Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 26619

Full-Text Articles in Social and Behavioral Sciences

An Examination Of Research Data Sharing And Re-Use: Implications For Data Citation Practice, Hyoungjoo Park, Dietmar Wolfram Dec 2016

An Examination Of Research Data Sharing And Re-Use: Implications For Data Citation Practice, Hyoungjoo Park, Dietmar Wolfram

School of Information Studies Faculty Articles

This study examines characteristics of data sharing and data re-use in Genetics and Heredity, where data citation is most common. This study applies an exploratory method because data citation is a relatively new area. The Data Citation Index (DCI) on the Web of Science was selected because DCI provides a single access point to over 500 data repositories worldwide and to over two million data studies and datasets across multiple disciplines and monitors quality research data through a peer review process. We explore data citations for Genetics and Heredity, as a case study by examining formal citations recorded in the …


Oceans Of Space, Stephanie Steinbrecher '16 Dec 2016

Oceans Of Space, Stephanie Steinbrecher '16

EnviroLab Asia

"Oceans of Space" relates my observations of the 2016 EnviroLab Asia Clinic Trip to Singapore and Sarawak, Malaysia. In this meditation, the concept of space serves as a lens to examine assumptions of geopolitical, historical, and philosophical positioning—regionally and globally. At the center of my inquiry is EnviroLab's connection to the Dayak communities in Baram, Sarawak. This region is experiencing dramatic social and ecological change as a result of industrial development. By triangulating my subjective impressions of this space, various knowledge systems, and the qualitative data EnviroLab gathered in Southeast Asia, I aim to untangle some paradoxes that complicate the …


Staff Knowledge And Attitudes Toward Recovery Principles Among Mental Health Professionals Who Work With Adult Psychiatric Inpatients, Hussain Alhashem Dec 2016

Staff Knowledge And Attitudes Toward Recovery Principles Among Mental Health Professionals Who Work With Adult Psychiatric Inpatients, Hussain Alhashem

PCOM Psychology Dissertations

Recovery from serious mental illness (SMI) promotes a lifestyle that enables individuals to overcome obstacles related to mental illness and to become hopeful, responsible, and empowered to contribute to society (Anthony, 1993; Jacobson & Greenley, 2001). This study addressed the mental health worker’s knowledge and attitudes toward recovery principles, utilizing an online survey method to examine the relationship between staff knowledge of and attitudes toward recovery principles among mental health professionals who work in inpatient psychiatric settings that serve adult patients. Participants in this study included staff members at inpatient psychiatric hospital facilities in the United States. Results from this …


Town Of Weston Annual Report Year Ending June 30, 2017, Weston (Me.). Municipal Officers Dec 2016

Town Of Weston Annual Report Year Ending June 30, 2017, Weston (Me.). Municipal Officers

Maine Town Documents

No abstract provided.


Book Review: Making Media Studies By David Gauntlett, Antonio Lopez Dec 2016

Book Review: Making Media Studies By David Gauntlett, Antonio Lopez

Journal of Media Literacy Education

Making Media Studies is a collection of previously published and updated works by David Gauntlett, including his infamous essay, “Media Studies 2.0.” It explores ways in which the traditional media studies paradigm has been disrupted by prosumers and the practices of everyday people and DIY “makers” who are using the internet to learn, make things and share ideas. He argues that media studies practitioners need to learn from the makers movement to encourage more creativity, design thinking and conversation. Gauntlett positions himself as an optimist and criticizes overly negative approaches to internet culture that he sees as common among media …


Book Review: Healthy Teens, Healthy Schools By Vanessa Domine, Hailee K. Dunn Dec 2016

Book Review: Healthy Teens, Healthy Schools By Vanessa Domine, Hailee K. Dunn

Journal of Media Literacy Education

No abstract provided.


Locating Community Action Outreach Projects In The Scholarship Of Media Literacy Pedagogy, Heather Crandall Dec 2016

Locating Community Action Outreach Projects In The Scholarship Of Media Literacy Pedagogy, Heather Crandall

Journal of Media Literacy Education

This paper compares frameworks in recent critical media literacy scholarship with trends found in eight semesters of media literacy community action outreach assignments to explore how these frameworks can function as curricular tools for media literacy practitioners. Besides potential tools for media literacy pedagogy, this examination of recent literature uncovers new considerations and directions for the field of media literacy education. These include tensions present in the practice of teaching from a critical perspective, observations about student use of newer technologies for social change, and concerns to include in critical media literacy literature.


Smartphone Apps In Education: Students Create Videos To Teach Smartphone Use As Tool For Learning, Kara E. Clayton, Amanda Murphy Dec 2016

Smartphone Apps In Education: Students Create Videos To Teach Smartphone Use As Tool For Learning, Kara E. Clayton, Amanda Murphy

Journal of Media Literacy Education

Smartphones are regular classroom accessories. Educators should work with children to understand the capacity of smartphones for learning and civic engagement, rather than being a classroom distraction. This research supports a collaborative project the authors engaged in with students in two states to discover what the perception of smartphone use was by students and teachers. One element of this project included students producing YouTube style tutorials on the educational use of mobile apps. The authors explored smartphone use in the classroom. Student created products correlated to technology trends in K-12 education and their relationship with state by state demographic data.


Living And Leading In A Digital Age: A Narrative Study Of The Attitudes And Perceptions Of School Leaders About Media Literacy, Kerrigan R. Mahoney, Tehmina Khwaja Dec 2016

Living And Leading In A Digital Age: A Narrative Study Of The Attitudes And Perceptions Of School Leaders About Media Literacy, Kerrigan R. Mahoney, Tehmina Khwaja

Journal of Media Literacy Education

Students graduating from K-12 education need media literacy skills to engage, participate, and learn in a world in which literacy must keep pace with rapidly changing technologies. Given the significant roles school administrators play in providing leadership and vision to their schools, this narrative study addresses the research question: What are school administrators’ perceptions of, and attitudes about, media literacy? Through the stories of six K-12 school administrators, we highlight the connections of their experiences and attitudes to the actions they take to support media literacy learning, and their visions for technology, instruction, and learning in their schools.


What Do You Use Mobile Phones For? A Creative Method Of Thematic Drawing With Adolescents In Rural China, Jiachun Hong Dec 2016

What Do You Use Mobile Phones For? A Creative Method Of Thematic Drawing With Adolescents In Rural China, Jiachun Hong

Journal of Media Literacy Education

This study sets out to explore Chinese adolescents’ subjectivities toward the use of mobile phones, and reveal the dynamic relationship among students, parents, and school concerning mobile phone usage in rural China. Twenty-one high school students were recruited, and asked to draw a painting that expresses their perceptions of mobile phones in relation to family and school life. After analyzing the thematic drawings and their self-explanations upon the drawings, several themes arise: the mobile phone as a bridge of love, as an extension of the home, as an iron cage, as the blasting fuse of family conflicts, and as a …


Media Detectives: Bridging The Relationship Among Empathy, Laugh Tracks, And Gender In Childhood, Sruti Kanthan, James A. Graham, Lynne Azarchi Dec 2016

Media Detectives: Bridging The Relationship Among Empathy, Laugh Tracks, And Gender In Childhood, Sruti Kanthan, James A. Graham, Lynne Azarchi

Journal of Media Literacy Education

Empathy in college-age students is decreasing at unprecedented rates. Understanding empathy in children can act as primary prevention in tackling the problem. This study considers laugh tracks’ capacity to bias reality, foster empathy, and investigate differences across time and gender in 181 fifth grade students. The results from this quasi-experimental study suggests that students’ perceptions of the relationship between empathy and canned laughter changed significantly from pretest to posttest survey questions. Statistically significant differences were present for gender, as well. Theoretical and practical implications of using laugh tracks to increase empathy in middle and late childhood are discussed.


A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs Dec 2016

A Phenomenological Investigation Of Social Networking Site Privacy Awareness Through A Media Literacy Lens, David Magolis, Audra Briggs

Journal of Media Literacy Education

This research study focused on the social networking site (SNS) awareness of undergraduate students, examining their experiences through the type and extent of the information shared on their SNSs in order to discover the students’ experiences with SNS privacy. A phenomenological research approach was used to interview eight undergraduate to explore the question, “what is the nature of undergraduate students’ social networking privacy?” Each recorded interview lasted up to one hour in duration and was transcribed verbatim. A thematic analysis of the interview data revealed that all of the participants were aware of their online privacy, but each had different …


Predicting Parental Mediation Behaviors: The Direct And Indirect Influence Of Parents’ Critical Thinking About Media And Attitudes About Parent-Child Interactions, Eric E. Rasmussen, Shawna R. White, Andy J. King, Steven Holiday, Rebecca L. Densley Dec 2016

Predicting Parental Mediation Behaviors: The Direct And Indirect Influence Of Parents’ Critical Thinking About Media And Attitudes About Parent-Child Interactions, Eric E. Rasmussen, Shawna R. White, Andy J. King, Steven Holiday, Rebecca L. Densley

Journal of Media Literacy Education

Many parents fail to interact with their children regularly about media content and past research has identified few predictors of parents’ engagement in parental mediation behaviors. The present study explored the relationship between parents’ critical thinking about media and parents’ provision of both active and restrictive mediation of television content. Results revealed that parents’ critical thinking about media is positively associated with both active and restrictive mediation, relationships mediated by parents’ attitudes toward parent-child interactions about media. These findings suggest that media literacy programs aimed at improving parents’ critical thinking about media may be an effective way to alter children’s …


Gerald Davis, The Vanishing American Corporation (2016), James R. Blair Dec 2016

Gerald Davis, The Vanishing American Corporation (2016), James R. Blair

Markets, Globalization & Development Review

No abstract provided.


Euny Hong, The Birth Of Korean Cool (2014), Soonkwan Hong Dec 2016

Euny Hong, The Birth Of Korean Cool (2014), Soonkwan Hong

Markets, Globalization & Development Review

No abstract provided.


Daniel Tudor, Korea: The Impossible Country (2013), Jiyoon An Dec 2016

Daniel Tudor, Korea: The Impossible Country (2013), Jiyoon An

Markets, Globalization & Development Review

No abstract provided.


The Impact Of Ethical Concerns On Fashion Consumerism: A Review, Lena Cavusoglu, Mourad Dakhli Dec 2016

The Impact Of Ethical Concerns On Fashion Consumerism: A Review, Lena Cavusoglu, Mourad Dakhli

Markets, Globalization & Development Review

Ethical and sustainable business practices have become some of the most significant concerns in the highly globalized fashion industry. Firms in this multi-billion dollar industry are taking these concerns seriously, and are carefully monitoring and responding to consumers’ actions that can range from expressing displeasure via social media to holding protests or even calling for boycotts of certain brands and firms. In this paper, the first output from a larger project on ethics of fashion, we review the extant literature on the ethical aspects of the global fashion system; and set the stage for further empirical and conceptual work.


Exploring Late Globalization: A Viewpoint, Romeo V. Turcan Dec 2016

Exploring Late Globalization: A Viewpoint, Romeo V. Turcan

Markets, Globalization & Development Review

The purpose of this viewpoint paper is to motivate a program of research on late globalization, a program that could eventually lead to one or more significant theories of late globalization. The paper explores the phenomenon of late globalization as well as the idea of “late” by drawing on sparse literature on late globalization from sociocultural and economic perspectives. It illustrates in a vignette the character and features of late globalization observable in the withdrawal from foreign locations or de-internationalization of universities, as late globalizing entities. The paper discusses the range of constructs around the core idea of late globalization, …


Cybersecurity And Development, Nir Kshetri Dec 2016

Cybersecurity And Development, Nir Kshetri

Markets, Globalization & Development Review

While scholars and policymakers have realized the importance of information and communication technologies in economic development, relatively less attention has been given to the role of cybersecurity. This research sheds light on issues associated with the "dark side" of digitization in the Global South. We examine the hollowness in the Global South’s digitization initiatives that is associated with a poor cybersecurity. The article also advances our understanding of how institutional and structural characteristics of the Global South influence cybersecurity.


Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz Dec 2016

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz

Markets, Globalization & Development Review

Markets and marketing are integral to human welfare and survival. When used however for the purposes of war and other systemically violent conflict, they can be devastating and pose an existential threat to humanity. Drawing on experience in war-ravaged and recovering economies, the author examines a stream of research on marketing systems disrupted or destroyed by war. Some underlying conditions and predictors of war and its peaceful resolution are introduced, including social traps and their mitigation or elimination. An argument is revisited for marketing as a form of constructive engagement, which must be implemented to affect and to develop equitable …


A Journal For A Fast-Changing World, Nikhilesh Dholakia, Deniz Atik Dec 2016

A Journal For A Fast-Changing World, Nikhilesh Dholakia, Deniz Atik

Markets, Globalization & Development Review

No abstract provided.


Winona Currents Annual Report 2016, University Advancement - Winona State University Dec 2016

Winona Currents Annual Report 2016, University Advancement - Winona State University

Winona Currents

Winona Currents Annual Report for 2016.


Scholarworks Usage Report,12-2016, Central Washington University Dec 2016

Scholarworks Usage Report,12-2016, Central Washington University

ScholarWorks Reports

This report contains usage statistics for ScholarWorks @ CWU, including downloads and page views for various content types available throughout the repository.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …