Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Communication Technology and New Media

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 39

Full-Text Articles in Science and Technology Studies

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee Dec 2016

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee

Kno.e.sis Publications

We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …


Jitim Volume 25 Issue 3 - Front Page Nov 2016

Jitim Volume 25 Issue 3 - Front Page

Journal of International Technology and Information Management

JITIM volume 25, issue 3


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe Aug 2016

Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe

Master's Theses

The purpose of this study was to gain an understanding of what motivated college students—the Unplugged Students—to intentionally use their cell phones less and how they understood the impact that unplugging had on their interpersonal relationships and college experience. Nine undergraduate college students from four private schools were interviewed in one-on-one semi- structured interviews. These students, considered non-users, provided a particularly useful perspective as these students made a conscious choice to counteract social norms and experienced both being plugged in and unplugged. Cell phones and the act of unplugging proved to make up a complex and more nuanced topic than …


Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth Aug 2016

Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

350 million people are suffering from clinical depression worldwide.


What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow Jul 2016

What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow

Kno.e.sis Publications

– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


Why Does Film And Television Sci-Fi Tend To Portray Machines As Being Human?, Edward Brennan Jun 2016

Why Does Film And Television Sci-Fi Tend To Portray Machines As Being Human?, Edward Brennan

Conference Papers

This paper identifies, and attempts to explain, a lack of diversity in the way that cinema and television science fiction represents robotics and artificial intelligence (AI). Through a qualitative content analysis of recent film and television portrayals, it is argued, that a limited and limiting vision predominates. This limitation may serve to ideologically reinforce the power of corporate elites. It may also hamper discussion and debate around technological possibilities and their relationship with society.

There has been a slew of entertainment productions since 2013 that represent AI and robotics. This work examines Her (2013), Transcendence (2014), Interstellar (2014), Chappie (2015), …


Bryn Mawr Digital Competencies Framework, Bryn Mawr College May 2016

Bryn Mawr Digital Competencies Framework, Bryn Mawr College

Blended Learning Research and Open Educational Resources

The digital competencies outlined here are the fruits of both top-down and bottom-up initiatives at Bryn Mawr College. The Board of Trustees' Digital Bryn Mawr Task Force Report has charged Library and Information Technology Services and the College generally with ensuring that students develop the digital competencies needed to succeed in and beyond college. In 2014, Bryn Mawr College received a three-year, $800,000 grant from the Mellon foundation to create curricular and co-curricular opportunities for students to develop these competencies. In working with faculty and students on projects supported by that grant, members of the Educational Technology Services team began …


The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger Apr 2016

The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger

School of Public Policy Working Papers

This report examines the great progress made in availability and adoption in the broadband market over the past few decades and shows how Californian residents and businesses have come to use broadband widely. The policy issues involved with continuing the tremendous strides already made are discussed, along with recommendations for policy-makers.

The report begins by documenting the rapid growth of Internet usage in the U.S. and California. There is a review of the current state of competition in voice and broadband markets, discussing the decline of traditional telephone service, which is rapidly approaching irrelevance, and the rise of wireless and …


Do We Really Need More 'Stuff'?, Michael Bass Apr 2016

Do We Really Need More 'Stuff'?, Michael Bass

UCF Forum

Since most people are busy acquiring more and more things, it may be past time to start thinking about the question: Do we really need more “stuff”? However, it can’t be too late if “stuff” is defined properly.


Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson Mar 2016

Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson

Kno.e.sis Publications

Unlike machine-centric computing, in which efficient data processing takes precedence over contextual tailoring, human-centric computation provides a personalized data interpretation that most users find highly relevant to their needs. The authors show how semantic, cognitive, and perceptual computing paradigms work together to produce actionable information.


The New Reflexivity: Puzzle Films, Found Footage, And Cinematic Narration In The Digital Age, Jordan Lavender-Smith Feb 2016

The New Reflexivity: Puzzle Films, Found Footage, And Cinematic Narration In The Digital Age, Jordan Lavender-Smith

Dissertations, Theses, and Capstone Projects

“The New Reflexivity” tracks two narrative styles of contemporary Hollywood production that have yet to be studied in tandem: the puzzle film and the found footage horror film. In early August 1999, near the end of what D.N. Rodowick refers to as “the summer of digital paranoia,” two films entered the wide-release U.S. theatrical marketplace and enjoyed surprisingly massive financial success, just as news of the “death of film” circulated widely. Though each might typically be classified as belonging to the horror genre, both the unreliable “puzzle film” The Sixth Sense and the fake-documentary “found footage film” The Blair Witch …


Modeling Intermediary Satisfaction With Mandatory Adoption Of E-Government Technologies For Food Distribution, Shweta Chopra, Prashant Rajan Jan 2016

Modeling Intermediary Satisfaction With Mandatory Adoption Of E-Government Technologies For Food Distribution, Shweta Chopra, Prashant Rajan

Prashant Rajan

We report quantitative measures of factors that inºuence technology acceptance among intermediaries delivering
government-supplied essential commodities to citizens in Chhattisgarh, India. Using the method of partial least
squares, we validate and extend the Uniªed Theory of Acceptance and Use of Technology, ªnding evidence for
the effect of social inºuence, performance expectancy, and effort expectancy on salespersons’ satisfaction with the
adoption of point-of-sale machines mandated by the Chhattisgarh government. Further, the moderating effects of
age, experience with technology, work experience, and educational attainment on the factors that inºuence satisfaction are assessed. Key recommendations are drawn for research and practice on intermediation …


Exploratory Study Of The Adoption And Use Of The Smartphone Technology In Emerging Regions: Case Of Saudi Arabia, Fahad Abdulaziz Aldhaban Jan 2016

Exploratory Study Of The Adoption And Use Of The Smartphone Technology In Emerging Regions: Case Of Saudi Arabia, Fahad Abdulaziz Aldhaban

Dissertations and Theses

Users' acceptance of a new information technology (IT) is considered to be a key determinant factor of its success. Also, studying users' adoption and use of new IT plays an important role in determining users' needs and reducing business risk, especially in industry segments with rapid changes in IT such as Smartphone technology. Such rapid evolution is influencing consumers' behaviors, their daily lifestyle, the manner of conducting their activities and their ways of consuming and using information.

Smartphone technology holds a promising future with an expected global market that could reach US $258 billion by the end of year 2015 …


Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris Jan 2016

Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris

Department of Family Therapy Dissertations and Applied Clinical Projects

The popular Social Networking Site, Facebook, offers its users the ability tocommunicate with others from all over the globe. Individuals can create a virtual identity for themselves enabling members to call, message, and locate others in a matter of seconds. The number of Facebook users appears to increase; yet, the number of members who die daily is not normally accounted. Facebook now permits the memorialization ofthe deceased’s profile. This allows members to continue commenting, sharing photos and videos, and visiting the deceased’s Facebook page. This trend led to the central question of this study, “What benefits, if any, are individuals …


Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano Jan 2016

Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano

Kno.e.sis Publications

The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …


Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo Jan 2016

Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …


Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu Jan 2016

Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu

Journal of International Technology and Information Management

To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.


The Future Of Arabic Music: No Sound Without Silence, Nesma Magdy Khodier Vcuq Jan 2016

The Future Of Arabic Music: No Sound Without Silence, Nesma Magdy Khodier Vcuq

Theses and Dissertations

For centuries, Arabic music has been intrinsically linked to Arab culture and by extension bonded to the environmental landscape of the region, reflecting their emotions, moods, and behaviors. Numerous technological advancements in the latter half of the twentieth century, have greatly affected the rich legacy of Arabic music, significantly impacting the natural progression of traditional Arabic musical genres, scales, and instrumentation.

This thesis serves as an introduction to generative methods of music production, specifically music generated through gestures. Through generative music, and its unique ability to map gestures to different musical parameters, music can be produced using computer algorithms.

The …


A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth Jan 2016

A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth

Kno.e.sis Publications

The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:

1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.

The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …