Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,336 Full-Text Articles 4,636 Authors 698,271 Downloads 88 Institutions

All Articles in Science and Technology Studies

Faceted Search

3,336 full-text articles. Page 1 of 108.

The Beginning Of Digital Wisdom, Michael J. Paulus Jr., Ryan Ingersoll 2015 Seattle Pacific University

The Beginning Of Digital Wisdom, Michael J. Paulus Jr., Ryan Ingersoll

Michael J. Paulus Jr.

Marc Prensky, who popularized the term “digital natives” more than ten years ago, now emphasizes the need for “digital wisdom”: using digital technologies wisely to become wiser. Recent research reveals that so-called digital natives are often “digital naïves”—familiarity with digital technologies does not translate into facility with them. Incoming college students report declining confidence in their computer skills and report very modest improvements by the time they graduate. Employers report deficiencies in the technological skills of college graduates and, perhaps most troubling, studies of youth and young adults show that ethical and moral reasoning does not extend much beyond ...


The Beginning Of Digital Wisdom, Michael J. Paulus Jr., Ryan Ingersoll 2015 Seattle Pacific University

The Beginning Of Digital Wisdom, Michael J. Paulus Jr., Ryan Ingersoll

SPU Works

Marc Prensky, who popularized the term “digital natives” more than ten years ago, now emphasizes the need for “digital wisdom”: using digital technologies wisely to become wiser. Recent research reveals that so-called digital natives are often “digital naïves”—familiarity with digital technologies does not translate into facility with them. Incoming college students report declining confidence in their computer skills and report very modest improvements by the time they graduate. Employers report deficiencies in the technological skills of college graduates and, perhaps most troubling, studies of youth and young adults show that ethical and moral reasoning does not extend much beyond ...


Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens 2015 University of Twente

Not Just A Tool. Taking Context Into Account In The Development Of A Mobile App For Rural Water Supply In Tanzania, Robert Hoppe, Anne Wesselink, Rob Lemmens

Robert Hoppe

The 'eGovernance' hype around the potential of mobile phone and geoweb technologies for enhancing 'good governance' is soaring. In East Africa, the extensive use of mobile telephony adds to the imagined promises of ICT. We reflect on the assumptions made by the proponents of such tools, using our own action research project as an example. We took great care to consider context in the development of software for enhancing empowerment and accountability in rural water supply in Tanzania. However, we found that the rural water supply context in Tanzania is much more complex than the contexts for which successful mApps ...


"Time For Dabs": Analyzing Twitter Data On Butane Hash Oil Use, Raminta Daniulaityte, Robert G. Carlson, Farahnaz Golroo, Sanjaya Wijeratne, Edward W. Boyer, Silvia S. Martins, Ramzi W. Nahhas, Amit P. Sheth 2015 Wright State University - Main Campus

"Time For Dabs": Analyzing Twitter Data On Butane Hash Oil Use, Raminta Daniulaityte, Robert G. Carlson, Farahnaz Golroo, Sanjaya Wijeratne, Edward W. Boyer, Silvia S. Martins, Ramzi W. Nahhas, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin 2015 Wright State University - Main Campus

Analyzing The Social Media Footprint Of Street Gangs, Sanjaya Wijeratne, Derek Doran, Amit P. Sheth, Jack Dustin

Kno.e.sis Publications

Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations. This paper presents the architecture of a modern platform to discover the structure, function, and operation of gangs through the lens of social media. Preliminary analysis of social media posts shared in the greater Chicago, IL region demonstrate the platform ...


Big Data And Smart Cities, Amit P. Sheth 2015 Wright State University - Main Campus

Big Data And Smart Cities, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.


Creativity In Scientific Teams: Unpacking Novelty And Impact, You-Na Lee, John P. Walsh, Jian Wang 2015 Georgia Institute of Technology - Main Campus

Creativity In Scientific Teams: Unpacking Novelty And Impact, You-Na Lee, John P. Walsh, Jian Wang

Jian Wang

The increasing dominance of team science highlights the importance of understanding the effects of team composition on the creativity of research results. In this paper, we analyze the effect of team size, and field and task variety on creativity. Furthermore, we unpack two facets of creativity in science: novelty and impact. We find that increasing team size has an inverted-U shaped relation with novelty. We also find that the size–novelty relationship is largely due to the relation between size and team field or task variety, consistent with the information processing perspective. On the other hand, team size has a ...


Talking To Ourselves: Internal Communication Strategies For Reference Services, John Gottfried, Laura DeLancey, Amanda Hardin 2015 Western Kentucky University

Talking To Ourselves: Internal Communication Strategies For Reference Services, John Gottfried, Laura Delancey, Amanda Hardin

DLTS Faculty Publications

At many academic libraries, spiral notebooks and three ring binders have given way to blogs and wikis as a means of facilitating communication at the reference desk. Western Kentucky University Libraries opted instead to create a custom internal website to log reference transactions, highlight current issues, and manage scheduling changes. This solution incorporated numerous platforms and technologies, including LibGuides, Facebook, and Google Calendar. It avoided some of the pitfalls described in the literature, such as relying too heavily on user-generated content, and has been successful largely because it is embedded in the reference workspace and contains features that librarians will ...


Documentation Of Caddo Ceramic Vessels In The Texas Parks And Wildlife Department Holdings From Goliad State Park, Timothy K. Perttula, Robert Z. Selden Jr. 2015 Archeological & Environmental Consultants, LLC

Documentation Of Caddo Ceramic Vessels In The Texas Parks And Wildlife Department Holdings From Goliad State Park, Timothy K. Perttula, Robert Z. Selden Jr.

CRHR Research Reports

On February 6, 2015, three Caddo vessels from an unknown site or sites were documented at the Texas Parks and Wildlife Department’s Archeology Laboratory, where the standard suite of metadata was collected, accompanied by photographs and 3D models of each vessel. While the donor of these vessels remains unknown, stylistic and technological attributes can be used to posit the potential region of origin.

There are three 3D models included in this report of NAGPRA documentation. To manipulate, measure, and otherwise quantify variability in the models, this document must be downloaded, then opened in either Adobe Acrobat or Adobe Reader ...


Introducing Crhr Research Reports, Robert Z. Selden Jr. 2015 Center for Regional Heritage Research, Stephen F. Austin State University

Introducing Crhr Research Reports, Robert Z. Selden Jr.

CRHR Research Reports

Intruduction to CRHR Research Reports.


What Is An Emerging Technology?, Daniele Rotolo, Diana Hicks, Ben Martin 2015 Sussex University

What Is An Emerging Technology?, Daniele Rotolo, Diana Hicks, Ben Martin

Diana Hicks

Despite the growing interest around the emergence of novel technologies, especially from the policy-making perspective, there is still no consensus on what classifies a technology as ’emergent’. The present paper aims to fill this gap by developing a definition of ’emerging technologies’ and a framework for their detection and analysis. The definition is developed by combining a basic understanding of the term and in particular the concept of ’emergence’ with a review of key innovation studies dealing with definitional issues of technological emergence. The resulting definition identifies five attributes that feature in the emergence of novel technologies. These are: (i ...


Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman 2015 Purdue University

Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The U.S. Government faces acute budgetary deficits and national debt problems in the Obama Administration. These problems have been brought about by decades of unsustainable government spending affecting all agencies including the National Aeronautics and Space Administration. (NASA). An outgrowth of this fiscal profligacy is the presence of wasteful and duplicative programs within NASA that prevent this agency from achieving its space science and human spaceflight objectives. These problems occur due to mismanagement of these programs from NASA and the creation of these programs by the U.S. Congress and congressional committees. This occurs because congressional appropriators tend to ...


Virtual Conference And Meeting Systems: Resources For Online Connections, John Gottfried, Laura DeLancey, Carol L. Watwood, Amanda Hardin 2015 Western Kentucky University

Virtual Conference And Meeting Systems: Resources For Online Connections, John Gottfried, Laura Delancey, Carol L. Watwood, Amanda Hardin

DLTS Faculty Publications

Librarians have always tried to stretch the limits of applicable technologies to create effective connections among researchers and resources. We thrive on the tools and tactics that help us do this, and we are always on the prowl for newer, better alternatives. This is one of the best ways we have of keeping high service standards in the face of shrinking budgets and skeletal staffing. Fortunately, there have never been so many technologies to choose from, and there have never been so many challenges calling out for technological intervention.

Hosting online instruction sessions is, for example, an excellent opportunity for ...


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo 2015 University of Pennsylvania Law School

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two ...


Human Factors Considerations In Autonomous Lethal Unmanned Aerial Systems, Kristine Kiernan 2015 Embry-Riddle Aeronautical University - Daytona Beach

Human Factors Considerations In Autonomous Lethal Unmanned Aerial Systems, Kristine Kiernan

Aviation / Aeronautics / Aerospace International Research Conference

The United States military is committed to the development of complete autonomy in unmanned vehicles, including armed unmanned aerial systems (UAS). The design and deployment of autonomous lethal UAS raises ethical issues that have implications for human factors. System design, procedures, and training will be impacted by the advent of autonomous lethal UAS. This paper will define relevant vocabulary, review the literature on robot ethics as it applies to the military setting, discuss various perspectives in the research community, address levels of UAS autonomy, and discuss implications for operator training, responsibility, and human-machine interaction. Familiarity with these ethical issues and ...


Unmanned Insecurity: The Safety And Privacy Issues Of Unmanned Aircraft Information Assurance, Donna A. Dulo Ph.D. 2015 Embry-Riddle Aeronautical University - Worldwide

Unmanned Insecurity: The Safety And Privacy Issues Of Unmanned Aircraft Information Assurance, Donna A. Dulo Ph.D.

Aviation / Aeronautics / Aerospace International Research Conference

Information assurance and computer security are foundational paradigms in ground based information systems. However, in the aerial realm of unmanned systems, information security often takes the proverbial back seat to high visibility issues such as safety and privacy. Yet, a secure unmanned aircraft is a basic tenant of safety and privacy in the operational arena. Information assurance and security that are enveloped into an unmanned aircraft protect the systems data, communications, as well as internal operations and permeates not only the aircraft’s systems, but also the system’s interactions with satellites, ground stations, and other aerial entities that share ...


Scientific Teams: Self-Assembly, Fluidness, And Interdependence, Jian Wang, Diana Hicks 2015 Katholieke Universiteit Leuven

Scientific Teams: Self-Assembly, Fluidness, And Interdependence, Jian Wang, Diana Hicks

Jian Wang

Science is increasingly produced in collaborative teams, but collaborative teams in science are self-assembled and fluid. Such characteristics call for a network approach to account for external activities responsible for team product but taking place beyond closed team boundaries in the open network. Given such characteristics of collaborative teams in science, we empirically test the interdependence between collaborative teams in the same network. Specifically, using fixed effects Poisson models and panel data of 1310 American scientists’ life-time publication histories, we demonstrate knowledge spillovers from new collaborators to other teams not involving these new collaborators. Our findings have important implications for ...


A Subspace Projection Approach For Wall Clutter Mitigation In Through-The-Wall Radar Imaging, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness Amin 2015 University of Wollongong

A Subspace Projection Approach For Wall Clutter Mitigation In Through-The-Wall Radar Imaging, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness Amin

Faculty of Engineering and Information Sciences - Papers

One of the main challenges in through-the-wall radar imaging (TWRI) is the strong exterior wall returns, which tend to obscure indoor stationary targets, rendering target detection and classification difficult, if not impossible. In this paper, an effective wall clutter mitigation approach is proposed for TWRI that does not require knowledge of the background scene nor does it rely on accurate modeling and estimation of wall parameters. The proposed approach is based on the relative strength of the exterior wall returns compared to behind-wall targets. It applies singular value decomposition to the data matrix constructed from the space-frequency measurements to identify ...


A Study Of The Behaviour Of Fresh And Coal Fouled Ballast Reinforced By Geogrid Using The Discrete Element Method, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn 2015 University of Wollongong

A Study Of The Behaviour Of Fresh And Coal Fouled Ballast Reinforced By Geogrid Using The Discrete Element Method, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn

Faculty of Engineering and Information Sciences - Papers

Geogrids are widely used in ballasted rail tracks for reinforcement and stabilisation. During train operation, ballast becomes contaminated or fouled due to infiltration of fines from the surface, mud pumping from the subgrade, and degradation, which decreases the performance of the geogrids. This paper presents the results of a laboratory and numerical simulation to study the effect that coal fines have on the interface between ballast and geogrid. The stress-strain behaviour of fresh and fouled ballast reinforced by geogrid was investigated via a series of large scale direct shear tests in the laboratory and numerical simulations using the Discrete Element ...


Application Of The Largest Lyapunov Exponent Algorithm For Feature Extraction In Low Speed Slew Bearing Condition Monitoring, Wahyu Caesarendra, Prabuono Buyung Kosasih, A Kiet Tieu, Craig A. S Moodie 2015 University of Wollongong

Application Of The Largest Lyapunov Exponent Algorithm For Feature Extraction In Low Speed Slew Bearing Condition Monitoring, Wahyu Caesarendra, Prabuono Buyung Kosasih, A Kiet Tieu, Craig A. S Moodie

Faculty of Engineering and Information Sciences - Papers

This paper presents a new application of the largest Lyapunov exponent (LLE) algorithm for feature extraction method in low speed slew bearing condition monitoring. The LLE algorithm is employed to measure the degree of non-linearity of the vibration signal which is not easily monitored by existing methods. The method is able to detect changes in the condition of the bearing and demonstrates better tracking of the progressive deterioration of the bearing during the 139 measurement days than comparable methods such as the time domain feature methods based on root mean square (RMS), skewness and kurtosis extraction from the raw vibration ...


Digital Commons powered by bepress