Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

4,726 Full-Text Articles 4,349 Authors 2,964,310 Downloads 213 Institutions

All Articles in Communication Technology and New Media

Faceted Search

4,726 full-text articles. Page 145 of 159.

Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University 2011 Philadelphia University

Studies On Taxonomy And Ecology Of Some Fish Larve From The Gulf Of Aqaba, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University 2011 Philadelphia University

تلخيص ونبذة عن كتاب الجراحة التجميلية في الجوانب القانونية والشرعية, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University 2011 Philadelphia University

Quality Evaluation Of Reconstructed Biological Signals, American Journal Of Applied Sciences, 6 (1): 187-193, 2009., Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Guidelines For Teaching These Speech Acts, Philadelphia University 2011 Philadelphia University

Guidelines For Teaching These Speech Acts, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University 2011 Philadelphia University

Exploration And Impacts Of Utilizing Computerized Information Systems Field Study: At The Headquarters Of Jordanian Ministry Of Education, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University 2011 Philadelphia University

Spatial Organization Of The International Tourism Flows In Jordan, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Technical And Legal Analysis Of Comcast’S Network Management Practices, Satish Sunder Rajan Gopal 2011 University of Colorado at Boulder

Technical And Legal Analysis Of Comcast’S Network Management Practices, Satish Sunder Rajan Gopal

Interdisciplinary Telecommunications Graduate Theses & Dissertations

Comcast took a controversial decision by targeting P2P (peer to peer) specific protocols to control congestion in upstream traffic over its network. In 2008, FCC required Comcast to stop and reveal details of their current network management practices that violated Network Neutrality obligations. Many concluded that Comcast’s actions were against Internet Engineering Task Force (IETF) standard. However, rules of network neutrality, a policy statement architected by FCC cannot be enforced. And IETF, a standards body does not control Comcast’s actions. This research focuses on a hypothetical infringement suit which shows how an internet service provider could be liable ...


Understanding Online Knowledge Sharing: An Interpersonal Relationship Perspective, Will W.K. Ma, Allan H. K. Yuen 2011 Hong Kong Shue Yan University

Understanding Online Knowledge Sharing: An Interpersonal Relationship Perspective, Will W.K. Ma, Allan H. K. Yuen

Staff Publications

The unique features and capabilities of online learning are built on the ability to connect to a wider range of learning resources and peer learners that benefit individual learners, such as through discussion forums, collaborative learning, and community building. The success of online learning thus depends on the participation, engagement, and social interaction of peer learners, which leads to knowledge sharing. Thus, without frequent and persistent interaction, it is doubtful whether knowledge sharing can take place in online learning. This study argues that theories about the development and maintenance of social relationships provide a theoretical foundation for understanding the motivation ...


Mobile Application Adoption By Young Adults: A Social Network Perspective, David G. Taylor, Troy A. Voelker, Iryna Pentina 2011 Sacred Heart University

Mobile Application Adoption By Young Adults: A Social Network Perspective, David G. Taylor, Troy A. Voelker, Iryna Pentina

WCOB Faculty Publications

The use of mobile applications, defined as small programs that run on a mobile device and perform tasks ranging from banking to gaming and web browsing, is exploding. Within the past two years, the industry has grown from essentially nothing to a $2 billion marketplace, but adoption rates are still on the rise. Using network theory, this study examines how the adoption of mobile apps among young consumers is influenced by others in their social network. The results suggest that the likelihood of adoption and usage of mobile apps increases with their use by the consumer's strongest relationship partner ...


Social Media And Its Effectiveness In The Political Reform Movement In Egypt, Serajul I. Bhuiyan 2011 Auburn University, Alabama

Social Media And Its Effectiveness In The Political Reform Movement In Egypt, Serajul I. Bhuiyan

Middle East Media Educator

This article examines the role of social media in political and social revolution in Egypt. It reveals how social media enhanced and ignited people’s desire for democracy and socio-economic advancement stalled by the long term authoritarian government. The main focus is on the importance of social media as a platform for discussion of ideas, experiences, and knowledge exchange: The big social media networks like Facebook and Twitter and individual blogs have emerged as powerful channels that allowed people in Egypt to bypass government censorship, spread the words of political reform, and break the barrier of fear. They mobilized millions ...


Deregulation Vs. Reregulation Of Telecommunications: A Clash Of Regulatory Paradigms, Christopher S. Yoo 2011 University of Pennsylvania Law School

Deregulation Vs. Reregulation Of Telecommunications: A Clash Of Regulatory Paradigms, Christopher S. Yoo

Faculty Scholarship at Penn Law

For the past several decades, U.S. policymakers and the courts have charged a largely deregulatory course with respect to telecommunications. During the initial stages, these decisionmakers responded to technological improvements by narrowing regulation to cover only those portions of industry that remained natural monopolies and deregulating those portions that became open to competition. Eventually, Congress began regulating individual network components rather than services, mandating that incumbent local telephone companies provide unbundled access to any network element. As these elements became open to competition, the courts prompted the Federal Communications Commission to release almost the entire network from unbundling obligations ...


Teens Texting And Consequences: A Brief Review, Archana Srinivas, Megan White, Hatim A. Omar 2011 University of Kentucky

Teens Texting And Consequences: A Brief Review, Archana Srinivas, Megan White, Hatim A. Omar

Pediatrics Faculty Publications

The aim of this paper is to summarize the current literature on texting use amongst adolescents. A brief overview will be presented on the prevalence of texting among teenagers, the use of texting for sexting and cyberbullying as well as the dangers of texting while driving. This paper will serve as a brief overview of these topics in order to bring to light the emerging challenges that texting presents to the mental and physical well-being of adolescents in an effort to evoke further discussion regarding the need for increasing awareness and education to parents, educators, law makers and health care ...


Cosmopolitanism And Suppression Of Cyber-Dissent In The Caucasus: Obstacles And Opportunities For Social Media And The Web, Brian J. Bowe, Michigan State University, Robin Blom 2011 Western Washington University

Cosmopolitanism And Suppression Of Cyber-Dissent In The Caucasus: Obstacles And Opportunities For Social Media And The Web, Brian J. Bowe, Michigan State University, Robin Blom

Journalism

Around the world, social media offer an informal virtual space for citizens who feel disenfranchised to connect socially. But for those who live in countries such as the three former Soviet republics of the Caucasus — where free expression is curtailed and official news outlets are under government censorship — information and communication technology (ICT) offers an increasingly important alternative vehicle for political expression. Recent developments in Tunisia, Egypt, and Iran demonstrate how blogging and social media tools may fulfill a crucial role for non-journalists and oppositional groups that journalism serves in more democratic societies. This article considers the use of ICT ...


Technologies Of Control And The Future Of The First Amendment, Christopher S. Yoo 2011 University of Pennsylvania Law School

Technologies Of Control And The Future Of The First Amendment, Christopher S. Yoo

Faculty Scholarship at Penn Law

The technological context surrounding the Supreme Court’s landmark decision in FCC v. Pacifica Foundation allowed the Court to gloss over the tension between two rather disparate rationales. Those adopting a civil libertarian view of free speech could support the decision on the grounds that viewers’ and listeners’ inability to filter out unwanted speech exposed them to content that they did not wish to see or hear. At the same time, Pacifica also found support from those who more paternalistically regard indecency as low value (if not socially harmful) speech that is unworthy of full First Amendment protection. The arrival ...


Are Technical Difficulties At The Supreme Court Causing A 'Disregard Of Duty'?, Mark Grabowski 2011 Adelphi University

Are Technical Difficulties At The Supreme Court Causing A 'Disregard Of Duty'?, Mark Grabowski

Communications Faculty Publications

No abstract provided.


Pervasive Image Capture And The First Amendment: Memory, Discourse, And The Right To Record, Seth F. Kreimer 2011 University of Pennsylvania

Pervasive Image Capture And The First Amendment: Memory, Discourse, And The Right To Record, Seth F. Kreimer

Faculty Scholarship at Penn Law

As digital image technology proliferates in camera phones, iPhones, and PDAs, almost any image we observe can be costlessly recorded, freely reproduced and instantly transmitted. We live, relate, work, and decide in an environment in which pervasive image capture from life is routine. During the last half decade, captured images have come to underpin crucial elements of ongoing private and public discourse; digital image capture has become a ubiquitous adjunct to memory and a pervasively accepted mode of connection and correspondence. Digitally captured images precipitate conflicts between government authority and free expression. From efforts to suppress cell phone videos of ...


Narrowing The Digital Divide: The Young Women Leaders Program Herstory Project, Stephanie Newton, Emily Peters, Victoria Tucker, Christine Quilpa, Edith Lawrence, Clare Vierbuchen 2011 University of Virginia

Narrowing The Digital Divide: The Young Women Leaders Program Herstory Project, Stephanie Newton, Emily Peters, Victoria Tucker, Christine Quilpa, Edith Lawrence, Clare Vierbuchen

VA Engage Journal

Research suggests that girls are at especial disadvantage in the field of informational technology and are less likely than boys to take courses or seek out careers in this area. The Young Women Leaders Program (YWLP), a mentoring program at the University of Virginia that pairs at-risk middle school girls with college women for a year of mentoring, developed the YWLP HerStory project to engage middle school girls in informational technology through their development of technology projects focused on psychosocial issues of importance to them. This study reviewed an early version of the YWLP HerStory’s technology curriculum and training ...


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo 2011 University of Pennsylvania

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

Faculty Scholarship at Penn Law

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the ...


Maintaining Relationships: Facebook's Affect On Long-Distance Friendships, Steven-Paul Lapid 2011 Eastern Michigan University

Maintaining Relationships: Facebook's Affect On Long-Distance Friendships, Steven-Paul Lapid

Senior Honors Theses

Technological advancements in media have made it easier to maintain relationships over long distances. Social networking interfaces and websites such as Facebook have changed the way people communicate in geographically separated relationships. However, is this new technology improving or hindering communication and the maintenance of these relationships? In this exploratory study, self reports of FAcebook users and nonusers are analyzed to examine the effect social networking technology has on relational maintenance and satisfaction. Participants reported their general use of Facebook and reported the quality of their relationships with long-distant acquaintances. This report provides new research opportunities in this growing field ...


Subjective Evaluation Of Data Checking Techniques, Cyndy Anang 2011 University of Nevada, Las Vegas

Subjective Evaluation Of Data Checking Techniques, Cyndy Anang

McNair Poster Presentations

The aim of this research was to analyze people's subjective opinions about the data checking techniques double entry, visual checking, and read aloud. Previous research has shown that entering data twice is more effective in reducing the data entry errors. Thus, the research aims to hypothesize that participants would perceive the double entry technique as most accurate and reliable. A total of forty-eight undergraduate students answered a set of sixteen items which were used to gather participants' opinions on the three techniques. The results showed that the double entry technique was perceived as significantly more accurate (F (2, 47 ...


Digital Commons powered by bepress