Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

6,464 Full-Text Articles 7,764 Authors 1,597,854 Downloads 140 Institutions

All Articles in Science and Technology Studies

Faceted Search

6,464 full-text articles. Page 4 of 245.

Engineering Properties Of Ambient Cured Alkali-Activated Slag-Fly Ash Concrete Reinforced With Different Types Of Steel Fiber, Nabeel Farhan, M Neaz Sheikh, Muhammad N. S Hadi 2018 University of Wollongong

Engineering Properties Of Ambient Cured Alkali-Activated Slag-Fly Ash Concrete Reinforced With Different Types Of Steel Fiber, Nabeel Farhan, M Neaz Sheikh, Muhammad N. S Hadi

Faculty of Engineering and Information Sciences - Papers: Part B

This paper investigates the influence of different types of steel fibers on the engineering properties of ambient cured alkali-activated slag-fly ash concrete. The engineering properties investigated include workability, compressive strength, splitting tensile strength, flexural strength, direct tensile strength, and stress-strain response under axial compression. Three types of steel fibers, i.e., straight micro steel fiber, deformed macro steel fiber and hybrid steel fiber, were added to the alkali-activated slag-fly ash mixes. It was found that the workability of the alkali-activated slag-fly ash concrete mixes decreased with the increase in the volume fraction of steel fibers. It was also found that ...


Investigation On The Vibration Effect Of Shock Wave In Rock Burst By In Situ Microseismic Monitoring, Mingshi Gao, Hongchao Zhao, Yichao Zhao, Xiaojun Gao, Xiangyu Wang 2018 Xinjiang University, China University of Mining and Technology

Investigation On The Vibration Effect Of Shock Wave In Rock Burst By In Situ Microseismic Monitoring, Mingshi Gao, Hongchao Zhao, Yichao Zhao, Xiaojun Gao, Xiangyu Wang

Faculty of Engineering and Information Sciences - Papers: Part B

Rock burst is a physical explosion associated with enormous damage at a short time. Due to the complicity of mechanics of rock burst in coal mine roadway, the direct use of traditional investigation method applied in tunnel is inappropriate since the components of surrounding rock are much more complex in underground than that of tunnel. In addition, the reliability of the results obtained through these methods (i.e., physical simulation, theoretical analysis, and monitoring in filed application) is still not certain with complex geological conditions. Against this background, present experimental study was first ever conducted at initial site to evaluate ...


Behavior Of High-Strength Concrete Columns Reinforced With Galvanized Steel Equal-Angle Sections Under Different Loading Conditions, Muhammad N. S Hadi, Ayoob Ibrahim, M Neaz Sheikh 2018 University of Wollongong

Behavior Of High-Strength Concrete Columns Reinforced With Galvanized Steel Equal-Angle Sections Under Different Loading Conditions, Muhammad N. S Hadi, Ayoob Ibrahim, M Neaz Sheikh

Faculty of Engineering and Information Sciences - Papers: Part B

Experimental results are presented for a new method of reinforcing concrete columns with galvanized steel equal-angle (GSEA) sections. For the same cross-sectional area, a GSEA section has a higher second moment of area than a conventional steel bar, which leads to a higher bending stiffness of the GSEA reinforced concrete member. In addition, the area of confined concrete is higher in GSEA reinforced concrete members than in steel bar reinforced members, which results in higher strength and ductility. The experimental program involved testing of 20 square, high-strength concrete (HSC) specimens under concentric axial load, eccentric axial load, and four-point loading ...


A New Concentration Detection System For Sf6/N2 Mixture Gas In Extra/Ultra High Voltage Power Transmission Systems, Baojun Qu, Qingxin Yang, Yongjian Li, Reza Malekian, Zhixiong Li 2018 Hebei University of Technology

A New Concentration Detection System For Sf6/N2 Mixture Gas In Extra/Ultra High Voltage Power Transmission Systems, Baojun Qu, Qingxin Yang, Yongjian Li, Reza Malekian, Zhixiong Li

Faculty of Engineering and Information Sciences - Papers: Part B

This paper develops a new detection system, for the first time, to detect the gas concentrations of the SF6/N2 mixture in extra/ultra-high voltage power transmission systems. The concentrations of SF6 and N2 are calculated from the thermal conductivity function of the mixture gas. The main contribution of this work is that a specially-designed thermostatic chamber with adaptive temperature controller is developed to ensure constant pressure of the gas flowed through the thermal conductivity sensor. Another contribution is the combination of multiple sensors (e.g. humidity and electrochemical sensors), which enables the detector to address the penetration effects of ...


Bursting The Filter Bubble: Information Literacy And Questions Of Valuation, Navigation, And Control In A Digital Landscape, Komysha Hassan 2018 University of Central Florida

Bursting The Filter Bubble: Information Literacy And Questions Of Valuation, Navigation, And Control In A Digital Landscape, Komysha Hassan

Honors in the Major Theses

The evolution of social media platforms and other public forums in the digital realm has created an explosion of user-generated content and data as a component of the already content-saturated digital landscape. The distributed, horizontal nature of the internet as a platform makes it difficult to ascertain value and differentiate between texts of varying validity, bias, and purpose. In addition, the internet is not an inanimate interface. As Pariser (2011) argues, content aggregators, such as Google, actively filter, personalize, and therefore limit each individual's access to information, in both range and type. This has created a crisis of information ...


The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo 2017 Universidade Nova de Lisboa

The Evolution Of Requirements Practices In Software Startups, Catarina Gralha, Daniela Damian, Anthony Wasserman, Miguel Goulão, João Araújo

Tony Wasserman

We use Grounded Theory to study the evolution of requirements practices of 16 so ware startups as they grow and introduce new products and services. These startups operate in a dynamic environment, with significant time and market pressure, and rarely have time for systematic requirements analysis. Our theory describes the evolution of practice along six dimensions that emerged as relevant to their requirements activities: requirements artefacts, knowledge management, requirements-related roles, planning, technical debt and product quality. Beyond the relationships among the dimensions, our theory also explains the turning points that drove the evolution along these dimensions. These changes are reactive ...


Information Technology Use In West African Agriculture – Challenges And Opportunities: A Panel Discussion, Maurice Dawson, Damon Walker, Ashley Moss 2017 University of Missouri - St Louis

Information Technology Use In West African Agriculture – Challenges And Opportunities: A Panel Discussion, Maurice Dawson, Damon Walker, Ashley Moss

Maurice Dawson

Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they ...


International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson 2017 Roosevelt University

International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson

Maurice Dawson

Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in ...


"The Devil Is In The Details:" Inland Northwest Stakeholders’ Views On Three Forest-Based Bioenergy Scenarios, Soren Newman, Darin Saul, Robert Keefe, Ryan Jacobson, Tamara Laninga, Jillian Moroney 2017 University of Idaho

"The Devil Is In The Details:" Inland Northwest Stakeholders’ Views On Three Forest-Based Bioenergy Scenarios, Soren Newman, Darin Saul, Robert Keefe, Ryan Jacobson, Tamara Laninga, Jillian Moroney

University Author Recognition Bibliography: 2017

Public and private initiatives are actively exploring a range of forest-based bioenergy development options in the Inland Northwest of the United States. These efforts are motivated in part by the potential to generate renewable energy while creating a market for forest residues that would facilitate hazardous fuels reduction and provide economic opportunities. Understanding stakeholders’ perspectives is critical to the feasibility and long-term viability of bioenergy projects. This study presents stakeholder perspectives on forest-based bioenergy development strategies for communities in the forested areas of Idaho, western Montana, eastern Washington, and eastern Oregon. We developed three scenarios based on bioenergy initiatives currently ...


Reaction To Safety Equipment Technology In The Workplace And Implications: A Study Of The Firefighter’S Hood, Brian W. Ward 2017 University of Maryland

Reaction To Safety Equipment Technology In The Workplace And Implications: A Study Of The Firefighter’S Hood, Brian W. Ward

The Qualitative Report

In the 1990s the firefighter’s hood became a standard article of safety equipment worn by municipal firefighters, eliciting a negative reaction among many of these firefighters. I used data from interviews with 42 firefighters to explain why this reaction occurred. Data analysis revealed that negative reactions ultimately stemmed from the hood’s disruption of autonomy, repudiation of the complex mental and physical skill needed to perform tasks required of firefighters, and hindrance in negotiating the life-threatening environment created by a fire. These findings indicate that when introducing new safety equipment technology to emergency response workers, their reaction to this ...


A Problem Of Play For Democratic Education? Abstraction, Realism, And Exploration In Learning Games. A Response To "The Challenges Of Gaming For Democratic Education: The Case Of Icivics", Benjamin DeVane 2017 University of Iowa

A Problem Of Play For Democratic Education? Abstraction, Realism, And Exploration In Learning Games. A Response To "The Challenges Of Gaming For Democratic Education: The Case Of Icivics", Benjamin Devane

Democracy and Education

In this review article, I argue that games are complementary, not self-supporting, learning tools for democratic education because they can: (a) offer simplified, but often not simple, outlines (later called “models”) of complex social systems that generate further inquiry; (b) provide practice spaces for exploring systems that do not have the often serious consequences of taking direct and immediate social, civic, and legal action; and (c) use rules to allow players to explore this aforementioned outline or model by making decisions and seeing an outcome. To make these arguments, I perform a close reading of three examples of participatory and ...


Digitally Segregated Understanding Technology Readiness In Preparation For Higher Education Success, Gloria D. Mullons 2017 National Louis University

Digitally Segregated Understanding Technology Readiness In Preparation For Higher Education Success, Gloria D. Mullons

Dissertations

The Digital Divide is the gulf between those that have access and use of technology and those that do not. The Digital Divide is a multilayered issue impacting low-income persons, low literacy persons, seniors, and persons with disabilities. The new emphasis is on whether people know how to use technological devices and the Internet for multiple purposes, especially to function and progress in daily society. This dissertation study focuses on technology readiness in preparation for higher education, specifically examining: 1) experiences students had prior to attending the HP3 program, 2) factors that influenced student preparedness for engaging in college-level technology ...


Awakening The Potential Of Positive Computing: A Transversal, Heliotropic Design Paradigm For Human Flourishing, Ryan Wynia 2017 University of Pennsylvania

Awakening The Potential Of Positive Computing: A Transversal, Heliotropic Design Paradigm For Human Flourishing, Ryan Wynia

Master of Applied Positive Psychology (MAPP) Capstone Projects

Positive Computing literature does not consider the complex implications stemming from the evidence of computing technologies’ harmful effects. Moreover, present approaches to integrating well-being science into the design of interactive systems are built on deficit-oriented models. In response, a transversal, social constructionist paradigm of Positive Computing sensitive to the social complex and views technology as a part ofcivilization as a living, human construction is explored as a means of advancing the Positive Computing domain. The work argues the well-being of civilization needs to be routinely re-secured through the development of a metacognitive, affirmative competency that recognizessocial systems as capable of ...


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim 2017 Yeungnam University

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently ...


An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang 2017 Northern Kentucky University

An Integrative Model Of Managing Software Security During Information Systems Development, Vijay Raghavan, Xiaoni Zhang

Journal of International Technology and Information Management

This study investigates the critical relationship between organizational system development policies, procedures and processes and the resulting security quality of the systems developed. We draw from a general software quality model to provide a theoretical foundation for testing this relationship. We used paper-based survey as well as online surveys to collect data from software developers and project managers. Our results revealed a significant relationship between management support and security policies and development process control. We also found significant relationships between development-process control and security quality, attitude and security quality, and the interaction between value congruence and commitment to provide security ...


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele 2017 Adeleke University, Ede

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar 2017 NMIMS University

Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar

Journal of International Technology and Information Management

mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution ...


Table Of Contents Jitim Vol 26 Issue 4, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


Enhancing The Epistemological Project In The Rhetoric Of Science: Information Infrastructure As Tool For Identifying Epistemological Commitments In Scientific And Technical Communities., Nathan Johnson 2017 Purdue University

Enhancing The Epistemological Project In The Rhetoric Of Science: Information Infrastructure As Tool For Identifying Epistemological Commitments In Scientific And Technical Communities., Nathan Johnson

Nathan R. Johnson

Enhancing the Epistemological Project in the Rhetoric of Science: Information Infrastructure as Tool for Identifying Epistemological Commitments in Scientific and Technical Communities. Article discusses how the STS concept of infrastructural provides a mesolayer approach to understand global issues in science with rhetorical methodology.


Developing A Technological Garment To Aid Those With Anxiety Disorder, Katherine N. Boedecker 2017 Southern Illinois University Carbondale

Developing A Technological Garment To Aid Those With Anxiety Disorder, Katherine N. Boedecker

ASA Multidisciplinary Research Symposium

The purpose of this research was to develop a technological garment for patients in behavioral health hospitals with anxiety disorder.


Digital Commons powered by bepress