Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Data

Discipline
Institution
Publication Year
Publication

Articles 31 - 51 of 51

Full-Text Articles in Social and Behavioral Sciences

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …


Integrating Funders Into A Multisector Transit-Equity Collaborative: Lessons From The Field, Davian Gagne Oct 2016

Integrating Funders Into A Multisector Transit-Equity Collaborative: Lessons From The Field, Davian Gagne

The Foundation Review

This article examines the efforts of Mile High Connects, a collaborative working to ensure that the Denver region’s $7.8 billion transit project benefits low-income communities and communities of color by connecting them to affordable housing, healthy environments, quality education, and good-paying jobs.

The collaborative, which includes local and national funders that have coalesced around the central issue of transit equity, has adopted a collective-impact model that has at its core two tools to measure and track its work and to show the social-impact outcomes achieved through its initiatives.

This article describes the collaborative’s approach to evaluation, reflects on its initial …


The Probability Of Data’S Inherent Sexiness: A Review Of Naked Statistics: Stripping The Dread From The Data, Sean Swenson Nov 2015

The Probability Of Data’S Inherent Sexiness: A Review Of Naked Statistics: Stripping The Dread From The Data, Sean Swenson

The Qualitative Report

Charles Wheelan’s Naked Statistics: Stripping the Dread from the Data (2013) reintroduces the field of statistics to the apathetic reader in an approachable and sympathetic way. By focusing on the acquisition of appreciation for the field over straightforward comprehension, Wheelan is able to achieve what many qualitative researchers have striven for in reintroducing the field to those thought previously lost.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


The Art Of Personal Science, Jeff Fajans Feb 2014

The Art Of Personal Science, Jeff Fajans

The STEAM Journal

Quantified Self isn’t really about finding answers or solving problems—it’s about asking new questions.


The Quantified Self, Behind The Cover Art, Leslie Love Stone Feb 2014

The Quantified Self, Behind The Cover Art, Leslie Love Stone

The STEAM Journal

We lead quantified lives. The information we send and receive through our computers, CD players, and smart phones is coded in ones and zeroes. We exist as numerical accounts, license numbers, and login IDs. Anyone who has ever waited on hold for a live customer service representative understands the desire to be treated like a person, not a number. We each want acceptance for our inherent peculiarities and consideration for our circumstance—conditions we believe extrinsic to numbers.


If You Build It, They Will Come: Creating The Space And Support For Real-Time Strategic Learning, Jewlya Lynn, Rebecca Kahn, Phillip Chung, Scott Downes Jan 2014

If You Build It, They Will Come: Creating The Space And Support For Real-Time Strategic Learning, Jewlya Lynn, Rebecca Kahn, Phillip Chung, Scott Downes

The Foundation Review

· Learning is a key tool for foundations seeking to improve their effectiveness, and they are beginning to use evaluation to learn about and improve their strategies. The Colorado Trust took this a step further and integrated strategic learning into a grant strategy, including supporting learning coaches for 14 of their grantees.

· The strategic learning framework consisted of three steps: systematic data collection, collective interpretation of information, and the use of that interpretation to improve strategies.

· This article reviews four of the cases, including three grantees and the foundation as a case, identifying methods of learning and resulting …


Commentary: The Road To Quality In Public Health, A Long But Important Journey, F. Douglas Scutchfield, Glen Mays, Marylou Wallace Oct 2013

Commentary: The Road To Quality In Public Health, A Long But Important Journey, F. Douglas Scutchfield, Glen Mays, Marylou Wallace

Frontiers in Public Health Services and Systems Research

Quality improvement (QI) in public health departments is a focus in this sixth issue of Frontiers. Data is important to the development of quality improvement efforts. As we see growth of and meaningful use of electronic health records, the health department is in a position to take the lead as a data hub and to use this information wisely to both improve their QI efforts and link that QI to outcomes.


A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho Jan 2012

A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho

Human Rights & Human Welfare

Professor Richards highlights, in his generous review of our book Measuring Human Rights that one of the aims of the book is to bring to the forefront the importance of conceptualization before operationalization – that conceptual clarity (or lack of it) is at the heart of the problems concerning the measurement of human rights. He draws out three key issues from the book as the springboard for further discussion on measurement of the concept – a) the “Respect, Protect and Fulfill” (RPF) framework, b) the lack of reliable data sources, and c) the conceptual links between human rights, human development, …


Handling Qualitative Data: A Review, Diana Riviera Sep 2010

Handling Qualitative Data: A Review, Diana Riviera

The Qualitative Report

In Handling Qualitative Data: A Practical Guide, Richards (2009) presents the reader with beginner-to-intermediate knowledge of qualitative research and the requirements to develop a successful project. Throughout the text there are boxes of information that capture essential steps or informative pieces that the reader should make note of or make it a point to remember. Richards also reminds the readers that one of the most important parts of research is to start. Procrastination can be the researcher's greatest enemy.


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


A Comparison Of Methods For Longitudinal Analysis With Missing Data, James Algina, H. J. Keselman May 2004

A Comparison Of Methods For Longitudinal Analysis With Missing Data, James Algina, H. J. Keselman

Journal of Modern Applied Statistical Methods

In a longitudinal two-group randomized trials design, also referred to as randomized parallel-groups design or split-plot repeated measures design, the important hypothesis of interest is whether there are differential rates of change over time, that is, whether there is a group by time interaction. Several analytic methods have been presented in the literature for testing this important hypothesis when data are incomplete. We studied these methods for the case in which the missing data pattern is non-monotone. In agreement with earlier work on monotone missing data patterns, our results on bias, sampling variability, Type I error and power support the …


Moving Forward: Recommendations For A Landmine Victim Data Collection And Management System The Landmine Casualty Database Workshop At James Madison University (Jmu), May 13–14, 2002, Cisr Jmu Aug 2002

Moving Forward: Recommendations For A Landmine Victim Data Collection And Management System The Landmine Casualty Database Workshop At James Madison University (Jmu), May 13–14, 2002, Cisr Jmu

The Journal of Conventional Weapons Destruction

After discussing ways to develop a systematic and accurate system for the collection of victim data on a global basis, participants developed three sets of recommendations that were presented to the global community.


The Landmines Resource Center For Lebanon, Habbouba Aoun Dec 2001

The Landmines Resource Center For Lebanon, Habbouba Aoun

The Journal of Conventional Weapons Destruction

After 15 years of war and 22 years of occupation, Lebanon is littered with landmines. The Landmines Resource Center (LMRC) seeks to improve the situation by collecting, analyzing and disseminating related data.


It's Mine And You Can't Have It, Joe Lokey Jun 2000

It's Mine And You Can't Have It, Joe Lokey

The Journal of Conventional Weapons Destruction

It seems to be a given in the mine action community that you are acknowledged as an "expert" simply because you have stood up and declared it so. As with many humanitarian pursuits, there is no process to credential, certify, or license individuals, processes, or procedures in mine action. There is no guild or professional body to oversee and validate the veracity of performance claims. This is frustrating to donors and funding organizations that have little upon which to base outcome expectations. The answer is an open information system and process, transparent reporting, and contributions from the scientific community that …


Data Standardization, Thomas Powell Oct 1998

Data Standardization, Thomas Powell

The Journal of Conventional Weapons Destruction

As the international community has placed increasing emphasis on efforts to identify, classify, neutralize, or remove landmines or other unexploded ordnance (UXO), the need to communicate information concerning the location, description, and hazards associated with these munitions has become apparent. Numerous database structures have been created to store information about the various munitions. However, different organizations, countries, or individuals have adopted their own unique data definitions and database structures, and these differences could affect the kinds of information available through these sources.


A Framework For Assessing The Rationality Of Judgments In Carcinogenicity Hazard Identification, Douglas J. Crawford-Brown, Kenneth G. Brown Sep 1997

A Framework For Assessing The Rationality Of Judgments In Carcinogenicity Hazard Identification, Douglas J. Crawford-Brown, Kenneth G. Brown

RISK: Health, Safety & Environment (1990-2002)

Arguing that guidelines for identifying carcinogens now lack a philosophically rigorous framework, the authors present an alternative that draws clear attention to the process of reasoning towards judgments of carcinogenicity.


The Media, Risk Assessment And Numbers: They Don't Add Up, Sharon M. Friedman Jun 1994

The Media, Risk Assessment And Numbers: They Don't Add Up, Sharon M. Friedman

RISK: Health, Safety & Environment (1990-2002)

Professor Friedman argues that, for risks to be reported accurately, journalism educators must help their students understand science, numbers and statistics.


National Agricultural Information Management System: Meeting Of Data Requirements Of Specialized Institutions., Ukpong G. E, Alegieuno J Sep 1992

National Agricultural Information Management System: Meeting Of Data Requirements Of Specialized Institutions., Ukpong G. E, Alegieuno J

Bullion

The paper examines the general deplorable situation with respect to accumulation of suitable statistical information in the country which has been of grave concern to agriculturalist, economists, business and institutions which need such information for their operations. Many specialized institutions, including the Central bank of Nigeria have, over the years, had their share of bad experience with inadequacy of data, especially with respect of monitoring the performance of the economy and evaluating the impact of policy measures adopted by the government. The main objective of this paper is to explore ways of minimizing identified problems, including the meeting of the …


Tourism Professionals Indicate Research Needs, Robert M. O'Halloran, Donald F. Holecek Jan 1989

Tourism Professionals Indicate Research Needs, Robert M. O'Halloran, Donald F. Holecek

Hospitality Review

County and local tourism officials have a great need for data to help them make their decisions. The authors surveyed professionals to determine data used and needed, the types of decisions made, and where data is obtained. The results provide a profile for information sharing.