Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (398)
- Engineering (359)
- Anthropology (286)
- Archaeological Anthropology (279)
- History of Art, Architecture, and Archaeology (277)
-
- Social and Cultural Anthropology (277)
- Public Affairs, Public Policy and Public Administration (258)
- Political Science (239)
- International and Area Studies (227)
- Business (225)
- International Relations (224)
- Defense and Security Studies (221)
- Aerospace Engineering (217)
- Asian Studies (217)
- Aviation (217)
- Aviation and Space Education (216)
- Leadership Studies (216)
- Near and Middle Eastern Studies (215)
- Nuclear Engineering (215)
- Eastern European Studies (214)
- Space Vehicles (214)
- Communication (180)
- Library and Information Science (165)
- Technology and Innovation (165)
- Communication Technology and New Media (158)
- Information Literacy (133)
- Computer Engineering (128)
- Management Information Systems (127)
- Institution
-
- Syracuse University (275)
- University of Nebraska at Omaha (215)
- California State University, San Bernardino (122)
- Bryant University (45)
- George Fox University (32)
-
- Clemson University (24)
- Embry-Riddle Aeronautical University (14)
- Old Dominion University (14)
- University of Massachusetts Boston (14)
- Kansas State University Libraries (11)
- San Jose State University (11)
- Claremont Colleges (9)
- Kennesaw State University (9)
- Purdue University (9)
- University of South Florida (9)
- University of Denver (8)
- Harbin University of Science and Technology (7)
- University of Central Florida (7)
- University of New Hampshire (7)
- University of Rhode Island (7)
- Dordt University (6)
- Nova Southeastern University (4)
- Southern Methodist University (4)
- Stephen F. Austin State University (4)
- The University of Akron (4)
- Universitas Indonesia (4)
- Wilfrid Laurier University (4)
- California Polytechnic State University, San Luis Obispo (3)
- Chinese Academy of Sciences (3)
- Rochester Institute of Technology (3)
- Keyword
-
- Technology (24)
- Ethics (11)
- Science (11)
- Social media (10)
- ToC (10)
-
- Privacy (9)
- Trust (9)
- Internet (8)
- Artificial intelligence (7)
- Cybersecurity (7)
- Collage; artwork; LCS 325 (6)
- Human rights (6)
- Information technology (6)
- Patent (6)
- Secrecy (6)
- Sustainability (6)
- Advocacy (5)
- Culture (5)
- Identity (5)
- Innovation (5)
- Patents (5)
- STEM (5)
- Safety (5)
- Security (5)
- TAM (5)
- Table (5)
- Assessment (4)
- Conflict of interest (4)
- Contents (4)
- Creation (4)
- Publication Year
- Publication
-
- BEADS: Journal of the Society of Bead Researchers (275)
- Space and Defense (214)
- Journal of International Technology and Information Management (122)
- Bryant University Journal of Interdisciplinary Studies (45)
- The Christian Librarian (31)
-
- Journal of the Patent and Trademark Resource Center Association (23)
- Trotter Review (13)
- International Journal of Aviation, Aeronautics, and Aerospace (9)
- The Journal of Sociotechnical Critique (8)
- Human-Machine Communication (7)
- Journal of Applied Communications (7)
- Journal of Science and Technology Management (7)
- RISK: Health, Safety & Environment (1990-2002) (7)
- Secrecy and Society (7)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (6)
- Human Rights & Human Welfare (6)
- Journal of Aviation Technology and Engineering (6)
- Pro Rege (6)
- The African Journal of Information Systems (5)
- CRHR Research Reports (4)
- Journal of Humanistic Mathematics (4)
- Markets, Globalization & Development Review (4)
- Proceedings from the Document Academy (4)
- SMU Data Science Review (4)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (3)
- Genocide Studies and Prevention: An International Journal (3)
- International Journal of Nuclear Security (3)
- Journal of Cybersecurity Education, Research and Practice (3)
- Journal of the Minnesota Academy of Science (3)
- Maine Policy Review (3)
Articles 391 - 420 of 952
Full-Text Articles in Science and Technology Studies
Conference Proceedings Of The 32nd Annual Iima Conference
Conference Proceedings Of The 32nd Annual Iima Conference
Journal of International Technology and Information Management
Conference Proceedings of the 32nd Annual IIMA Conference
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Wireless Mobile Phone Technology, Deregulation Policy, Competition And Economic Welfare In Nigeria’S Telecom Industry: An Analytic Model, Onochie J. Dieli Phd
Journal of International Technology and Information Management
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecomm technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless …
Table Of Contents Jitim Vol 30 Issue 1, 2021
Table Of Contents Jitim Vol 30 Issue 1, 2021
Journal of International Technology and Information Management
Table of Content
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
An Integrated View Of Knowledge Management Enablers, Components, And Benefits: Comprehensive Literature Review, Shuaibu Hassan Usman, Jigish Zaveri, Aminu Hamza
Journal of International Technology and Information Management
The key to success in the 21st century, knowledge-based economy, will be the effective and efficient management of knowledge. Knowledge Management (KM) has a direct impact on organizational success. KM in a knowledge-based economy entails growth, value, and improving living standards through knowledge creation, storage, and dissemination. This study aims to integrate KM enablers, components, and benefits into a single view through a comprehensive literature search. The integrative view of these three factors would facilitate the understanding of KM initiatives within organizations. This paper performs a comprehensive literature review to explain the KM enablers, components, and benefits. From the …
Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra
Exploring Factors Influencing Adoption Of Blockchain In Accounting Applications Using Technology–Organization–Environment Framework, Sujata Seshadrinathan, Shalini Chandra
Journal of International Technology and Information Management
Blockchain is one of the most promising technological innovations of recent times, with the potential to change the very way information systems are used by the accounting function. It is however expected to be disruptive and yet to see high adoption rates. Identification of factors influencing the adoption is required to empower the accounting fraternity to harness the full potential of blockchains. This study is one of the first to inductively explore and develop an adoption model for blockchains as well as for accounting applications with theoretical groundings in the Technology-Organization-Environment (TOE) framework, which has been extended with a variable …
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
An Analysis Of Covid-19 Vaccine Allergic Reactions, Robert Schumaker, Michael Veronin, Trevor Rohm, Rohit Dixit, Shadi Aljawarneh, Juan Lara
Journal of International Technology and Information Management
From our study, all three covid-19 vaccines have a similar proportion of adverse reaction reports in which the patient had a history of allergies. However, the proportion of life-threatening outcomes were lower for those with the Janssen vaccine (0.62% hospitalization rate for Janssen versus 2.59% for Pfizer and 0.60% death for Janssen versus 5.15% for Moderna). In terms of specific allergies, patients with *cillin or sulfa allergies had the most adverse reactions to covid-19 vaccines, however, Janssen again had the lowest percentage of reported deaths (1.39% for *cillin-related allergy deaths for Janssen versus 6.10% for Pfizer). In terms of patient …
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
The Design, Development And Validation Of A Persuasive Content Generator, Sam Khataei, Michael J. Hine, Ali Arya
Journal of International Technology and Information Management
This paper addresses the automatic generation of persuasive content to influence users’ attitude and behaviour. Our research extends current approaches by leveraging individuals’ social media profiles and activity to personalize the persuasive content. Unlike most other implemented persuasive technology, our system is generic and can be adapted to any domain where collections of electronic text are available. Using the Yale Attitude Change approach, we describe: the multi-layered Pyramid of Individualization model; the design, development, and validation of integrated software that can generate individualized persuasive content based on a user’s social media profile and activity. Results indicate the proposed system can …
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Determining Critical Success Factors For Realizing Innovative It Solutions In Higher Education, Anton Meijer
Journal of International Technology and Information Management
There is much research on Critical Success Factors when implementing novel IT solutions in different industries and contexts. However, for the domain of higher education the amount of studies is limited. This is partially due to the fact that what is considered higher education is different across countries. Universities, Universities of Applied Science, Vocational Universities, Polytechnics and related (research) institutes both have similarities and differences. However, one commonality is that institutions in higher education are not sufficiently capable of supporting the development(s) and requirements of educational processes with adequate (innovative) IT. Therefore the purpose of this study is to determine …
Table Of Contents Jitim Vol 29 Issue 4
Table Of Contents Jitim Vol 29 Issue 4
Journal of International Technology and Information Management
table of contents
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Integrating Voice Over Ip Solution In Ipv6 And Ipv4 Networks To Increase Employee Productivity: A Case Study Of Cameroon Telecommunications (Camtel), North-West, Lottin Cyrille Marcel Malobe, Austin Oguejiofor Amaechi
Journal of International Technology and Information Management
Telecommunications organizations have to follow the rapid innovation of technology if they want to face challenges raised by competition. The challenge to respond to the huge market demand of updated products and services from customers requires that the organization‘s working environment be equipped with tools and communication facilities that contribute to ameliorating productivity. Cameroon Telecommunications (Camtel) is facing a digital telephony and Internet Protocol strategic management challenge. Successful implementation cannot be achieved if the employees are still depending on the ageing public switched telephone network (PSTN) as their primary communication system, despite the frequent loss of dial tone experience in …
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Journal of International Technology and Information Management
Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …
Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.
Conflict Resolution In A Multi-Level It-Enabled Outsourcing Network: A Structured Solution Approach, Shreekant Vijaykar, Mahesh Gupta Prof., Pradip Kumar Bhaumik Dr.
Journal of International Technology and Information Management
Using the case study of an Indian Technology and Outsourcing Service Provider, SmartKey (real but renamed company), a technology vendor to a global healthcare provider, this paper analyses offshore outsourcing issues using IT-enabled services to gain deeper insights needed to understand the core conflict and propose a well-reasoned solution approach. Reasoning, the conscious thought process leading to a well-justified decision, is an important managerial skill required for making dynamic decisions, resolving conflicts, and thereby developing human resources. This paper explores Goldratt’s Evaporating Clouds (ECs) as a systematic approach to reasoning in particular, and as a system for developing human resource …
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Overcoming The Downsides Of Personal Internet And Cell Phone Use In The Workplace: An Exploratory Empirical Analysis, Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, Gregory Berry
Journal of International Technology and Information Management
The now taken-for-granted introduction of internet usage into the workplace changed the dynamics of work, productivity, and management, and this is now further complicated by the ubiquitous availability of personal cell phones, going beyond company supplied and (partially) controlled computers with internet connections. This paper studies the connection between internet and cell phone usage by employees and firm productivity. Using primary data collected via a self-reported survey, we conduct an empirical analysis utilizing information based on firm and industry characteristics. Results indicate that the level of non-work-related internet and cell phone usage is significantly associated with firm productivity. Some of …
A Data Driven Approach To Profile Potential Sars-Cov-2 Drug Interactions Using Tylerade, Robert P. Schumaker, Michael A. Veronin, Trevor Rohm, Matthew Boyett, Rohit R. Dixit
A Data Driven Approach To Profile Potential Sars-Cov-2 Drug Interactions Using Tylerade, Robert P. Schumaker, Michael A. Veronin, Trevor Rohm, Matthew Boyett, Rohit R. Dixit
Journal of International Technology and Information Management
We use a data driven approach on a cleaned adverse drug reaction database to determine the reaction severity of several covid-19 drug combinations currently under investigation. We further examine their safety for vulnerable populations such as individuals 65 years and older. Our key findings include 1. hydroxychloroquine/chloroquine are associated with increased adverse drug event severity versus other drug combinations already not recommended by NIH treatment guidelines, 2. hydroxychloroquine/azithromycin are associated with lower adverse drug event severity among older populations, 3. lopinavir/ritonavir had lower adverse reaction severity among toddlers and 4. the combination of azithromycin, hydroxychloroquine and tocilizumab is safer than …
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
The Soft Skills Business Demands Of The Chief Information Security Officer, Richard Smit, Jeroen Van Yperen Hagedoorn, Patric Versteeg, Pascal Ravesteijn
Journal of International Technology and Information Management
While many researchers have investigated soft skills for different roles related to business, engineering, healthcare and others, the soft skills needed by the chief information security officer (CISO) in a leadership position are not studied in-depth. This paper describes a first study aimed at filling this gap.
In this multimethod research, both the business leaders perspective as well as an analysis of CISO job ads is studied. The methodology used to capture the business leaders perspective is via a Delphi study and the jobs adds are studied using a quantitative content analysis.
With an increasing threat to information security for …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
How Digital Leadership Competences And It Capabilities Affect An Organization's Ability To Digitally Transform And Adopt New Technologies, Melissa Brunner, Gabriel Gonzalez-Castañé, Pascal Ravesteijn
Journal of International Technology and Information Management
Although much research has been done into the importance of IT Capabilities (ITC), Digital Leadership (DL) and Digital Transformation (DT) with regard to organizations’ firm performance and ability to thrive in the current digital market, there is little research on qualifying which specific ITC and DL competences affect the success of an organization's DT and ultimately impact their ability to adopt newly emerging technologies. This research aims to address the influence of DL and ITC on DT as well as which specific DL competences and ITC might ultimately affect an organization’s ability to successfully adopt newly emerging digital technologies. Quantitative …
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Analyzing Social Media Implementation In Hospitals In The U.S. Midwest Region, Dalsang Chung, C. Christopher Lee, David Hwang
Journal of International Technology and Information Management
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and …
Analysis On The Negative Emotional, Physiological, And Cognitive Responses Elicited From Of The Activation Of A Stall Alarm, Travis J. Whittemore, Sabrina Woods
Analysis On The Negative Emotional, Physiological, And Cognitive Responses Elicited From Of The Activation Of A Stall Alarm, Travis J. Whittemore, Sabrina Woods
Journal of Aviation/Aerospace Education & Research
Failing to identify an aerodynamic stall can lead to the inability of an aircraft to sustain flight. To warn pilots of an impending or fully-developed stall, many aircraft have safety devices installed to provide visual, aural, and/or kinesthetic (haptic) indicators of the potentially unsafe situation. The stick shaker is one such warning device. Amygdala hijack is the disruptive emotional, physiological, and cognitive response that occurs as a result of stimulus. Colloquially known as a fight-or-flight trigger, amygdala hijack can cause a person to freeze-in-place or can disrupt cognitive function to the point where the person can no longer process available …
Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner
Repellent Surface Applications For Pest Birds, Shelagh T. Deliberto, James C. Carlson, Hailey E. Mclean, Caroline S. Olson, Scott J. Werner
Human–Wildlife Interactions
Common pest birds in the United States include the non-native European starling (Sturnus vulgaris), house sparrow (Passer domesticus), and the pigeon (Columba livia domestica), as well as native birds including Canada geese (Branta canadensis) and gull species (Laridae). Large concentrations of pest birds can create human health hazards and monetary losses due to consumption of crops, depredation, and fecal contamination and accumulation. Fecal contamination hazards include the potential spread of zoonotic diseases including antimicrobial-resistant zoonoses and human injury due to the accumulation of fecal material on walking surfaces. Additionally, fecal accumulation causes …
Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus
Technology Criticism And Data Literacy: The Case For An Augmented Understanding Of Media Literacy, Thomas Knaus
Journal of Media Literacy Education
Reviewing the history of media literacy education might help us to identify how creating media as an approach can contribute to fostering knowledge, understanding technical issues, and to establishing a critical attitude towards technology and data. In a society where digital devices and services are omnipresent and decisions are increasingly based on data, critical analysis must penetrate beyond the “outer shell” of machines – their interfaces – through the technology itself, and the data, and algorithms, which make these devices and services function. Because technology and data constitute the basis of all communication and collaboration, media literate individuals …
Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes
Automating Autism: Disability, Discourse, And Artificial Intelligence, Os Keyes
The Journal of Sociotechnical Critique
As Artificial Intelligence (AI) systems shift to interact with new domains and populations, so does AI ethics: a relatively nascent subdiscipline that frequently concerns itself with questions of “fairness” and “accountability.” This fairness-centred approach has been criticized for (amongst other things) lacking the ability to address discursive, rather than distributional, injustices. In this paper I simultaneously validate these concerns, and work to correct the relative silence of both conventional and critical AI ethicists around disability, by exploring the narratives deployed by AI researchers in discussing and designing systems around autism. Demonstrating that these narratives frequently perpetuate a dangerously dehumanizing model …
“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder
“How Could You Even Ask That?”: Moral Considerability, Uncertainty And Vulnerability In Social Robotics, Alexis Elder
The Journal of Sociotechnical Critique
When it comes to social robotics (robots that engage human social responses via “eyes” and other facial features, voice-based natural-language interactions, and even evocative movements), ethicists, particularly in European and North American traditions, are divided over whether and why they might be morally considerable. Some argue that moral considerability is based on internal psychological states like consciousness and sentience, and debate about thresholds of such features sufficient for ethical consideration, a move sometimes criticized for being overly dualistic in its framing of mind versus body. Others, meanwhile, focus on the effects of these robots on human beings, arguing that psychological …
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith Miller
The Journal of Sociotechnical Critique
Given that the creation and deployment of autonomous vehicles is likely to continue, it is important to explore the ethical responsibilities of designers, manufacturers, operators, and regulators of the technology. We specifically focus on the ethical responsibilities surrounding autonomous vehicles that these stakeholders have to protect the safety of non-occupants, meaning individuals who are around the vehicles while they are operating. The term “non-occupants” includes, but is not limited to, pedestrians and cyclists. We are particularly interested in how to assign moral responsibility for the safety of non-occupants when autonomous vehicles are deployed in a complex, land-based transportation system.
Lab Notes
Scientia
Paleo Showcase; Expert Opinions; School of Nursing Director Appointed; EPISTEM Porject; CSH Honors Award Recipients; Diversity Fellowship
Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal
Electronic Voluntarism Is A Means To Reinforce Voluntary Work, Emad Nazal
Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث
This study examines the concept of E-volunteerism via the modes of information network, as it is a new term in the field of voluntary work and its diverse domains. The study discusses this new practice in terms of meanings and relevance to the scientific progress as well as the current global and technological revolution, particularly the great development in information network (Internet). To achieve this, the study adopted the inductive method and the content analysis of the various related texts. This study also sheds light on the ways people approach E- volunteerism, and devises methods for indi-viduals/groups/institutions to take advantage …
Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson
Countenancing Employment Discrimination: Facial Recognition In Background Checks, Kerri A. Thompson
Texas A&M Law Review
Employing facial recognition technology implicates anti-discrimination law under Title VII of the Civil Rights Act when used as a factor in employment decisions. The very technological breakthroughs that made facial recognition technology commercially viable—data compression and artificial intelligence— also contribute to making facial recognition technology discriminatory in its effect on members of classes protected by Title VII. This Article first explains how facial recognition technology works and its application in employee background checks. Then, it analyzes whether the use of facial recognition technology in background checks violates Title VII under the disparate impact theory of liability due to the known …
Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson
Self-Service Technology And The Impact On Academic Libraries: A Perspective Piece By An Access Services Specialist, Crystal Hutchinson
Kansas Library Association College and University Libraries Section Proceedings
Abstract
Self service technology (SST) is inundating the library world with more efficient forms of service for the library user experience. There are different types of SST and each type creates challenges and opportunities in the academic library. This multi-varied approach provides quality support to users who are unfamiliar with the technology, and offers time expediency to those who are adept at using SST. This persuasive paper will show what Kansas academic libraries currently have in the form of SST and encourage libraries to adopt new methods of service. The goal is to get you excited about SST and relieve …
Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein
Reflections On Bodies And Absences In The Covid-19 Interregnum, Matthew Weinstein
Northwest Journal of Teacher Education
This is a meditation on the role of absence during the COVID-19, especially the ways absences are felt and experienced. It explores the roles of bodies as both symbols and material. Bodies are both thought through the logic of borders and difference but also as the raw resources of scientific investigations. This is all examined within and against “education” both in my and in my students’ (pre and in-service teachers) classes and our anxieties of not knowing the what or how we of our jobs in these conditions.
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Liberty University Journal of Statesmanship & Public Policy
Space is the future for humanity. Whether that is a future of amity and cooperation, or competition and conflict depends in large part to what America makes it. While America cannot afford to entirely abandon cooperation with the world in the final frontier, neither can it afford to cede the advantage in a new field of potential warfare to adversaries in China and Russia. What is needed is a moderate path of competition where necessary and cooperation where beneficial, in order to most fully advance the cause of American national security. By utilizing arms treaties to prevent Chinese domination, while …