Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (3)
- Communication Technology and New Media (3)
- Engineering (2)
- Science and Technology Studies (2)
- Arts and Humanities (1)
-
- Asian History (1)
- Asian Studies (1)
- Business (1)
- Business Intelligence (1)
- Clinical Psychology (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Critical and Cultural Studies (1)
- Data Storage Systems (1)
- Development Studies (1)
- Digital Communications and Networking (1)
- Disability Studies (1)
- E-Commerce (1)
- East Asian Languages and Societies (1)
- Economics (1)
- Environmental Studies (1)
- History (1)
- Information Literacy (1)
- International Relations (1)
- International and Area Studies (1)
- Korean Studies (1)
- Leadership Studies (1)
- Library and Information Science (1)
- Management Information Systems (1)
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Social and Behavioral Sciences
The Essence And Functional Features Of Quality Management In School Education, Nargiza Jamolidinovna Juraeva
The Essence And Functional Features Of Quality Management In School Education, Nargiza Jamolidinovna Juraeva
Scientific reports of Bukhara State University
Introduction. Today, the managers of a modern school are faced with the task of organizing the work of the teaching staff at such a level as to provide all the conditions for the personal development of the student, the development of his creative potential, the conditions for a full-fledged life process, mental comfort, and increased learning efficiency. The article analyzes the essence and functional features of the quality management of school education in the implementation of these tasks. Research methods. Today, the issue of quality management of human activities is becoming the cornerstone of world civilization. However, most scientists believe …
Problematic Social Media Use: Are There Gender Differences In Control And Craving, Aaniyah Childs, Robert West Phd
Problematic Social Media Use: Are There Gender Differences In Control And Craving, Aaniyah Childs, Robert West Phd
Annual Student Research Poster Session
Problematic social media use is characterized by being overly concerned about social media, having an uncontrollable urge to use social media, and devoting ample amounts of time to social media that impairs other important life areas. According to Statista, 15% of people from 23-38 years of age admit they demonstrate problematic social media use, and 30% of all the participants surveyed admit they somewhat demonstrate problematic social media use. Problematic social media use is a growing problem, especially during a time where the world took a momentary pause and people turned to social media during quarantine amidst the pandemic. The …
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
The Impact Of User Control And Transparency In App Design On Privacy Concerns And Behavior Of Mobile App Users, Arwa Alawajy
Dissertations, Theses, and Capstone Projects
Mobile apps have unprecedented access to sensitive personal information. The increasing commodification of mobile-user data motivates us to explore the vital role of app developers in protecting users’ privacy. This dissertation examines the privacy of mobile app users from the perspective of HCI. According to Communication Privacy Management (CPM) theory, people believe they own their personal information and have the right to control how or with whom they share this information. In practice, individuals manage their privacy system and the boundaries between the public and private domain. Users make privacy disclosure decisions according to their individual characteristics and the perceptions …
Negotiating Agency And Control: Theorizing Human-Machine Communication From A Structurational Perspective, Jennifer L. Gibbs, Gavin L. Kirkwood, Chengyu Fang, J. Nan Wilkenfeld
Negotiating Agency And Control: Theorizing Human-Machine Communication From A Structurational Perspective, Jennifer L. Gibbs, Gavin L. Kirkwood, Chengyu Fang, J. Nan Wilkenfeld
Human-Machine Communication
Intelligent technologies have the potential to transform organizations and organizing processes. In particular, they are unique from prior organizational technologies in that they reposition technology as agent rather than a tool or object of use. Scholars studying human-machine communication (HMC) have begun to theorize the dual role played by human and machine agency, but they have focused primarily on the individual level. Drawing on Structuration Theory (Giddens, 1984), we propose a theoretical framework to explain agency in HMC as a process involving the negotiation of control between human and machine agents. This article contributes to HMC scholarship by offering a …
Becoming Human? Ableism And Control In Detroit: Become Human And The Implications For Human-Machine Communication, Marco Dehnert, Rebecca B. Leach
Becoming Human? Ableism And Control In Detroit: Become Human And The Implications For Human-Machine Communication, Marco Dehnert, Rebecca B. Leach
Human-Machine Communication
In human-machine communication (HMC), machines are communicative subjects in the creation of meaning. The Computers are Social Actors and constructivist approaches to HMC postulate that humans communicate with machines as if they were people. From this perspective, communication is understood as heavily scripted where humans mindlessly apply human-to-human scripts in HMC. We argue that a critical approach to communication scripts reveals how humans may rely on ableism as a means of sense-making in their relationships with machines. Using the choose-your-own-adventure game Detroit: Become Human as a case study, we demonstrate (a) how ableist communication scripts render machines as both less-than-human …
North Korea: How Fear Is Used To Control A Nation, Ashley Clisby
North Korea: How Fear Is Used To Control A Nation, Ashley Clisby
Capstone Showcase
The Democratic People’s Republic of Korea, more commonly known as North Korea, is most commonly known for its possession and testing of nuclear weapons and threatening to use these weapons of mass destruction. Less commonly talked about are the human rights violations that are being experienced by the citizens of North Korea. Most, if not all, of the information regarding North Korean human rights that have been reported on comes from individuals who have escaped the Kim regime. There is very limited information traveling in and out of North Korea that is not heavily monitored by the government. These individuals …
The Relationships Between Personality Characteristics Of Hardiness And Resilient Grief Outcomes In An Aging Female Population, Meryle J. Vinje
The Relationships Between Personality Characteristics Of Hardiness And Resilient Grief Outcomes In An Aging Female Population, Meryle J. Vinje
Walden Dissertations and Doctoral Studies
AbstractThere is increasing empirical evidence that bereaved individuals vary considerably in their reactions to loss and that individuals experience varying pathways through the grief process. This quantitative correlational study advanced understanding of Bonanno’s pathways to resilient grief theory and contributed to the strengths-based grief and bereavement literature by examining if hardiness commitment, control, and challenge were significantly related to grief resolution and posttraumatic growth (PTG), controlling for participant age, depression, religiosity, and time since the death of a spouse, in a sample of 218 widowed women aged 50 or older. Descriptive findings revealed that study participants were in their mid-60s, …
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …