Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2016

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 38

Full-Text Articles in Science and Technology Studies

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese ...


An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth Nov 2016

An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth

Journal of Science Education for Students with Disabilities

This study examined the potential relationship of accessible hands-on science learning experiences to the development of positive beliefs concerning one’s capacity to function in the sciences and motivation to consider science as a college major and career. Findings from Likert survey items given before and after engaging in accessible hands-on science laboratories show that students who were blind or had low vision (BLV) were more likely to agree with the following items after engaging in accessible science experiences: 1) I plan on enrolling as a science major in college; 2) My educational experiences, so far, have given me the ...


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


E-Government Services Adoption And Interdependence: Granger Causality Analysis, Shashi Kant Srivastava, Sanjog Ray Nov 2016

E-Government Services Adoption And Interdependence: Granger Causality Analysis, Shashi Kant Srivastava, Sanjog Ray

Journal of International Technology and Information Management

Adoption of e-government services varies across the different categories of services: government to citizen services, utility services, commercial services, informational services, social benefit services and mobile based services. Faced with constraint of resources, policy makers devising strategies for better adoption of these services face the challenge of prioritizing among these categories of services. This paper attempts to address this challenge by showing the applicability of Granger causality analysis in studying the causation analysis between the categories of e-government services. We prove the applicability of Granger causality analysis in understanding the independence between e-government service categories by analyzing real transactions data ...


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play ...


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package ...


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major ...


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth ...


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the ...


The Vital Network: An Algorithmic Milieu Of Communication And Control, Sandra Robinson Phd Sep 2016

The Vital Network: An Algorithmic Milieu Of Communication And Control, Sandra Robinson Phd

communication +1

The biological turn in computing has influenced the development of algorithmic control and what I call the vital network: a dynamic, relational, and generative assemblage that is self-organizing in response to the heterogeneity of contemporary network processes, connections, and communication. I discuss this biological turn in computation and control for communication alongside historically significant developments in cybernetics that set out the foundation for the development of self-regulating computer systems. Control is shifting away from models that historically relied on the human-animal model of cognition to govern communication and control, as in early cybernetics and computer science, to a decentred, nonhuman ...


Data’S Intimacy: Machinic Sensibility And The Quantified Self, Sun-Ha Hong Sep 2016

Data’S Intimacy: Machinic Sensibility And The Quantified Self, Sun-Ha Hong

communication +1

Today, machines observe, record, sense the world – not just for us, but sometimes instead of us (in our stead), and even indifferently to us humans. And yet, we remain human. Correlationism may not be up to a comprehensive ontology, but the ways in which we encounter, and struggle to make some kind of sense of, machinic sensibility matters. The nature of that encounter is not instrumentality, or even McLuhanian extension, but a full-blown ‘relationship’ where the terms by which machines ‘experience’ the world, and communicate with each other, parametrises the conditions for our own experience. This essay will play out ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale Jun 2016

Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale

Journal of Public Deliberation

Drawing on the experiences of a deliberative practitioner and critical social scientist involved in the planning, production and implementation of a deliberative initiative on climate change, this paper reflects on nuances of framing and power in practical settings. Decisions about framing, some of them more conscious than others, influence the process of opinion formation among participants as well as the outcomes of the deliberation. Framing enacts power through the selection of deliberative approaches, the viewpoints that are admitted into the procedure, the alternatives that are defined, as well as the solutions that are ultimately proposed. Grounded in reflexivity as a ...


The Social Implications Of Wellness, Mary G. Fisher May 2016

The Social Implications Of Wellness, Mary G. Fisher

BU Well

This paper presents the existing health disparities between populations of varying socio-economic statuses in the US as part of a broader discussion of the modern wellness industry. The discussion highlights the threat modern wellness poses to the individual and society and the implications these threats have on the health and future of the US if the wellness industry is left unchecked.


Table Of Contents Apr 2016

Table Of Contents

Professional Agricultural Workers Journal

No abstract provided.


Table Of Contents (V. 28, 2016) Jan 2016

Table Of Contents (V. 28, 2016)

BEADS: Journal of the Society of Bead Researchers

No abstract provided.


Reviews And End Matter Jan 2016

Reviews And End Matter

BEADS: Journal of the Society of Bead Researchers

Contact in the 16th Century, edited by Brad Loewen and Claude Chapdelaine, reviewed by Marvin T. Smith

Flower Forever: Bead Craft from France and Venice, by Ragnar Levi, reviewed by Alice Scherer

Beads from Germany: Idar-Oberstein, Lauscha, Neugablonz, by Floor Kaspers, reviewed by Valerie Hector


Front Matter Jan 2016

Front Matter

BEADS: Journal of the Society of Bead Researchers

No abstract provided.


Imitation Amber Beads Of Phenolic Resin From The African Trade, Rosanna Falabella Jan 2016

Imitation Amber Beads Of Phenolic Resin From The African Trade, Rosanna Falabella

BEADS: Journal of the Society of Bead Researchers

Examination of contemporary beads with African provenance reveals large quantities of imitation amber beads made of phenol-formaldehyde thermosetting resins (PFs). This article delves into the early industrial history of PFs and their use in the production of imitation amber and bead materials. Attempts to discover actual sources that manufactured imitation amber beads for export to Africa and the time frame have not been very fruitful. While evidence exists that PFs were widely used as amber substitutes within Europe, only a few post-WWII references explicitly report the export of imitation amber PF beads to Africa. However they arrived in Africa, the ...


The Fichtelgebirge Bead And Button Industry Of Bavaria, Karlis Karklins, Sibylle Jargstorf, Gerhard Zeh, Laure Dussubieux Jan 2016

The Fichtelgebirge Bead And Button Industry Of Bavaria, Karlis Karklins, Sibylle Jargstorf, Gerhard Zeh, Laure Dussubieux

BEADS: Journal of the Society of Bead Researchers

Venice and Bohemia are generally considered to be the principal bead manufacturers of Europe. Yet Germany, especially the Fichtelgebirge region of northeastern Bavaria, produced large quantities of glass beads for the world market beginning in the 15th century, if not even earlier, and continued to do so well into the 20th century. The Fichtelgebirge industry is especially notable for two things: 1) the utilization of furnace-winding technology which, based on our current knowledge, was not employed to a significant degree elsewhere in Europe during the post-medieval period, and 2) the localized use of Proterobas, a greenish igneous rock, to produce ...


Beads: Journal Of The Society Of Bead Researchers - Volume 28 (Complete) Jan 2016

Beads: Journal Of The Society Of Bead Researchers - Volume 28 (Complete)

BEADS: Journal of the Society of Bead Researchers

No abstract provided.


Beads At The Place Of White Earth - Late Neolithic And Early Chalcolithic Aktopraklık, Northwestern Turkey, Emma L. Baysal Jan 2016

Beads At The Place Of White Earth - Late Neolithic And Early Chalcolithic Aktopraklık, Northwestern Turkey, Emma L. Baysal

BEADS: Journal of the Society of Bead Researchers

The site of Aktopraklık in northwestern Turkey was inhabited during the Late Neolithic and Early Chalcolithic periods, from the mid-7th to mid-6th millennia B.C. The site lies in a region that came to link Anatolia with Europe through the introduction of early farming practices and has already provided much information about the groups which inhabited the area along with their domesticated plants and animals. Although scientific techniques have led to recent breakthroughs in our understanding of the dynamics of change in the region, it is material culture that continues to form the foundation of archaeological research into daily life ...


Frit-Core Beads In North America, Karlis Karklins Jan 2016

Frit-Core Beads In North America, Karlis Karklins

BEADS: Journal of the Society of Bead Researchers

Among the earliest European beads to reach North America is a distinctive group generally referred to in the archaeological literature as frit-core or frit-cored, so called because their interiors consist of sintered sand rather than solid glass. Likely produced in France, they are restricted to northeastern North America and have short temporal ranges, making them ideal chronological indicators for the latter part of the 16th century and the very early 17th century.


Bead Netting And Plaiting Techniques In The Peranakan World, Valerie Hector Jan 2016

Bead Netting And Plaiting Techniques In The Peranakan World, Valerie Hector

BEADS: Journal of the Society of Bead Researchers

It has long been recognized that the Peranakan Chinese peoples of Southeast Asia were expert bead embroiderers. As it happens, they were also expert bead netters and plaiters. After establishing a conceptual framework for discussing bead netting and plaiting techniques in general, this article discusses 14 pieces of Peranakan Chinese (or Minangkabau) beadwork and various techniques. The techniques likely derived not just from Europe, as early researchers tended to assume, but from island Southeast Asia and China as well. Knowledge of these and other needleworking techniques helped Peranakan beaders devise radically new permutations, some of them highly complex. Additional factors ...


Beads And Pendants From The Tumuli Cemeteries At Wadi Qitna And Kalabsha-South, Nubia, Joanna Then-Obłuska Jan 2016

Beads And Pendants From The Tumuli Cemeteries At Wadi Qitna And Kalabsha-South, Nubia, Joanna Then-Obłuska

BEADS: Journal of the Society of Bead Researchers

More than 500 beads and pendants were excavated by a Czechoslovakian team in the early 1960s at two sites in Lower Nubia. The beads were associated with 40 tumuli in the Wadi Qitna cemetery and two tumuli in the Kalabsha-South cemetery. These 4th-century cemeteries are related to the Blemmyes, the Eastern Desert dwellers whose pottery has been commonly recognized in the region between the Nile Valley and the Red Sea coast at a time of intensive overseas trade contacts. The bead assemblage, stored at the Naprstek Museum in Prague, was recently restudied and its materials and parallels could be more ...