Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

Examining The Effects Of Information And Communication Technologies In The Legal Representation Of Latin American Asylum Seekers, Victor M. Portillo Ochoa Dec 2021

Examining The Effects Of Information And Communication Technologies In The Legal Representation Of Latin American Asylum Seekers, Victor M. Portillo Ochoa

Open Access Theses & Dissertations

The purpose of this thesis was to explore how legal defense nonprofit organizations (NPO) are using Information and Communication Technologies (ICT) to provide legal defense for asylum seekers and improve the conditions of immigrants at detention centers. In addition, this research explored the impact of ICTs on legal defense NPOs, bottlenecks, and security implications when supporting vulnerable communities. ICTs profoundly impacted the way we interact in a post-pandemic world, and it presents new challenges and possibilities for legal defense nonprofit organizations that are helping vulnerable communities. This study consists of staff and volunteers from different legal defense nonprofit organizations NPOs …


Access To Technology In Humboldt County: Measuring Digital Preparedness At The Start Of A Pandemic, Lauren E. Proffitt Jan 2021

Access To Technology In Humboldt County: Measuring Digital Preparedness At The Start Of A Pandemic, Lauren E. Proffitt

Cal Poly Humboldt theses and projects

This research is based on summer 2020 online survey data from a stratified random sample of 573 clients and care providers of a rural Northern California government social services agency. The goal was to study information technology access in Humboldt County, California, and the range of digital preparedness of clients of a local government agency: Humboldt County In-Home Supportive Services (IHSS). IHSS serves several groups of rural residents with low-income, foremost of which are older adults and people with disabilities. In 2020, in compliance with federal requirements, IHSS discontinued systems for paper-based client/provider confirmation of services, moving to digital technology-based …


A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland Oct 2014

A Causal Model To Predict Organizational Knowledge Sharing Via Information And Communication Technologies, Simon Cleveland

CCE Theses and Dissertations

Knowledge management literature identifies numerous barriers that inhibit employees' knowledge seeking and knowledge contributing practices via information and communication technologies (ICTs). Presently, there is a significant gap in the literature that explains what factors promote common knowledge sharing barriers. To bridge this gap, this study examined two research questions: 1) What are the potential factors that contribute to the commonly accepted barriers to knowledge sharing?, and 2) How do these factors impact employees' use of ICTs for knowledge seeking and knowledge contributing? Literature review of 103 knowledge management articles identified three major barriers to knowledge sharing practices (lack of time, …


21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring May 2014

21st Century Radicalization: The Role Of The Internet User And Nonuser In Terrorist Outcomes, David Wayne Woodring

Graduate Theses and Dissertations

This study examines differences between users and nonusers of information communication technologies (ICTs) within the pre-incident planning processes for domestic terrorist movements operating within the United States. In addition, this study is the first quantitative exploration of the prevalence, types, and purposes of ICT use within terrorist movements, specifically environmental, far-right, and Islamic extremist movements. Using "officially designated" federal terrorism investigations from the American Terrorism Study (ATS), we analyzed extracted evidence of ICT usage among individuals (n =331) engaged in the pre-incident planning processes as members of terrorist movements between 1995-2011. While we find significant differences in terrorist ICT use …