Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 2015 (1)
- ALA (1)
- Air quality (1)
- American Library Association (1)
- Banned Books Week (1)
-
- Biomedical monitoring (1)
- Bluetooth Low Energy (1)
- Body sensor network (1)
- Censorship (1)
- Communication system security (1)
- Cryptographic hash function (1)
- Encryption (1)
- Energy Harvesting (1)
- Environmental monitoring (1)
- Epistemology (1)
- Ethics (1)
- FPGA (1)
- Field programmable gate arrays (1)
- Hardware (1)
- Information science (1)
- Internet of Things (1)
- Internet research ethics (1)
- IoT (1)
- Librarianship (1)
- Low-power electronics (1)
- Marginalized peoples (1)
- Qualitative secondary analysis (1)
- Research (1)
- SHA-3 (1)
- Security (1)
Articles 1 - 5 of 5
Full-Text Articles in Social and Behavioral Sciences
Problems And Promises Of Qualitative Secondary Analysis For Research In Information Science (Paper), Amy Vanscoy, Jenny Bossaller, C. Sean Burns
Problems And Promises Of Qualitative Secondary Analysis For Research In Information Science (Paper), Amy Vanscoy, Jenny Bossaller, C. Sean Burns
Information Science Faculty Publications
Qualitative secondary analysis (QSA) is a method that has been applied in other disciplines even though it has rarely been explicitly used or discussed in information science. This paper discusses the epistemological and ethical issues surrounding QSA, explains the value of the method for information science research, discusses its benefits and challenges, and provides an example case study.
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally
Performance Evaluation Of Energy-Autonomous Sensors Using Power-Harvesting Beacons For Environmental Monitoring In Internet Of Things (Iot), George Dan Moiş, Teodora Sanislav, Silviu Corneliu Folea, Sherali Zeadally
Information Science Faculty Publications
Environmental conditions and air quality monitoring have become crucial today due to the undeniable changes of the climate and accelerated urbanization. To efficiently monitor environmental parameters such as temperature, humidity, and the levels of pollutants, such as fine particulate matter (PM2.5) and volatile organic compounds (VOCs) in the air, and to collect data covering vast geographical areas, the development of cheap energy-autonomous sensors for large scale deployment and fine-grained data acquisition is required. Rapid advances in electronics and communication technologies along with the emergence of paradigms such as Cyber-Physical Systems (CPSs) and the Internet of Things (IoT) have led to …
"Participant" Perceptions Of Twitter Research Ethics, Casey Fiesler, Nicholas Proferes
"Participant" Perceptions Of Twitter Research Ethics, Casey Fiesler, Nicholas Proferes
Information Science Faculty Publications
Social computing systems such as Twitter present new research sites that have provided billions of data points to researchers. However, the availability of public social media data has also presented ethical challenges. As the research community works to create ethical norms, we should be considering users’ concerns as well. With this in mind, we report on an exploratory survey of Twitter users’ perceptions of the use of tweets in research. Within our survey sample, few users were previously aware that their public tweets could be used by researchers, and the majority felt that researchers should not be able to use …
Social Responsibility, Librarianship, And The Ala: The 2015 Banned Books Week Poster Controversy, Emily J. M. Knox, Shannon M. Oltmann
Social Responsibility, Librarianship, And The Ala: The 2015 Banned Books Week Poster Controversy, Emily J. M. Knox, Shannon M. Oltmann
Information Science Faculty Publications
This article explores the recent controversy over the American Library Association’s poster for Banned Books Week. In particular, this article connects the 2015 controversy to broader historical issues and tensions within American librarianship concerning social responsibilities. The researchers used a qualitative approach, conducting telephone interviews with 26 individuals. The interviews were recorded, transcribed, and analyzed deductively. The interviews revealed deep continuing tensions regarding American librarianship’s relationship to responsibilities. First, there is some dissatisfaction with the American Library Association and its Office for Intellectual Freedom. Second, there are competing conceptualizations of censorship and how to apply these differing meanings while remaining …