Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 364

Full-Text Articles in Science and Technology Studies

Review Of "Divine Love Theory: How The Trinity Is The Source And Foundation Of Morality", Jaclyn Lee Parrott Dec 2023

Review Of "Divine Love Theory: How The Trinity Is The Source And Foundation Of Morality", Jaclyn Lee Parrott

The Christian Librarian

No abstract provided.


Review Of "Faith And Fake News: A Guide To Consuming Information Wisely", Katherine J. Graber Dec 2023

Review Of "Faith And Fake News: A Guide To Consuming Information Wisely", Katherine J. Graber

The Christian Librarian

No abstract provided.


Electronic Resource Usage Data: An Introduction And Data Dashboard Template, Kelly Bilz Dec 2023

Electronic Resource Usage Data: An Introduction And Data Dashboard Template, Kelly Bilz

The Christian Librarian

This article provides an overview of COUNTER5 metrics and reports, describes the Usage Data Dashboard template, and provides several takeaways for designing data collection workflows. Drawing from research data management (RDM) principles surrounding documentation, the Usage Data Dashboard template can support library workers and improve processes of collecting and interpreting electronic usage data.


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


“That Means Nothing To Me As A Normal Person Who Doesn't Know About Patents”: Usability Testing Of Google Patents And Patent Public Search With Undergraduate Engineering Students, Graham Sherriff, Molly Rogers May 2023

“That Means Nothing To Me As A Normal Person Who Doesn't Know About Patents”: Usability Testing Of Google Patents And Patent Public Search With Undergraduate Engineering Students, Graham Sherriff, Molly Rogers

Journal of the Patent and Trademark Resource Center Association

Patent searching is an important research tool for undergraduate engineering students, yet it requires special topic knowledge to conduct successfully. Patent database websites have the ability to alleviate or add to the complexity of patent searching, depending on their usability. Prompted by the launch of the US Patent and Trademark Office’s Patent Public Search (PPS) website in early 2022, the authors investigated the usability of PPS and Google Patents. The study's objective was to gain insights into the ways in which the websites of commonly-used patent databases support undergraduate students’ patent searching activities. The study examined students’ performance of typical …


A Case Study Of The Complicated History Of Rice University’S First Patents, Hannah G. Edlund May 2023

A Case Study Of The Complicated History Of Rice University’S First Patents, Hannah G. Edlund

Journal of the Patent and Trademark Resource Center Association

Digitization and online public databases have made patent searches a much simpler pursuit in recent years. However, uncovering a pre-digital era patent’s history and context remains challenging. A search for the first patents assigned to Rice University highlighted associated issues. Older patent formats often do not clearly indicate inventor-assignee relationships, and applications and official communications are not available online. To determine how Rice came to own three 1948 patents, extensive archival research was required. Were these patents assigned to the University by inventors, independent of its support or funding, or was their work performed at and for Rice, thus obliging …


Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman May 2023

Predicting The Pebcak: A Quantitative Analysis Of How Cybersecurity Education, Literacy, And Awareness Affect Individual Preparedness., Annie Goodman

Theses/Capstones/Creative Projects

This essay explores the relationship between individuals' cybersecurity education, literacy, awareness, and preparedness. While cybersecurity is often associated with complex hacking scenarios, the majority of data breaches and cyber-attacks result from individuals inadvertently falling prey to phishing emails and malware. The lack of standardized education and training in cybersecurity, coupled with the rapid expansion of technology diversity, raises concerns about individuals' cybersecurity preparedness. As individuals are the first line of defense and the weakest link in cybersecurity, understanding the influence of education, literacy, and awareness on their adherence to best practices is crucial. This work aims to survey a diverse …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi Jan 2023

Determinants Of Continuance Intention To Use Mobile Wallets Technology In The Post Pandemic Era: Moderating Role Of Perceived Trust, Shailja Tripathi

Journal of International Technology and Information Management

The Covid-19 pandemic amplified the volume and importance of mobile payments using digital wallets and placed a basis for their continued adoption. The objective of the study is to formulate and test a comprehensive model by integration of the technology acceptance model (TAM) and expectation confirmation model (ECM) with the addition of three constructs, namely perceived trust, perceived risk, and subjective norm, to identify the determinants of continuance intention to use mobile wallets. Questionnaire-based survey method was used to gather the data from 550 users having experience using mobile wallets for more than six months. The data were analyzed using …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky Jan 2023

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari Jan 2023

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson Jan 2023

Analysis Of The Impact Of Vaccinations On Pandemic Metrics In The New York Metropolitan Area, Oredola A. Soluade, Heechang Shin, Robert Richardson

Journal of International Technology and Information Management

This study evaluates the relationship between pandemic cases and vaccination usage, ICU bed utilization, hospitalizations, and deaths in the New York City metropolitan area. The study includes variables for the lockdown period and confirmed infections. The evaluation addresses three periods: (1) before vaccinations, (2) after vaccinations, and (3) the lockdown period. In addition, the number of vaccines per day for the manufacturers (Pfizer, Moderna, and Johnson & Johnson) are included in the study. Comparisons with New Jersey and Connecticut are used to validate that New York statistics are consistent with other states. The results provide a general model of the …


Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli Dec 2022

Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli

Doctoral Dissertations

Research data management (RDM) describes a broad array of processes and activities aimed at ensuring that data are documented, organized, findable, and preserved for future access. In January 2023, the National Institutes of Health will begin enforcing the strictest data management requirements of a U.S. federal agency to date, including potential consequences for organizations whose researchers fail to demonstrate compliance with commitments to data management and sharing. This dissertation makes two major assessment-based contributions in support of organizational preparedness for policy compliance. First, it reports the results of a pilot study at a high research institution for a survey instrument, …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Patents And Market Research: Librarians Partnering To Assist Bioengineering Senior Design Teams, Jennifer L. Groff, Meredith Futral Jul 2022

Patents And Market Research: Librarians Partnering To Assist Bioengineering Senior Design Teams, Jennifer L. Groff, Meredith Futral

Journal of the Patent and Trademark Resource Center Association

Clemson’s business and engineering librarians have partnered to create a two-step, efficient process to assist Bioengineering Senior Design students in understanding patents and patent searching and market research. Clemson University’s required two-semester Bioengineering Senior Design program matches teams of students with regional clinicians to develop biomedical devices that they research, design, prototype, and test. In the first semester of the program, in which the business and engineering librarians are involved, students take BioE4010-Bioengineering Design Theory. BioE4010 is offered in both the Fall and Spring semesters, but enrollment is significantly higher in the fall. For example, in the Fall of 2021 …


Ptrc Customer Assessment Survey And Best Practices, John Schlipp, Christian Sheehy Jul 2022

Ptrc Customer Assessment Survey And Best Practices, John Schlipp, Christian Sheehy

Journal of the Patent and Trademark Resource Center Association

Assessment of customer activities in academic, public, and special libraries demonstrates their impact and value to library administrators and constituents. In turn, this assists in securing and maintaining advocacy and financial support. Although many formal and informal assessment best practices have evolved to measure the quantitative and qualitative impact of information literacy instruction, few if any best practices have been established to measure impact specific to Patent & Trademark Resource Center (PTRC) customers. This article reviews the results of a survey of PTRC Libraries and their customer assessment practices. Such analysis reveals best practices for other PTRCs to build upon …


Digital Equity: Difficulties Of Implementing The 1:1 Computing Initiative In Low-Income Areas, Demetric D. Williams May 2022

Digital Equity: Difficulties Of Implementing The 1:1 Computing Initiative In Low-Income Areas, Demetric D. Williams

Dissertations

Successful One-to-One Computing Initiative implementation requires educators to communicate and collaborate effectively with everyone in the learning community. However, other factors such as teacher’s professional development, student’s perception, and parent’s perception often affect the implementation of the One-to-One Computing Initiative. School districts, which serve low-income areas in Mississippi, have difficulties ensuring students and communities have access to the information technology they need to participate outside the school setting. The concept is often called digital equity. However, when officials do not address the capacity, there is a vital threat to the participants’ civic, cultural, employment, lifelong learning, and access to essential …


Critical Thinking In The Age Of Misinformation: Information Literacy For Citizenship, Tamra Ortgies-Young, Jennfer Lobo Meeks, Barbara Robertson Apr 2022

Critical Thinking In The Age Of Misinformation: Information Literacy For Citizenship, Tamra Ortgies-Young, Jennfer Lobo Meeks, Barbara Robertson

Georgia International Conference on Information Literacy

As recent political events across the globe have shed a light on the fragility of democratic values, the role of the University in creating a framework for civic education becomes more urgent. Informed, caring and engaged citizenry must be a goal of higher education. Students currently face the emergence of faulty types of information - such as misinformation and disinformation, which undermines the notion of collective or public inquiry, not only within universities, but also within society as a whole. This challenge must be acknowledged and addressed by academic institutions.

Session presenters will provide an overview of their work, “Critical …


Use Of Whatsapp Technology In Library Services: Case Study Of National Defence University Library, Islamabad, Pakistan, Abid Hussain Mar 2022

Use Of Whatsapp Technology In Library Services: Case Study Of National Defence University Library, Islamabad, Pakistan, Abid Hussain

Library Philosophy and Practice (e-journal)

Abstract

Purpose

This study aimed to investigate the interest and use of WhatsApp technology among the library users of National Defence University Pakistan.

Design/methodology/approach

A questionnaire in google forms was created shared with the students of five departments of National Defence University Pakistan via email. The data were tabulated and analyzed using SPSS 22 for this paper.

Findings

This study revealed that WhatsApp is a robust and state of the art technology that could be embedded with digital library services to approach the library's patrons. This technology will help the library users getting quality services. Some technical and human resource …


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi Jan 2022

Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi

Journal of International Technology and Information Management

Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …


Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian Jan 2022

Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …


Jitim Table Of Contents - Vol. 31 Issue 2 - 2022 Jan 2022

Jitim Table Of Contents - Vol. 31 Issue 2 - 2022

Journal of International Technology and Information Management

JITIM ToC


Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr. Jan 2022

Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.

Journal of International Technology and Information Management

Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …


E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis Jan 2022

E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis

Journal of International Technology and Information Management

Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …


Jitim Front Cover Vol 31 1 2022 Jan 2022

Jitim Front Cover Vol 31 1 2022

Journal of International Technology and Information Management

Table of Content JITIM Vol 31. issue 1, 2022


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya Jan 2022

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod Dec 2021

Modeling Deception: A Case Study Of Email Phishing, Abdullah Almoqbil, Brian C. O'Connor, Richard Anderson, Jibril Shittu, Patrick Mcleod

Proceedings from the Document Academy

Information manipulation for deception continues to evolve at a remarkable rate. Artificial intelligence has greatly reduced the burden of combing through documents for evidence of manipulation; but it has also enabled the development of clever modes of deception.

In this study, we modeled deception attacks by examining phishing emails that successfully evaded detection by the Microsoft 365 filtering system. The sample population selected for this study was the University of North Texas students, faculty, staff, alumni and retirees who maintain their university email accounts. The model explains why certain individuals and organizations are selected as targets, and identifies potential counter …


Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman Dec 2021

Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim Dec 2021

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …