Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data mining (2)
- Facebook (2)
- Internet (2)
- Social Media (2)
- Technology (2)
-
- Absence of per-flow state (1)
- Activity Detection (1)
- Analytics (1)
- Analytics Adoption (1)
- And principal component analysis (PCA) (1)
- Application Software (1)
- Arabic Music (1)
- Area Under Curve (1)
- Artificial intelligence (1)
- Assessment (1)
- Association rule (1)
- Bandwidth constraints (1)
- Broadband (1)
- Business Benefits (1)
- Business Education (1)
- CEO turnover (1)
- CGI (1)
- COREPDS (1)
- California (1)
- Cell phone (1)
- Changes (1)
- China (1)
- Classifier (1)
- Cloud Computing (1)
- College student (1)
- Publication
-
- Journal of International Technology and Information Management (19)
- Kno.e.sis Publications (7)
- Prashant Rajan (2)
- All Faculty Scholarship (1)
- Blended Learning Research and Open Educational Resources (1)
-
- Conference Papers (1)
- Dan Mellamphy (1)
- Department of Family Therapy Dissertations and Applied Clinical Projects (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Master's Theses (1)
- School of Public Policy Working Papers (1)
- Theses and Dissertations (1)
- UCF Forum (1)
- Publication Type
Articles 1 - 30 of 39
Full-Text Articles in Science and Technology Studies
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Kno.e.sis Publications
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …
Jitim Volume 25 Issue 3 - Front Page
Jitim Volume 25 Issue 3 - Front Page
Journal of International Technology and Information Management
JITIM volume 25, issue 3
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang
Journal of International Technology and Information Management
With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman
Journal of International Technology and Information Management
Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao
Journal of International Technology and Information Management
This research studies attitude and readiness of STEM majoring and success with
the data from a survey with a total of 501 viable responses, with respect to STEM
(science, technology, engineering, and mathematics) related majors that are
essential and fundamental to skills relevant to big data business analytics.
Recruiting and keeping students in STEM areas have attracted a large body of
attention in pedagogical studies. An effective way of achieving such a goal is to
show them how rewarding and self-fulfilling STEM careers can be toward
perspective students. One example of the abundance of STEM careers is the rapid
growth …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy
Journal of International Technology and Information Management
The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …
Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe
Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe
Master's Theses
The purpose of this study was to gain an understanding of what motivated college students—the Unplugged Students—to intentionally use their cell phones less and how they understood the impact that unplugging had on their interpersonal relationships and college experience. Nine undergraduate college students from four private schools were interviewed in one-on-one semi- structured interviews. These students, considered non-users, provided a particularly useful perspective as these students made a conscious choice to counteract social norms and experienced both being plugged in and unplugged. Cell phones and the act of unplugging proved to make up a complex and more nuanced topic than …
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth
Kno.e.sis Publications
350 million people are suffering from clinical depression worldwide.
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow
Kno.e.sis Publications
– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown
Journal of International Technology and Information Management
Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar
Journal of International Technology and Information Management
The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee
Journal of International Technology and Information Management
Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong
Journal of International Technology and Information Management
Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa
Journal of International Technology and Information Management
Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …
Why Does Film And Television Sci-Fi Tend To Portray Machines As Being Human?, Edward Brennan
Why Does Film And Television Sci-Fi Tend To Portray Machines As Being Human?, Edward Brennan
Conference Papers
This paper identifies, and attempts to explain, a lack of diversity in the way that cinema and television science fiction represents robotics and artificial intelligence (AI). Through a qualitative content analysis of recent film and television portrayals, it is argued, that a limited and limiting vision predominates. This limitation may serve to ideologically reinforce the power of corporate elites. It may also hamper discussion and debate around technological possibilities and their relationship with society.
There has been a slew of entertainment productions since 2013 that represent AI and robotics. This work examines Her (2013), Transcendence (2014), Interstellar (2014), Chappie (2015), …
Bryn Mawr Digital Competencies Framework, Bryn Mawr College
Bryn Mawr Digital Competencies Framework, Bryn Mawr College
Blended Learning Research and Open Educational Resources
The digital competencies outlined here are the fruits of both top-down and bottom-up initiatives at Bryn Mawr College. The Board of Trustees' Digital Bryn Mawr Task Force Report has charged Library and Information Technology Services and the College generally with ensuring that students develop the digital competencies needed to succeed in and beyond college. In 2014, Bryn Mawr College received a three-year, $800,000 grant from the Mellon foundation to create curricular and co-curricular opportunities for students to develop these competencies. In working with faculty and students on projects supported by that grant, members of the Educational Technology Services team began …
The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger
The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger
School of Public Policy Working Papers
This report examines the great progress made in availability and adoption in the broadband market over the past few decades and shows how Californian residents and businesses have come to use broadband widely. The policy issues involved with continuing the tremendous strides already made are discussed, along with recommendations for policy-makers.
The report begins by documenting the rapid growth of Internet usage in the U.S. and California. There is a review of the current state of competition in voice and broadband markets, discussing the decline of traditional telephone service, which is rapidly approaching irrelevance, and the rise of wireless and …
Do We Really Need More 'Stuff'?, Michael Bass
Do We Really Need More 'Stuff'?, Michael Bass
UCF Forum
Since most people are busy acquiring more and more things, it may be past time to start thinking about the question: Do we really need more “stuff”? However, it can’t be too late if “stuff” is defined properly.
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Semantic, Cognitive, And Perceptual Computing: Paradigms That Shape Human Experience, Amit P. Sheth, Pramod Anantharam, Cory Henson
Kno.e.sis Publications
Unlike machine-centric computing, in which efficient data processing takes precedence over contextual tailoring, human-centric computation provides a personalized data interpretation that most users find highly relevant to their needs. The authors show how semantic, cognitive, and perceptual computing paradigms work together to produce actionable information.
The New Reflexivity: Puzzle Films, Found Footage, And Cinematic Narration In The Digital Age, Jordan Lavender-Smith
The New Reflexivity: Puzzle Films, Found Footage, And Cinematic Narration In The Digital Age, Jordan Lavender-Smith
Dissertations, Theses, and Capstone Projects
“The New Reflexivity” tracks two narrative styles of contemporary Hollywood production that have yet to be studied in tandem: the puzzle film and the found footage horror film. In early August 1999, near the end of what D.N. Rodowick refers to as “the summer of digital paranoia,” two films entered the wide-release U.S. theatrical marketplace and enjoyed surprisingly massive financial success, just as news of the “death of film” circulated widely. Though each might typically be classified as belonging to the horror genre, both the unreliable “puzzle film” The Sixth Sense and the fake-documentary “found footage film” The Blair Witch …
Modeling Intermediary Satisfaction With Mandatory Adoption Of E-Government Technologies For Food Distribution, Shweta Chopra, Prashant Rajan
Modeling Intermediary Satisfaction With Mandatory Adoption Of E-Government Technologies For Food Distribution, Shweta Chopra, Prashant Rajan
Prashant Rajan
Exploratory Study Of The Adoption And Use Of The Smartphone Technology In Emerging Regions: Case Of Saudi Arabia, Fahad Abdulaziz Aldhaban
Exploratory Study Of The Adoption And Use Of The Smartphone Technology In Emerging Regions: Case Of Saudi Arabia, Fahad Abdulaziz Aldhaban
Dissertations and Theses
Users' acceptance of a new information technology (IT) is considered to be a key determinant factor of its success. Also, studying users' adoption and use of new IT plays an important role in determining users' needs and reducing business risk, especially in industry segments with rapid changes in IT such as Smartphone technology. Such rapid evolution is influencing consumers' behaviors, their daily lifestyle, the manner of conducting their activities and their ways of consuming and using information.
Smartphone technology holds a promising future with an expected global market that could reach US $258 billion by the end of year 2015 …
Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris
Social Grief: A Grounded Theory Of Utilizing Status Updates On Facebook As A Contemporary Ritual, Celese Catania-Opris
Department of Family Therapy Dissertations and Applied Clinical Projects
The popular Social Networking Site, Facebook, offers its users the ability tocommunicate with others from all over the globe. Individuals can create a virtual identity for themselves enabling members to call, message, and locate others in a matter of seconds. The number of Facebook users appears to increase; yet, the number of members who die daily is not normally accounted. Facebook now permits the memorialization ofthe deceased’s profile. This allows members to continue commenting, sharing photos and videos, and visiting the deceased’s Facebook page. This trend led to the central question of this study, “What benefits, if any, are individuals …
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Building The Web Of Knowledge With Smart Iot Applications, Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano
Kno.e.sis Publications
The Internet of Things (IoT) is experiencing fast adoption because of its positive impact to change all aspects of our lives, from agriculture in rural areas, to health and wellness, to smart home and smart-x applications in cities. The development of IoT applications and deployment of smart IoT-based solutions is just starting; smart IoT applications will modify our physical world and our interaction with cyber spaces, from how we remotely control appliances at home to how we care for patients or elderly persons. The massive deployment of IoT devices represents a tremendous economic impact and at the same time offers …
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Healthcare System-Use Behavior: A Systematic Review Of Its Determinants, Jiming Wu
Journal of International Technology and Information Management
To understand patient and physician behavior, researchers have investigated the determinants of using healthcare information systems. Although this stream of research has produced important findings, it has yet to appreciably advance our understanding of system-use behavior in healthcare. To fill this gap, the current paper employs a systematic review to synthesize past research, reveal the key determinants of healthcare system usage, and illuminate a deeper understanding of the topic. This study thus helps healthcare researchers expand their baseline knowledge of these core determinants and conduct more fruitful future research on system-use behavior in healthcare.
The Future Of Arabic Music: No Sound Without Silence, Nesma Magdy Khodier Vcuq
The Future Of Arabic Music: No Sound Without Silence, Nesma Magdy Khodier Vcuq
Theses and Dissertations
For centuries, Arabic music has been intrinsically linked to Arab culture and by extension bonded to the environmental landscape of the region, reflecting their emotions, moods, and behaviors. Numerous technological advancements in the latter half of the twentieth century, have greatly affected the rich legacy of Arabic music, significantly impacting the natural progression of traditional Arabic musical genres, scales, and instrumentation.
This thesis serves as an introduction to generative methods of music production, specifically music generated through gestures. Through generative music, and its unique ability to map gestures to different musical parameters, music can be produced using computer algorithms.
The …
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
A Study Of Social Web Data On Buprenorphine Abuse Using Semantic Web Technology, Raminta Daniulaityte, Amit P. Sheth
Kno.e.sis Publications
The Specific Aims of this application are to use a paradigmatic approach that combines Semantic Web technology, Natural Language Processing and Machine Learning techniques to:
1) Describe drug users’ knowledge, attitudes, and behaviors related to the non-medical use of Suboxone and Subutex as discussed on Web-based forums.
2) Identify and describe temporal patterns of non-medical use of Suboxone and Subutex as discussed on Web-based forums.
The research was carried out by an interdisciplinary team of members of the Center for Interventions, Treatment and Addictions Research (CITAR) and the Ohio Center of Excellence in Knowledge- enabled Computing (Kno.e.sis) at Wright State …