Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

SelectedWorks

Selected Works

Technology

Discipline
Publication Year
Publication
File Type

Articles 1 - 30 of 82

Full-Text Articles in Entire DC Network

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


Fast And Free: Apps And Websites You Can Use Today (Part 2), Amanda Hartman Mclellan May 2015

Fast And Free: Apps And Websites You Can Use Today (Part 2), Amanda Hartman Mclellan

Amanda Hartman McLellan

No abstract provided.


“I Wish I Was A Bird To Fly Back And Forth:” Immigrant Women And Their Transnational Families Caring At A Distance: Draft 4/14/15, Sondra Cuban Dr. Apr 2015

“I Wish I Was A Bird To Fly Back And Forth:” Immigrant Women And Their Transnational Families Caring At A Distance: Draft 4/14/15, Sondra Cuban Dr.

Dr. Sondra Cuban

This case study of fifty women immigrants in Washington state focuses on the ingenious emotional strategies they engaged in with their left-behind families to care at a distance and the problematic ways the information and communication technology (ICTs) mediated these relationships across space and time. The study draws on a feminist transnational framework and an extended case method approach to understand the emotional dimensions and meanings of care by separated members and the ways the social technologies, and other factors, shaped these transnational spaces and interactions. The study utilizes ethnographic methods (interviews, informants, journals, focus groups, documentary analysis, and informal …


Improving Active Transportation Data In Hias With Automated Counters: Lessons From Ca, William W. Riggs Apr 2015

Improving Active Transportation Data In Hias With Automated Counters: Lessons From Ca, William W. Riggs

William W. Riggs

Quantifying the active transportation by biking and walking through counts is an important part of developing policy and intervention to mitigate risk and encourage active lifestyles. Numerous studies have evaluated the different methods of counting bicycles and pedestrians, but very little work has evaluated actual cases of how they fit into active transportation programs and health impact assessments (HIAs). The purpose of this study was to study validates the results of those studies looking at the reliability of results gathered as a part of two California projects and how they fit into existing planning and health assessment programs. Automated counters …


Too Enthusiastic To Care For Safety: Present Status And Recent Developments Of Nanosafety In Asean Countries Mar 2015

Too Enthusiastic To Care For Safety: Present Status And Recent Developments Of Nanosafety In Asean Countries

Faculty of Engineering University of Malaya

Nanotechnology has the prospect to vibrate the imagination of human being and has the ability to be used in almost every sector of human need. With its limitless potentials, there are many environmental, health and safety related concerns due to extremely ambivalent effects of nanoparticles. Studies revealed that nanoparticles can enter the human body through the lungs, intestinal tract, and skin. Therefore, the researchers and workers who handle nanoparticles and nanomaterials can theoretically and primarily be affected, whereas on the consumers this will have secondary effects. This paper aims at sharing and evaluating the investment scenario, present status and recent …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


An Exploration Of The Factors That Motivate Black And Latino Students To Engage In Stem (Science, Technology, Engineering And Mathematics), Adrienne Coleman Nov 2014

An Exploration Of The Factors That Motivate Black And Latino Students To Engage In Stem (Science, Technology, Engineering And Mathematics), Adrienne Coleman

Adrienne Coleman

No abstract provided.


How Is Mobile Technology Changing City Planning? Developing A Taxonomy For The Future, William W. Riggs, Kayla Gordon, Chris Steins Oct 2014

How Is Mobile Technology Changing City Planning? Developing A Taxonomy For The Future, William W. Riggs, Kayla Gordon, Chris Steins

William W. Riggs

The emergence of web technology has created tremendous opportunities for improving the role of good government, specifically in the form of increased information, interaction with the public, and more cost effective and efficient means of conducting public business transactions. These opportunities have been broadened with the introduction of internet-enabled mobile devices, as location-based information is used to increase awareness of user activity, movements and behaviors in real-time conditions and specific contexts (Kwak, Lee, Park & Moon, 2010). Some argue that the transition to mobile changes the nature of work and can allow individuals to work outside the office and create …


Using Technology In Library Instruction: Mobility, Flexibility And Creativity., Jennifer Wright Sep 2014

Using Technology In Library Instruction: Mobility, Flexibility And Creativity., Jennifer Wright

Jennifer Wright Joe

The information age has brought the need for information literacy to everyone’s doorstep. With 24-hour news cycles, newspaper websites, and social media, it is more important than ever before that library patrons have a grasp on information literacy. Libraries can teach patrons how to search for information and evaluate the sources that they encounter. They can also use the same technology that inundates the patron with information to reach out to those patrons who may not see the gap in their knowledge. Speaking specifically about academic libraries, librarians can now use remote teaching tools to bring their library instruction into …


Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq Aug 2014

Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq

Jonathan H. Lomurro Esq. LLM

No abstract provided.


Using Social Media In The Classroom: Assessment Of Its Effectiveness., Jennifer Wright Aug 2014

Using Social Media In The Classroom: Assessment Of Its Effectiveness., Jennifer Wright

Jennifer Wright Joe

Social media can be an effective tool in promoting critical thinking and collaboration in library instruction. Whether it is simple polls or a much more collaborative event, these methods engage students and allow them to interact with material, professors, and other students in an organized fashion that might not be feasible without the use of technology. However, many faculty members are quick to incorporate these new learning tools without regard to their effectiveness. In this session, several applications of social media will be presented and their effectiveness will be discussed. Then, to conclude, the participants will discuss the best way …


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


Ramifications Of Quiz Format On Retention And Online Studying, Mary L. Still, Jeremiah D. Still May 2014

Ramifications Of Quiz Format On Retention And Online Studying, Mary L. Still, Jeremiah D. Still

Jeremiah D. Still

No abstract provided.


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr. Jan 2014

Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

The public’s interest in medicine and good health is substantial. However, this interest is harmed when important medical devices or pharmaceuticals, although infringing on valid patents, are suddenly taken off the market after a court grants a permanent injunction. While permanent injunctions were automatically granted by the Federal Circuit before the Supreme Court’s holding in eBay v. MercExchange, courts now have more discretion to deny injunctive relief. Now that courts have this newfound discretion after eBay, the public should no longer expect to be harmed by the sudden removal of medical supplies. Unfortunately, this has not been the course that …


The Use Of Technology For The Alzheimer's Patient: A Literature Review, Mary Willis Jan 2014

The Use Of Technology For The Alzheimer's Patient: A Literature Review, Mary Willis

Mary Willis

Technology has long been used to assist in the diagnosis of Alzheimer’s disease (AD); but not until recently has it been used in the treatment of symptoms of this debilitating disease. The current focus of technology use is assistance with activities of daily living (ADL’s) and patient safety. Research and experimentation have been conducted with devices to assist with memory loss in the Alzheimer’s patient. To better understand the need for technological assistance, it is necessary to first take a look at the current technology used and its effectiveness, the ethical issues involved with any medical technology, and to examine …


Increasing National Space Engineering Productivity And Educational Opportunities Via Intrepreneurship, Entrepreneurship And Innovation, Jeremy Straub Dec 2013

Increasing National Space Engineering Productivity And Educational Opportunities Via Intrepreneurship, Entrepreneurship And Innovation, Jeremy Straub

Jeremy Straub

Research and educational efforts related to space engineering or requiring access to space face significant startup costs. The cost of developing a 1-U (10 cm × 10 cm × 11 cm) CubeSat from scratch can be approximately $250,000. Those buying a kit must pay amortized vendor development costs on a per-mission basis, creating a lower per-mission barrier. Kit users are also constrained by being unable to make changes to vendor subsystems without incurring substantial redevelopment costs or vendor charges. The Open Prototype for Educational NanoSats (OPEN) is changing this by providing freely available design documents for a 1-U CubeSat class …


Turning Technofear To Technojoy, Amanda R. Hartman Nov 2013

Turning Technofear To Technojoy, Amanda R. Hartman

Amanda Hartman McLellan

In the talk I covered some tips on overcoming the fear of change and new technology, balancing security and privacy issues with participation in social media, and some suggested websites and apps to get you started


Building A Digital Commons, Amanda R. Hartman, Suzy Szasz Palmer Sep 2013

Building A Digital Commons, Amanda R. Hartman, Suzy Szasz Palmer

Amanda Hartman McLellan

No abstract provided.


Digital Scholarship And Digital Libraries: Past, Present, And Future, Christine Borgman Sep 2013

Digital Scholarship And Digital Libraries: Past, Present, And Future, Christine Borgman

Christine L. Borgman

In a few short decades, the practices of scholarship have been transformed by the use of digital resources, tools, and services. Some shifts are obvious, such as seeking, reading, and publishing research online, often to the exclusion of print. Other shifts are subtle, such as data being viewed as research products to be disseminated. Research objects are more atomized, yet aggregated in new ways. Digital technologies offer opportunities to innovate in scholarly practice, collaboration, and communication. Innovation in digital libraries is necessary to advance digital scholarship. The talk will present a set of challenges for 21st century research and practice …


Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner Sep 2013

Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …


Fdi Spillovers In Tanzania`S Manufacturing Sector, Johansein Rutaihwa Jun 2013

Fdi Spillovers In Tanzania`S Manufacturing Sector, Johansein Rutaihwa

Johansein Rutaihwa

Using cross sectional data, this study analyses the spillover effects of foreign direct investment in Tanzania’s manufacturing sector. The findings reject a proposition that FDI intensity has improved domestic manufacturing firms productivity; no vertical technological spillovers occurred and a negative correlation between vertical spillover and FDI presence was found. Instead there is a positive correlation between FDI and horizontal technology spillover. The study, therefore, recommends that the government should make concerted efforts to ensure that FDI promotion addresses technology spillovers both within the industry and across the sector; as well as strengthening and widening the education system to enable it …


Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman May 2013

Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman

Amanda Hartman McLellan

This workshop will cover some websites and mobile apps that are free and easy to use for a variety of purposes, from organization to just plain fun. If you've got a laptop, iPad or other mobile device, please bring it so you can play along!


Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney Jan 2013

Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney

Jeffrey K Gurney

Autonomous vehicles will revolutionize society within the decade. These cars will cause accidents. Tort liability, however, is not ready for the introduction of autonomous vehicles, and, thus, liability will not be assessed to the party that is responsible for the accident. This Article addresses the liability of autonomous vehicle by examining products liability through the use of four scenarios: the Distracted Driver; the Diminished Capabilities Driver; the Disabled Driver; and the Attentive Driver.Based on those scenarios, this Article argues that the autonomous technology manufacturer should be liable for accidents while the vehicle is in autonomous mode. This Article suggests that …


Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson Jan 2013

Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson

Matthew A Susson

Where the Industrial Revolution introduced the notion of mass production of goods — and thereby upended previous economic models — 3D printing now “makes it as cheap to create single items as it is to produce thousands,” which “may have as profound an impact on the world as the coming of the factory did.” In short, a new fabrication revolution is coming.

3D printing is, put simply, a technology that allows one to transform a digital file into a physical product — in other words, we can now print actual objects. Technology that allows users to manufacture complex objects at …


Dolina Krzemowa I Inne Regiony Rozwijające Przemysły Wysokich Technologii, Dominika Latusek Jan 2013

Dolina Krzemowa I Inne Regiony Rozwijające Przemysły Wysokich Technologii, Dominika Latusek

Dominika Latusek

Artykuł omawia charakterystyki regionalnych klastrów wysokich technologii na świecie, na przykładzie Doliny Krzemowej w Stanach Zjednoczonych. Na podstawie przeglądu istniejących badań można wskazać cechy, które łączą takie regiony w różnych częściach świata. Jednocześnie jednak badania wskazują, że niemożliwe jest kreowanie nowych klastrów poprzez imitowanie istniejących rozwiązań, a każdy region wyróżnia się od innych własną specyfiką.


The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary Mar 2012

The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary

Mary G Leary

“Nothing is private anymore.” This is an oft repeated sentiment by many Americans, not to mention the focus of judicial confusion and legislative blustering. In the wake of publicly available technologies such as Google Earth, internet tracking, cell phone triangulation, to name just a few, many people feel unable to prevent the government or anyone from obtaining private information. While this may seem simply a function of a modern world, this reality creates a fundamental problem for Fourth Amendment jurisprudence which has heretofore gone unrecognized. The Fourth Amendment protects citizens from unreasonable searches and seizures. Therefore, in order for the …


“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer Mar 2012

“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer

Adam Thierer

Fear is an extremely powerful motivational force. In public policy debates, appeals to fear are often used in an attempt to sway opinion or bolster the case for action. Such appeals are used to convince citizens that threats to individual or social wellbeing may be avoided only if specific steps are taken. Often these steps take the form of anticipatory regulation based on the precautionary principle.

Such “fear appeal arguments” are frequently on display in the Internet policy arena and often take the form of a full-blown “moral panic” or “technopanic.” These panics are intense public, political, and academic responses …


Illuminating Innovation, Lea B. Shaver Mar 2012

Illuminating Innovation, Lea B. Shaver

Lea Shaver

The central justification offered for patent protection is the need to incentivize technological innovation. Yet to date there is little empirical evidence that this aim is achieved. This Article argues that historical case studies, exploring the impact of patent law on particular fields of technological innovation, can be especially helpful in providing an empirical foundation for patent scholarship. The Article then proceeds to offer one such case study, focused on one of the most important technological revolutions of the past two centuries: electrification. Although Thomas Edison and “the incandescent lamp” have been extensively studied, so far no one has asked …


Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil Jan 2012

Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil

William Marra

The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …