Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5674 Full-Text Articles 6765 Authors 1069224 Downloads 115 Institutions

All Articles in Science and Technology Studies

Faceted Search

5674 full-text articles. Page 1 of 203.

Rfid, Gps, And 3g: Radio Wave Technologies And Privacy, Lori Bowen Ayre 2016 Galecia Group

Rfid, Gps, And 3g: Radio Wave Technologies And Privacy, Lori Bowen Ayre

Collaborative Librarianship

No abstract provided.


The Vital Network: An Algorithmic Milieu Of Communication And Control, Sandra Robinson PhD 2016 Carleton University

The Vital Network: An Algorithmic Milieu Of Communication And Control, Sandra Robinson Phd

communication +1

The biological turn in computing has influenced the development of algorithmic control and what I call the vital network: a dynamic, relational, and generative assemblage that is self-organizing in response to the heterogeneity of contemporary network processes, connections, and communication. I discuss this biological turn in computation and control for communication alongside historically significant developments in cybernetics that set out the foundation for the development of self-regulating computer systems. Control is shifting away from models that historically relied on the human-animal model of cognition to govern communication and control, as in early cybernetics and computer science, to a decentred, nonhuman ...


Data’S Intimacy: Machinic Sensibility And The Quantified Self, Sun-ha Hong 2016 Massachusetts Institute of Technology

Data’S Intimacy: Machinic Sensibility And The Quantified Self, Sun-Ha Hong

communication +1

Today, machines observe, record, sense the world – not just for us, but sometimes instead of us (in our stead), and even indifferently to us humans. And yet, we remain human. Correlationism may not be up to a comprehensive ontology, but the ways in which we encounter, and struggle to make some kind of sense of, machinic sensibility matters. The nature of that encounter is not instrumentality, or even McLuhanian extension, but a full-blown ‘relationship’ where the terms by which machines ‘experience’ the world, and communicate with each other, parametrises the conditions for our own experience. This essay will play out ...


The Future Of Fighting Fraud In The Age Of Millennials, Michael Mack 2016 La Salle University

The Future Of Fighting Fraud In The Age Of Millennials, Michael Mack

Economic Crime Forensics Capstones

The millennial generation is often viewed in popular media and perceived by older generational members with angst, contempt, distrust, and trepidation. Adjectives such as lazy, apathetic, greedy, savvy, ruthless, narcissistic, and materialistic are often used to describe the largest and newest generation to enter the professional world. In fact, the adaptation of the term “Generation Me” is so mainstream and seen by most as an accurate description of the millennial generation that it is easy to immediately draw contrasts to other generations and institute perhaps unfounded opinions of millennials that indicate they are devoid of service to others, servitude to ...


Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe 2016 University of San Francisco

Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe

Master's Theses

The purpose of this study was to gain an understanding of what motivated college students—the Unplugged Students—to intentionally use their cell phones less and how they understood the impact that unplugging had on their interpersonal relationships and college experience. Nine undergraduate college students from four private schools were interviewed in one-on-one semi- structured interviews. These students, considered non-users, provided a particularly useful perspective as these students made a conscious choice to counteract social norms and experienced both being plugged in and unplugged. Cell phones and the act of unplugging proved to make up a complex and more nuanced ...


Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar 2016 University of New Orleans

Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar

University of New Orleans Theses and Dissertations

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number ...


A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson 2016 University of Wollongong

A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson

Maria Rashidi

Due to the substantial role of bridges in transportation networks and in accordance with the limited funding for bridge management, remediation strategies have to be prioritised. A conservative bridge assessment will result in unnecessary actions, such as costly bridge strengthening or repairs. On the other hand, any bridge maintenance negligence and delayed actions may lead to heavy future costs or degraded assets. The accuracy of decisions developed by any manager or bridge engineer relies on the accuracy of the bridge condition assessment which emanates from visual inspection. Many bridge rating systems are based on a very subjective procedure and are ...


A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson 2016 University of Wollongong

A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson

Maria Rashidi

Due to the substantial role of bridges in transportation networks and in accordance with the limited funding for bridge management, remediation strategies have to be prioritised. A conservative bridge assessment will result in unnecessary actions, such as costly bridge strengthening or repairs. On the other hand, any bridge maintenance negligence and delayed actions may lead to heavy future costs or degraded assets. The accuracy of decisions developed by any manager or bridge engineer relies on the accuracy of the bridge condition assessment which emanates from visual inspection. Many bridge rating systems are based on a very subjective procedure and are ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale 2016 University of Calgary

Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale

Journal of Public Deliberation

Drawing on the experiences of a deliberative practitioner and critical social scientist involved in the planning, production and implementation of a deliberative initiative on climate change, this paper reflects on nuances of framing and power in practical settings. Decisions about framing, some of them more conscious than others, influence the process of opinion formation among participants as well as the outcomes of the deliberation. Framing enacts power through the selection of deliberative approaches, the viewpoints that are admitted into the procedure, the alternatives that are defined, as well as the solutions that are ultimately proposed. Grounded in reflexivity as a ...


The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett IV 2016 California State University - San Bernardino

The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv

Electronic Theses, Projects, and Dissertations

China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes ...


Underground Infrastructure: Planning, Development And Revitalization, Guoliang Meng 2016 Guoliang Meng

Underground Infrastructure: Planning, Development And Revitalization, Guoliang Meng

Symposium Of University Research and Creative Expression (SOURCE)

The challenges facing Liuzhou’s underground infrastructure system today are unlike any it has ever faced before. Frequent underground gas pipeline leaks and explosions are impacting the safety and quality of citizens’ lives. To develop a safe, efficient and economical underground infrastructure system, Liuzhou City will have to do three things: (1) create a unified administrative department for underground pipeline administration, (2) conduct a citywide underground pipeline survey by stages and create an information platform to share the underground pipeline data, and (3) develop a public-private partnership to construct a utility tunnel. The poster outlines these critical steps in Liuzhou ...


The Social Implications Of Wellness, Mary G. Fisher 2016 Butler University

The Social Implications Of Wellness, Mary G. Fisher

BU Well

This paper presents the existing health disparities between populations of varying socio-economic statuses in the US as part of a broader discussion of the modern wellness industry. The discussion highlights the threat modern wellness poses to the individual and society and the implications these threats have on the health and future of the US if the wellness industry is left unchecked.


Bryn Mawr Digital Competencies Framework, Bryn Mawr College 2016 Bryn Mawr College

Bryn Mawr Digital Competencies Framework, Bryn Mawr College

Blended Learning Research and Open Educational Resources

The digital competencies outlined here are the fruits of both top-down and bottom-up initiatives at Bryn Mawr College. The Board of Trustees' Digital Bryn Mawr Task Force Report has charged Library and Information Technology Services and the College generally with ensuring that students develop the digital competencies needed to succeed in and beyond college. In 2014, Bryn Mawr College received a three-year, $800,000 grant from the Mellon foundation to create curricular and co-curricular opportunities for students to develop these competencies. In working with faculty and students on projects supported by that grant, members of the Educational Technology Services team ...


Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen 2016 University of Connecticut - Storrs

Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen

Honors Scholar Theses

The rapid growth of computers and computing technologies in the recent past has led to dramatic changes in modern social interactions. Connectivity through the internet and social networking sites is a massive part of people's lives, with younger generations learning to interact more and more through these means. It is necessary to recognize the emotional influence of these forms of communication- their influence on mental health will grow as they become a larger part of the social fabric. Facebook and other social media have been shown to be a form of emotional contagion; emotional states can be transferred from ...


Digital Commons powered by bepress