To confront the bias against online education and engage in serious research on online education, we share our experiences of teaching one semester-long online course. Although robust research evidence is yet to be gathered to convince educators about its benefits, we propose a set of successful myOMlab activities (including manual and Excel-based Dice …


How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman Jan 2017

How We Got Here: Connectivity, Creativity, Confluence And Internet Culture, Tziporah Stern, Linda Wieser Friedman, Hershey H. Friedman

Journal of International Technology and Information Management

There are more innovations today than at any time in human history. The companies that value creativity and diversity of ideas in their hires are the ones most likely to thrive. Indeed, the key asset of a corporation is the abilities, innovativeness, and creativity of its employees. The authors construct a timeline of critical events leading up to today’s highly networked and interconnected world with its ubiquitous social media technologies. The current state has been influenced by advances in media, technology, military defense, and commerce. One trend that stands out in this timeline is the increasing rate of change. It …


Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr Jan 2017

Cyber Security, Threat Intelligence: Defending The Digital Platform, Emmnauel U. Opara Dr, Mohammed T. Hussein Dr

Journal of International Technology and Information Management

Network breaches are happening at a phenomenal scale. The unabated exponential level is forcing enterprise systems to scramble for solutions since the world is so interconnected and digitized and the internet knows no boundaries. Due to big data explosion, the platform for attackers to work continues to grow. Most breached entities are not aware that they have been compromised for weeks but finds out after an external audit or a third party notifies the organizations. Since most networks will be breached at some point, it is proper to note that legacy platforms will no longer stand a chance to defend …


Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari Jan 2017

Why Mobile Money Users Keep Increasing? Investigating The Continuance Usage Of Mobile Money Services In Tanzania, Daniel Koloseni, Herman Mandari

Journal of International Technology and Information Management

This study examined factors that affect continuance usage of mobile money services in Tanzania. The Theory of Planned Behavior was adopted as a theoretical foundation of the study. The theory was further extended by including the constructs of perceived cost, perceived trust and satisfaction as determinants of mobile money service continuance usage behaviour. A total of 309 valid and reliable responses collected using questionnaires were used for data analysis. The data were analysed using Structural Equation Modeling (SEM) approach. The findings depict that perceived trust, attitude and perceived behavioral control have significant influence on continuance behavioral intention while perceived trust, …


Electronic Journal Of Knowledge Management: A Bibliometric Analysis, Jyotshna Sahoo, Ghanashyam Meher, Basudev Mohanty Jan 2017

Electronic Journal Of Knowledge Management: A Bibliometric Analysis, Jyotshna Sahoo, Ghanashyam Meher, Basudev Mohanty

Library Philosophy and Practice (e-journal)

The Electronic Journal of Knowledge Management (EJKM) is an online open access peer-reviewed journal that publishes articles with regard to the development of both theory and practice in the field of Knowledge Management. The present paper examines the articles published in EJKM during the period from 2003-13 for identifying the publication output, authorship pattern, degree of collaboration, most prolific contributors, geographical distribution of papers, referencing pattern, self citation pattern and several other characteristics. The results of this study reveal that that the year 2009 is the most productive year, research papers are given more importance than other categories of publications. …


Tracking Researchers And Their Outputs: New Insights From Orcids, Jan Youtie, Stephen Carley, Alan L. Porter, Philip Shapira Dec 2016

Tracking Researchers And Their Outputs: New Insights From Orcids, Jan Youtie, Stephen Carley, Alan L. Porter, Philip Shapira

Philip Shapira

The ability to accurately identify scholarly authors is central to bibliometric analysis. Efforts to disambiguate author names using algorithms or national or societal registries become less effective with increases in the number of publications from China and other nations where shared and similar names are prevalent. This work analyzes the adoption and integration of an open source, cross-national identification system, the Open Researcher and Contributor ID system (ORCID), in Web of Science metadata. Results at the article level show greater adoption, to date, of the ORCID identifier in Europe as compared with Asia and the US. Focusing analysis on individual highly …