Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Social and Behavioral Sciences

Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly Apr 2020

Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly

Graduate Theses & Dissertations

This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth Nov 2016

An Examination Of Accessible Hands-On Science Learning Experiences, Self-Confidence In One’S Capacity To Function In The Sciences, And Motivation And Interest In Scientific Studies And Careers., Mick D. Isaacson, Cary Supalo, Michelle Michaels, Alan Roth

Journal of Science Education for Students with Disabilities

This study examined the potential relationship of accessible hands-on science learning experiences to the development of positive beliefs concerning one’s capacity to function in the sciences and motivation to consider science as a college major and career. Findings from Likert survey items given before and after engaging in accessible hands-on science laboratories show that students who were blind or had low vision (BLV) were more likely to agree with the following items after engaging in accessible science experiences: 1) I plan on enrolling as a science major in college; 2) My educational experiences, so far, have given me the …


Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo Jan 2016

Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo

Faculty of Engineering and Information Sciences - Papers: Part A

Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated and the original encryptor might be required to re-encrypt the message, which is impractical, since the encryptor might be unavailable. Unfortunately, to date the work in ABE does not consider this issue yet, and hence this hinders the adoption of ABE in practice. In this work, we consider how to efficiently update access policies in Ciphertext-policy Attribute-based Encryption (CP-ABE) systems without re-encryption. We introduce a new notion of CP-ABE supporting access policy update that captures the functionalities of attribute addition …


Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison Jan 2016

Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison

Book Chapters

This chapter explores the related ideas of access to knowledge resources and shared governance of those resources, often known as commons. Knowledge resources consist of many types and forms. Some are tangible, and some are intangible. Some are singular; some are reproduced in copies. Some are singular or unique; some are collected or pooled. Some are viewed, used, or consumed only by a single person; for some resources, collective or social consumption is the norm. Any given resource often has multiple attributes along these dimensions, depending on whether one examines the resource’s physical properties, its creative or inventive properties, or …


K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou Jan 2014

K-Times Attribute-Based Anonymous Access Control For Cloud Computing, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a new notion called k-times attribute-based anonymous access control, which is particularly designed for supporting cloud computing environment. In this new notion, a user can authenticate himself/herself to the cloud computing server anonymously. The server only knows the user acquires some required attributes, yet it does not know the identity of this user. In addition, we provide a k-times limit for anonymous access control. That is, the server may limit a particular set of users (i.e., those users with the same set of attribute) to access the system for a maximum k-times within a period …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Jan 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Faculty of Engineering and Information Sciences - Papers: Part A

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents' perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p =.000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents' country of residence. Countries under study included Australia, India, the UK and US. The country contributing …


Collaborative Management Of Web Ontology Data With Flexible Access Control, Jie Lu, Chao Wang, Guangquan Zhang, Jun Ma Jan 2010

Collaborative Management Of Web Ontology Data With Flexible Access Control, Jie Lu, Chao Wang, Guangquan Zhang, Jun Ma

Faculty of Engineering and Information Sciences - Papers: Part A

The creation and management of ontology data on web sites (e.g. instance data that is used to annotate web pages) is important technical support for the growth of the semantic web. This study identifies some key issues for web ontology data management and describes an ontology data management system, called robinet, to perform the management. This paper presents the structure of the system and introduces a Web ontology data management model that enables a flexible access control mechanism. This model adds rules into the robinet system to utilize the semantics of ontology for controlling the access to ontology data. The …


Can The Internet Be A Human Right?, Michael L. Best Jan 2004

Can The Internet Be A Human Right?, Michael L. Best

Human Rights & Human Welfare

A review of:

Human Rights and the Internet edited by Steven Hick, Edward F. Halpin, and Eric Hoskins. New York: Palgrave Macmillan, 2000. 276pp.


Rights Of Access And The Shape Of The Internet, Michael J. Madison Jan 2003

Rights Of Access And The Shape Of The Internet, Michael J. Madison

Articles

This Article reviews recent developments in the law of access to information, that is, cases involving click-through agreements, the doctrine of trespass to chattels, the anti-circumvention provisions of the Digital Millennium Copyright Act, and civil claims under the Computer Fraud and Abuse Act. Though the objects of these different doctrines substantially overlap, the different doctrines yield different presumptions regarding the respective rights of information owners and information consumers. The Article reviews those presumptions in light of different metaphorical premises on which courts rely: Internet-as-place, in the trespass, DMCA, and CFAA contexts, and contract-as-assent, in the click-through context. It argues that …


Creative Destruction In The Information Age: The Fallout On America's Latino Communities, Anthony G. Wilhelm Sep 1995

Creative Destruction In The Information Age: The Fallout On America's Latino Communities, Anthony G. Wilhelm

Trotter Review

The 104th Congress is in the midst of the first wholesale reform of telecommunications regulation in one-half century. The new regulatory framework emerging in the Republican-controlled Congress, if enacted, will usher in a radically deregulated, market-driven telecom environment, one in which the benefits of the emerging national information infrastructure will likely be distributed differentially, based on ethnicity and socio-economic status. Many U.S. residents may actually be charged higher rates for essential telecommunication services after deregulation (just as they did when cable television was deregulated), which may force many vulnerable users off the network. In addition, the concentration of media ownership …