Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 406

Full-Text Articles in Science and Technology Studies

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis ...


Inside The Black Box Of Dictionary Building For Text Analytics: A Design Science Approach, Qi Deng, Michael J. Hine, Shaobo Ji, Sujit Sur Jan 2019

Inside The Black Box Of Dictionary Building For Text Analytics: A Design Science Approach, Qi Deng, Michael J. Hine, Shaobo Ji, Sujit Sur

Journal of International Technology and Information Management

The purpose of this paper is to develop and demonstrate a dictionary building process model for text analytics projects following the design science methodology. Using inductive consensus-building, we examined prior research to develop an initial process model. The model is subsequently demonstrated and validated by using data to develop an environmental sustainability dictionary for the IT industry. To our knowledge, this is an initial attempt to provide a normalized dictionary building process for text analytics projects. The resulting process model can provide a road map for researchers who want to use automated approaches to text analysis but are currently prevented ...


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


A Moratorium On The Presentation Of Dna Evidence, Declan Riley Kunkel Dec 2018

A Moratorium On The Presentation Of Dna Evidence, Declan Riley Kunkel

International Social Science Review

In recent decades, DNA evidence has become something of a pop-culture phenomenon. All too often, DNA evidence is shown as irrefutable fact, a scientific fingerprint that allows for a black-and-white determination of guilt or innocence. Unfortunately, such depictions are inaccurate and dangerous. This paper attempts to address this danger by calling for a temporary moratorium on the presentation of DNA evidence at trial, implemented until federal standards are put in place to regulate the presentation of DNA evidence, and until robust studies indicate the prevalence of DNA transfer.This paper will demonstrate that DNA analysis schemes are dangerously flawed and ...


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti Dec 2018

The Relationship Between Organizational Resources And Green It/S Adoption: A Rbv Approach, Lutfus Sayeed, Alberto Onetti

Journal of International Technology and Information Management

ABSTRACT

The objective of the present study was to empirically explore the impact of the implementation of Green IT/S measures on organizational resources in the US and European firms. The study examined the influence of reconfiguration of resources within a firm while adopting various Green IT/S practices and technologies. Green IT/S implementation requires resource commitment from organizations (Bose and Luo, 2011). What are these resources and how do they affect the extent of Green IT/S measures adopted by businesses? Resource Based View (RBV) of the firm was used as the theoretical framework of the study. The ...


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in ...


How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma Dec 2018

How It Awareness Impacts It Control Weaknesses And Firm Performance, Peiqin Zhang, Ju Long, James Ma

Journal of International Technology and Information Management

With the prevalence of information technology (IT), the value of IT awareness increasingly grows, and IT control becomes a key part of firms’ strategies and objectives. Although leadership plays an important role in IT control governance, limited research has studied whether IT awareness is associated with IT control weaknesses (ITCWs) and firm performance simultaneously. Drawing on the agency and resource dependence theory, this paper proposes an integrative model to examine the impact of IT awareness on ITCWs and firm performance. We empirically validate the model using a data set of 310 firms collected from multiple sources including Audit Analytics, Compustat ...


Troping The Enemy: Metaphor, Culture, And The Big Data Black Boxes Of National Security, Robert Albro Sep 2018

Troping The Enemy: Metaphor, Culture, And The Big Data Black Boxes Of National Security, Robert Albro

Secrecy and Society

This article considers how cultural understanding is being brought into the work of the Intelligence Advanced Research Projects Activity (IARPA), through an analysis of its Metaphor program. It examines the type of social science underwriting this program, unpacks implications of the agency’s conception of metaphor for understanding so-called cultures of interest, and compares IARPA’s to competing accounts of how metaphor works to create cultural meaning. The article highlights some risks posed by key deficits in the Intelligence Community's (IC) approach to culture, which relies on the cognitive linguistic theories of George Lakoff and colleagues. It also explores ...


Cultural Memory In Danger: Sustainable Information, Preservation, And Technology In The Humanities: A Theoretical Approach, Casey D. Hoeve Sep 2018

Cultural Memory In Danger: Sustainable Information, Preservation, And Technology In The Humanities: A Theoretical Approach, Casey D. Hoeve

Collaborative Librarianship

Abstract

Management of library collections is an inherently collaborative process. Spanning multiple generations, materials are selected that support user communities, striving for the optimization of storage and access at the lowest cost.[i] While established partnerships are crucial for the survival of libraries, within any cooperative network, there exist opportunities for divergent practices. Alternative initiatives may have progressive intentions, but competing systems and groups have the potential to disrupt recognized standards and infrastructure, some of which can prove detrimental to information organizations.

Abrupt format changes and technological advancements have altered the way in which materials are currently acquired, accessed, and ...


Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard Aug 2018

Enhancing Trust In The Cryptocurrency Marketplace: A Reputation Scoring Approach, Dan Freeman, Tim Mcwilliams, Sudip Bhattacharyya, Craig Hall, Pablo Peillard

SMU Data Science Review

Trust is paramount for the effective operation of any monetary system. While the distributed architecture of blockchain technology on which cryptocurrencies operate has many benefits, the anonymity of users on the blockchain has provided criminal users an opportunity to hide both their identities and illicit activities. In this paper, we present a scoring mechanism for cryptocurrency users where the scores represent users’ trustworthiness as safe or risky transactors in the cryptocurrency community. In order to distinguish law-abiding users from potential threats in the Bitcoin marketplace, we analyze historical thefts to profile transactions, classify them into risky and non-risky categories using ...


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels Aug 2018

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that ...


Yardwork: A Biography Of An Urban Place By Daniel Coleman, Vivian M. Hansen Aug 2018

Yardwork: A Biography Of An Urban Place By Daniel Coleman, Vivian M. Hansen

The Goose

Review of Daniel Coleman's Yardwork: A Biography of an Urban Place.


Determination Of Takeoff And Landing Distances Using An Ipad Performance Application For The Diamond Da40, Tyler A. Babb, Christina Hiers Aug 2018

Determination Of Takeoff And Landing Distances Using An Ipad Performance Application For The Diamond Da40, Tyler A. Babb, Christina Hiers

International Journal of Aviation, Aeronautics, and Aerospace

All pilots are required to calculate aircraft performance parameters prior to flight. This includes takeoff and landing distances. Traditionally, pilots in training have planned for takeoff and landing performance using paper charts provided by the manufacturer. However, professional pilots use devices such as Flight Management Systems (FMS), Electronic Flight Bag (EFB) applications, or on-board performance computers (OPC) to make such calculations. During primary flight training, student pilots could make performance calculations with proper software, similar to the method they will typically use at the professional level. Recently an iPad application was released which can calculate numerous performance parameters for specific ...


Measuring Public Utilization Perception Potential Of Unmanned Aircraft Systems, Julius Keller, Daniel Kwasi Adjekum, Bortiorkor Nii Tsui Alabi, Brian Kozak Jul 2018

Measuring Public Utilization Perception Potential Of Unmanned Aircraft Systems, Julius Keller, Daniel Kwasi Adjekum, Bortiorkor Nii Tsui Alabi, Brian Kozak

International Journal of Aviation, Aeronautics, and Aerospace

The integration of Unmanned Aircraft Systems (UAS) into the National Air Space (NAS) in recent times has been met by mixed public responses. The paper establishes four constructs each of which encapsulates multiple backgrounds and concerns of the stakeholders: functional knowledge, utilization trust, operational integration support, and safety risk-benefits. The paper hypothesizes that these constructs can serve as underlying components for a research instrument namely, the Public Utilization Perception Potential (PUPP) which can be used to assess the opinions of the public on UAS integration into NAS. Responses from the public on items in a beta-tested survey instrument were analyzed ...


On Identifying Factors Affecting Ethical Practices In Data Science Domains, Yanqin Wang, Earl Shaw, Brian Kruse, Mehdi Ghods Jul 2018

On Identifying Factors Affecting Ethical Practices In Data Science Domains, Yanqin Wang, Earl Shaw, Brian Kruse, Mehdi Ghods

SMU Data Science Review

In data science domains, ethics and ethical approaches are important to minimize adverse effects that may arise in data collection, analysis, and storage. What factors are influential for ethical practices in data science? In this research study, we designed a survey to capture an assessment of ethical concerns and practices from those currently active in the field by soliciting the attitudes/feelings of data science students and practitioners via the questionnaire. We analyzed the extent of their attitudes and identified factors contributing to the difference.


Performing The Quality Of Imperceptible Interactions Between Individuals: A Technological Challenge Regarding The Collective, Marine Theunissen Jul 2018

Performing The Quality Of Imperceptible Interactions Between Individuals: A Technological Challenge Regarding The Collective, Marine Theunissen

Proceedings from the Document Academy

Contemporary technologies allow incredible possibilities of capturing individuals, but a problem arises when it comes to capturing a chorus, that is to say a "collective body" in motion. This proposal will address the problem of the sensitive capture of the quality of the interrelations between individuals, and of their refined interpretation through algorithms to "output” them in other forms. We will address two questions on the subject: how to capture the relations between individuals within a collective? How to create a circular-causal loop, whose artistic material (the digital data) is the interrelations of a collective, without engendering redundancy in their ...


Book Review: Fundamentals Of International Aviation, Alan Bender Jun 2018

Book Review: Fundamentals Of International Aviation, Alan Bender

International Journal of Aviation, Aeronautics, and Aerospace

Not applicable.


Using Student-Produced Videos To Communicate About Science, Ricky W. Telg, Kathryn Stofer, Rachel Deconna Jun 2018

Using Student-Produced Videos To Communicate About Science, Ricky W. Telg, Kathryn Stofer, Rachel Deconna

Journal of Applied Communications

This professional development article provides a case study of the Explore Research at the University of Florida video project, conducted by University of Florida undergraduate and graduate students. Students take an advanced digital media production course where they develop videos documenting research at the university. The videos are then displayed at the Museum of Natural History and various online, broadcast, and cable television outlets. This article also provides suggestions for individuals who may want to develop their own partnerships with similar organizations in their courses.


An In-Depth Look Into Cybercrime, Brandon Mcdaniel May 2018

An In-Depth Look Into Cybercrime, Brandon Mcdaniel

Themis: Research Journal of Justice Studies and Forensic Science

Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people.


The Ethics In Synthetics: Statistics In The Service Of Ethics And Law In Health-Related Research In Big Data From Multiple Sources, Sharon Bassan Ph.D., Ofer Harel Ph.D. May 2018

The Ethics In Synthetics: Statistics In The Service Of Ethics And Law In Health-Related Research In Big Data From Multiple Sources, Sharon Bassan Ph.D., Ofer Harel Ph.D.

Journal of Law and Health

An ethical advancement of scientific knowledge demands a delicate equilibrium between benefits and harms, in particular in health-related research. When applying and advancing scientific knowledge or technologies, Article 4 of UNESCO’s Universal Declaration on Bioethics and Human Rights, ethically justifiable research requires maximizing direct and indirect benefits and minimizing possible harms. The National Institution of Health [NIH] Data Sharing Policy and Implementation Guidance similarly states that data necessary for drawing valid conclusions and advancing medical research should be made as widely and freely available as possible (in order to share the benefits) while safeguarding the privacy of participants from ...


Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi Apr 2018

Mobile Bullying Among Rural South African Students: Examining The Applicability Of Existing Theories, Michael Eddie Kyobe Prof., Lucas Mimbi Dr, Phillimom Nembandona, Sive Mtshazi

The African Journal of Information Systems

Mobile bullying, which is one form of cyberbullying, is escalating in schools in South Africa. Research can contribute to better understanding of the nature of this aggression, and provide guidance in determining appropriate interventions and administration of justice. However, studies into cyberbullying tend to focus mainly on the urban environment. Rural South Africa involves a large percentage of mobile phone users and experiences in relatively different cultural and social-economic conditions. Lack of research on rural mobile bullying calls into question the applicability of existing theories of crime and cyberbullying to the rural context and their effectiveness in guiding legal and ...


The Accountability Web: Weaving Corporate Accountability And Interactive Technology (2010), Marcy Murninghan, Bill Baue Mar 2018

The Accountability Web: Weaving Corporate Accountability And Interactive Technology (2010), Marcy Murninghan, Bill Baue

New England Journal of Public Policy

This article is a synopsis of and set of recommendations emerging from a research project commissioned in 2009 and culminating in a working paper published in May 2010 by the Corporate Social Responsibility Initiative of the Mossavar–Rahmani Center for Business and Government at Harvard University’s John F. Kennedy School of Government. The project was undertaken in the early days of social media and online interaction. Authors Bill Baue and Marcy Murninghan were designated as research fellows to take an in-depth look at implications produced by the interface between newly emerging interactive technology—at that time called “Web 2 ...


Mapping Wifi Measurements On Openstreetmap Data For Wireless Street Coverage Analysis, Andrea Valenzano, Dario Mana, Claudio Borean, Antonio Servetti Jan 2018

Mapping Wifi Measurements On Openstreetmap Data For Wireless Street Coverage Analysis, Andrea Valenzano, Dario Mana, Claudio Borean, Antonio Servetti

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

The growing interest on smart cities and the deployment of an ever increasing number of smart objects in public locations, such as dumpsters, traffic lights, and manholes, requires ubiquitous connectivity for these devices to communicate data and to receive configurations. Opportunistic WiFi connectivity is a valid alternative both to ad hoc solutions, like LoRa, which require costly deployments, and to communicating through the mobile network, which is both pricey and battery power hungry. In this paper we present a tool to analyze the WiFi coverage of home Access Points (AP) on the city streets. It can be of interest to ...


Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall Jan 2018

Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall

Numeracy

Cathy O’Neil. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy (New York, NY: Crown) 272 pp. ISBN 978-0553418811.

Accessible to a wide readership, Cathy O’Neil’s Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy provides a lucid yet alarming account of the extensive reach of mathematical models in influencing all of our lives. With a particular eye towards social justice, O’Neil not only warns modelers to be cognizant of the effects of their work on real people—especially vulnerable groups who have less power to fight back—but ...


Technology, Hyperbole, And Irony, Alan G. Gross Jan 2018

Technology, Hyperbole, And Irony, Alan G. Gross

Poroi

Except for metaphor, tropes are arguably irrelevant to the analysis of science and technology. Among tropes, moreover, hyperbole and irony seem particularly ill-suited as the former exaggerates, while the latter undermines, two strategies at odds with a language intent on closely following the contours of the world of experience. While neither hyperbole nor irony has a place in the professional discourses of science and technology, both play a role in their popular representations. Hyperbole expresses our sense that these achievements exemplify the sublime, a form of experience applied at first to feelings of awe generated by great literature, then in ...


The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi Jan 2018

The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi

Journal of International Technology and Information Management

The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.

This study covers ...


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Using 3 Dimension Health Vegetation Index Point Clouds To Determine Hlb Infected Citrus Trees, Joseph Cerreta, Ashley Hanson, Julianna E. Martorella, Stacy Martorella Jan 2018

Using 3 Dimension Health Vegetation Index Point Clouds To Determine Hlb Infected Citrus Trees, Joseph Cerreta, Ashley Hanson, Julianna E. Martorella, Stacy Martorella

Journal of Aviation/Aerospace Education & Research

Three-dimensional NDVI point clouds can be an innovative method for detecting Huanglongbing (HLB) disease in citrus trees. In February 2018, an Unmanned Aircraft System (UAS) captured narrow-band multispectral images to detect healthiness variations of infected citrus trees. A 30-acre section of a citrus grove in Florida with a known HLB infection was examined to determine if three-dimensional Normalized Difference Vegetation Index (NDVI) point clouds can indicate healthiness variations in HLB-infected citrus trees and how three-dimensional NDVI point clouds compared to two-dimensional NDVI reflectance maps for detecting healthiness variations in HLB-infected citrus trees. Wilcoxon Sign Rank testing compared Whole-Tree Vegetation Indices ...