Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5529 Full-Text Articles 6615 Authors 986104 Downloads 113 Institutions

All Articles in Science and Technology Studies

Faceted Search

5529 full-text articles. Page 1 of 200.

Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe 2016 University of San Francisco

Understanding How Intentionally Unplugging From Cell Phones Shapes Interpersonal Relationships And The Undergraduate College Experience, Jadelin P. Felipe

Master's Theses

The purpose of this study was to gain an understanding of what motivated college students—the Unplugged Students—to intentionally use their cell phones less and how they understood the impact that unplugging had on their interpersonal relationships and college experience. Nine undergraduate college students from four private schools were interviewed in one-on-one semi- structured interviews. These students, considered non-users, provided a particularly useful perspective as these students made a conscious choice to counteract social norms and experienced both being plugged in and unplugged. Cell phones and the act of unplugging proved to make up a complex and more nuanced ...


Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar 2016 University of New Orleans

Spice: A Software Tool For Studying End-User’S Insecure Cyber Behavior And Personality-Traits, Anjila Tamrakar, Anjila Tamrakar

University of New Orleans Theses and Dissertations

Insecure cyber behavior of end users may expose their computers to cyber-attack. A first step to improve their cyber behavior is to identify their tendency toward insecure cyber behavior. Unfortunately, not much work has been done in this area. In particular, the relationship between end users cyber behavior and their personality traits is much less explored. This paper presents a comprehensive review of a newly developed, easily configurable, and flexible software SPICE for psychologist and cognitive scientists to study personality traits and insecure cyber behavior of end users. The software utilizes well-established cognitive methods (such as dot-probe) to identify number ...


A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson 2016 University of Wollongong

A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson

Maria Rashidi

Due to the substantial role of bridges in transportation networks and in accordance with the limited funding for bridge management, remediation strategies have to be prioritised. A conservative bridge assessment will result in unnecessary actions, such as costly bridge strengthening or repairs. On the other hand, any bridge maintenance negligence and delayed actions may lead to heavy future costs or degraded assets. The accuracy of decisions developed by any manager or bridge engineer relies on the accuracy of the bridge condition assessment which emanates from visual inspection. Many bridge rating systems are based on a very subjective procedure and are ...


A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson 2016 University of Wollongong

A Methodology For Bridge Condition Evaluation, Maria Rashidi, Peter Gibson

Maria Rashidi

Due to the substantial role of bridges in transportation networks and in accordance with the limited funding for bridge management, remediation strategies have to be prioritised. A conservative bridge assessment will result in unnecessary actions, such as costly bridge strengthening or repairs. On the other hand, any bridge maintenance negligence and delayed actions may lead to heavy future costs or degraded assets. The accuracy of decisions developed by any manager or bridge engineer relies on the accuracy of the bridge condition assessment which emanates from visual inspection. Many bridge rating systems are based on a very subjective procedure and are ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale 2016 University of Calgary

Framing And Power In Public Deliberation With Climate Change: Critical Reflections On The Role Of Deliberative Practitioners, Gwendolyn Blue, Jacquie Dale

Journal of Public Deliberation

Drawing on the experiences of a deliberative practitioner and critical social scientist involved in the planning, production and implementation of a deliberative initiative on climate change, this paper reflects on nuances of framing and power in practical settings. Decisions about framing, some of them more conscious than others, influence the process of opinion formation among participants as well as the outcomes of the deliberation. Framing enacts power through the selection of deliberative approaches, the viewpoints that are admitted into the procedure, the alternatives that are defined, as well as the solutions that are ultimately proposed. Grounded in reflexivity as a ...


The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett IV 2016 California State University - San Bernardino

The Rise Of China's Hacking Culture: Defining Chinese Hackers, William Howlett Iv

Electronic Theses, Projects, and Dissertations

China has been home to some of the most prominent hackers and hacker groups of the global community throughout the last decade. In the last ten years, countless attacks globally have been linked to the People’s Republic of China (PRC) or those operating within the PRC. This exploration attempts to investigate the story, ideology, institutions, actions, and motivations of the Chinese hackers collectively, as sub-groups, and as individuals. I will do this using sources ranging from basic news coverage, interviews with experts and industry veterans, secondary reportage, leaked documents from government and private sources, government white papers, legal codes ...


Underground Infrastructure: Planning, Development And Revitalization, Guoliang Meng 2016 Guoliang Meng

Underground Infrastructure: Planning, Development And Revitalization, Guoliang Meng

Symposium Of University Research and Creative Expression (SOURCE)

The challenges facing Liuzhou’s underground infrastructure system today are unlike any it has ever faced before. Frequent underground gas pipeline leaks and explosions are impacting the safety and quality of citizens’ lives. To develop a safe, efficient and economical underground infrastructure system, Liuzhou City will have to do three things: (1) create a unified administrative department for underground pipeline administration, (2) conduct a citywide underground pipeline survey by stages and create an information platform to share the underground pipeline data, and (3) develop a public-private partnership to construct a utility tunnel. The poster outlines these critical steps in Liuzhou ...


The Social Implications Of Wellness, Mary G. Fisher 2016 Butler University

The Social Implications Of Wellness, Mary G. Fisher

BU Well

This paper presents the existing health disparities between populations of varying socio-economic statuses in the US as part of a broader discussion of the modern wellness industry. The discussion highlights the threat modern wellness poses to the individual and society and the implications these threats have on the health and future of the US if the wellness industry is left unchecked.


Bryn Mawr Digital Competencies Framework, Bryn Mawr College 2016 Bryn Mawr College

Bryn Mawr Digital Competencies Framework, Bryn Mawr College

Blended Learning Research and Open Educational Resources

The digital competencies outlined here are the fruits of both top-down and bottom-up initiatives at Bryn Mawr College. The Board of Trustees' Digital Bryn Mawr Task Force Report has charged Library and Information Technology Services and the College generally with ensuring that students develop the digital competencies needed to succeed in and beyond college. In 2014, Bryn Mawr College received a three-year, $800,000 grant from the Mellon foundation to create curricular and co-curricular opportunities for students to develop these competencies. In working with faculty and students on projects supported by that grant, members of the Educational Technology Services team ...


Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen 2016 University of Connecticut - Storrs

Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen

Honors Scholar Theses

The rapid growth of computers and computing technologies in the recent past has led to dramatic changes in modern social interactions. Connectivity through the internet and social networking sites is a massive part of people's lives, with younger generations learning to interact more and more through these means. It is necessary to recognize the emotional influence of these forms of communication- their influence on mental health will grow as they become a larger part of the social fabric. Facebook and other social media have been shown to be a form of emotional contagion; emotional states can be transferred from ...


Nuclear Waste Burial In Canada? The Political Controversy Over The Proposal To Construct A Deep Geologic Repository, Erika Simpson 2016 Western University

Nuclear Waste Burial In Canada? The Political Controversy Over The Proposal To Construct A Deep Geologic Repository, Erika Simpson

Political Science Publications

Canada’s newly minted federal minister of the environment, Catherine McKenna, decided on February 18, 2016 to delay the federal government’s decision on a proposal to construct a permanent repository for nuclear waste beneath the Bruce nuclear site, little more than a kilometre from Lake Huron. Officially called a ‘deep geologic repository’, or DGR, the facility is the brainchild of Ontario Power Generation. While it would not store fuel rods from nuclear plants, it would take in all other types of low- and intermediate-level radioactive wastes including concrete, equipment and protective gear from the continued operation and planned refurbishment ...


The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger 2016 Pepperdine University

The Growth Of The Broadband Internet Access Market In California: Deployment, Competition, Adoption, And Challenges For Policy, James E. Prieger

School of Public Policy Working Papers

This report examines the great progress made in availability and adoption in the broadband market over the past few decades and shows how Californian residents and businesses have come to use broadband widely. The policy issues involved with continuing the tremendous strides already made are discussed, along with recommendations for policy-makers.

The report begins by documenting the rapid growth of Internet usage in the U.S. and California. There is a review of the current state of competition in voice and broadband markets, discussing the decline of traditional telephone service, which is rapidly approaching irrelevance, and the rise of wireless ...


Table Of Contents, 2016 Tuskegee University

Table Of Contents

Professional Agricultural Workers Journal

No abstract provided.


The Complexity View On The Changes In Social And Economic Environment In 21st Century, Vasja Roblek, Zlatka Štok, Maja Meško 2016 University of Primorska

The Complexity View On The Changes In Social And Economic Environment In 21st Century, Vasja Roblek, Zlatka Štok, Maja Meško

Vasja Roblek

The paper tries to clarify the economic and political situation in the first half of the 21 century and their need to foster the socially conscious business environment. The society is faced with a dilemma of how to provide social and economic development and to reduce environmental damage, caused by the constant human desire for economic growth. It will be necessary to realize that capitalism is faced with the question of how to proceed at low or even zero growth? In a zero or even negative growth pushed the economic system as we have seen the cost of future high ...


Digital Commons powered by bepress