Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Data

2015

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 47

Full-Text Articles in Social and Behavioral Sciences

Institutional Repositories For Data Management, Michele Gibney Nov 2015

Institutional Repositories For Data Management, Michele Gibney

Michele Gibney

• Introduction to Institutional Repositories (IRs) / NSUWorks • Big Data in IRs • IRs - Options & Examples • DEEPEND Project Demo


Institutional Repositories For Data Management, Michele Gibney Nov 2015

Institutional Repositories For Data Management, Michele Gibney

Staff Presentations, Proceedings, Lectures, and Symposia

• Introduction to Institutional Repositories (IRs) / NSUWorks • Big Data in IRs • IRs - Options & Examples • DEEPEND Project Demo


Conversion Of Australian Food Composition Data From Ausnut1999 To 2007 In The Clinical Trial Context, Elizabeth P. Neale, Yasmine C. Probst, Rebecca Thorne, Qingsheng Zhang, Jane E. O'Shea, Marijka J. Batterham, Linda C. Tapsell Nov 2015

Conversion Of Australian Food Composition Data From Ausnut1999 To 2007 In The Clinical Trial Context, Elizabeth P. Neale, Yasmine C. Probst, Rebecca Thorne, Qingsheng Zhang, Jane E. O'Shea, Marijka J. Batterham, Linda C. Tapsell

Dr Marijka Batterham

An Australian food composition database, AUSNUT1999, does not include long chain omega-3 polyunsaturated fatty acid (LC omega-3 PUFA) data. Measurement of the fatty acid content of diets initially analysed using AUSNUT1999 requires conversion to AUSNUT2007, an updated database inclusive of LC omega-3 PUFA. The aim of this study was to convert clinical trial dietary data from AUSNUT1999 to AUSNUT2007 and measure LC omega-3 PUFA intake. Clinical trial diet history (DH) data was converted from AUSNUT1999 to 2007 using a staged approach. Macronutrient intake from AUSNUT1999 and 2007 were calculated and compared via paired t-tests and Wilcoxon Signed Ranks tests. Mean …


Addressing The Deficiencies In The Evidence-Base For Primary Practice In Regional Australia - Sentinel Practices Data Sourcing (Spds) Project: A Pilot Study, Abhijeet Ghosh, Karen E. Charlton, Lisa Girdo, Marijka J. Batterham, Keith Mcdonald Nov 2015

Addressing The Deficiencies In The Evidence-Base For Primary Practice In Regional Australia - Sentinel Practices Data Sourcing (Spds) Project: A Pilot Study, Abhijeet Ghosh, Karen E. Charlton, Lisa Girdo, Marijka J. Batterham, Keith Mcdonald

Dr Marijka Batterham

Background Chronic disease risk on a population level can be quantified through health surveys, either continuous or periodic. To date, information gathered from primary care interactions, using sentinel sites, has not been investigated as a potentially valuable surveillance system in Australia. Methods A pilot study was conducted in a single General Practice in a regional area of New South Wales, Australia to assess the feasibility of accessing data obtained through a computerised chronic disease management program that has been designed for desktop application (Pen Computer Systems (PCS) Clinical Audit Tool: ™ PCS CAT). Collated patient data included information on chronic …


The Probability Of Data’S Inherent Sexiness: A Review Of Naked Statistics: Stripping The Dread From The Data, Sean Swenson Nov 2015

The Probability Of Data’S Inherent Sexiness: A Review Of Naked Statistics: Stripping The Dread From The Data, Sean Swenson

The Qualitative Report

Charles Wheelan’s Naked Statistics: Stripping the Dread from the Data (2013) reintroduces the field of statistics to the apathetic reader in an approachable and sympathetic way. By focusing on the acquisition of appreciation for the field over straightforward comprehension, Wheelan is able to achieve what many qualitative researchers have striven for in reintroducing the field to those thought previously lost.


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


The Next Page, Library And Information Technology Oct 2015

The Next Page, Library And Information Technology

The Next Page

The Next Page is a semi-annual newsletter published by Bucknell University's Library and Information Technology department. The publication serves the community by providing software, project, and service updates. Regular features include a letter from the Vice President for L&IT, new staff updates, and interviews. This issue includes the following articles: "From the Vice President for Library and Information Technology," "MISO Survey Results," "Campus Gets Significant Wireless Upgrade," "Orientation 2016," "Scholarship Reception," "New Library and Information Technology Staff," "Simonne Roy Exhibit," "Professional Development is Key."


Tour-Based Travel Mode Choice Estimation Based On Data Mining And Fuzzy Techniques, Nagesh Shukla, Jun Ma, Rohan Wickramasuriya, Nam N. Huynh, Pascal Perez Sep 2015

Tour-Based Travel Mode Choice Estimation Based On Data Mining And Fuzzy Techniques, Nagesh Shukla, Jun Ma, Rohan Wickramasuriya, Nam N. Huynh, Pascal Perez

Nagesh Shukla

No abstract provided.


Nsuworks Annual Report 2014-2015, Michele Gibney Sep 2015

Nsuworks Annual Report 2014-2015, Michele Gibney

Michele Gibney

In 2014 Nova Southeastern University celebrated its 50th. In conjunction with the anniversary, the NSU Libraries determined a need to preserve the past, present and future of the university by creating a campus wide repository for all scholarship, creative work, and historical materials produced by the university. NSUWorks is a part of the NSU Libraries’ contribution to the university’s ongoing growth and success as an internationally recognized research institution. NSUWorks was launched at the Dean’s Meeting on November 2014, and reached its one year anniversary at the end of February 2015. The NSUWorks Annual Report covers the period of February …


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken Jul 2015

Big Data: Challenges And Opportunities For Digital Libraries, Richard Hacken

Faculty Publications

Presented as a Keynote Address to the International Conference on Computing in Engineering and the Sciences in Istanbul, Turkey, on July 30, 2015.

This is an abstract of the speech:

Thanks to technological progress, thanks to the copious Internet, thanks to geometrically burgeoning social media and to quickly proliferating sensors, the flood of data available to us is surging larger and larger, faster and faster. Paradigms for management and analysis are at the core of data-driven businesses and institutions, fueling the velocity of scientific research and development. The phrase “Big Data” was itself coined by scientists as they manipulated exploding …


Effortless Building Census, Sam Kome Jun 2015

Effortless Building Census, Sam Kome

Library Staff Publications and Research

Library headcounts are tedious, time-consuming, and subject to the vagaries of scheduling, attention to detail, and incomplete (especially for consortia). If we conduct them perfectly, on-schedule without fail we can gather at best the number of patrons seated in various areas of the library at two arbitrary times per day. We don't know their home campus. We don't know how patronage varies by time of day. If only there was an automatic way of conducting counts that was automatic, unsleeping, and could differentiate between campuses The wireless infrastructure is (hopefully) always on, and devices are nearly ubiquitous, and typically signed …


Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway Jun 2015

Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway

Alexander Hayes Mr.

Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …


Aspiring To Excellence: Maximising Data To Sustain, Shift And Reshape A Library For The Future, Margie H. Jantti May 2015

Aspiring To Excellence: Maximising Data To Sustain, Shift And Reshape A Library For The Future, Margie H. Jantti

Margie Jantti

Perhaps more than ever before, libraries face the challenge of excelling during uncertain times. As library leaders, we have a responsibility to ensure our libraries are reputed as relevant, visible, valued and contemporary. It is imperative that we seek out new methods for maximizing the data that we are invested in and make it more readily accessible and comprehensible to key stakeholders: the senior leadership teams of the library and those of the institution. Yet where does the persuasive evidence lay to demonstrate outcomes aligned to the institution's aims? It is unlikely that library data on its own will be …


The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina May 2015

The Nine Circles Of Surveillance Hell: An Institutional View Of Information Flows And Information Threats In Libraries, Seeta Peña Gangadharan, Bonnie Tijerina

LACUNY Institute 2015

In the past few years, libraries have started to design public programs that educate patrons about different tools and techniques to protect personal privacy. But do end user solutions provide adequate safeguards against surveillance by corporate and government actors? What does a comprehensive plan for privacy entail in order that libraries live up to their privacy values? In this paper, the authors discuss the complexity of surveillance architecture that the library institution might confront when seeking to defend the privacy rights of patrons. This architecture consists of three main parts: physical or material aspects, logical characteristics, and social factors of …


Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina May 2015

Privacy Advocacy In Libraries In The Age Of Mass Surveillance, Alison Macrina

LACUNY Institute 2015

Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.


Library Privacy Policies In 2015: Strategies For Renewed Relevance, Percy Wise May 2015

Library Privacy Policies In 2015: Strategies For Renewed Relevance, Percy Wise

LACUNY Institute 2015

In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT.

Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need …


Managing The Life-Cycle Of Data, Deeann Allison May 2015

Managing The Life-Cycle Of Data, Deeann Allison

UNL Libraries: Faculty Publications

Prepared as part of an ACRL Course "What You Need to Know about Writing Data Management Plans" this document provides an overview of the components for managing data. Data management includes four areas: discovery, preservation, access, and security.


Linking Old Librarianship To New: Aligning 5-Steps Of The Innovator's Dna In Creating Thematic Discovery Systems For The Everglades, L. Bryan Cooper, Margarita Perez Martinez May 2015

Linking Old Librarianship To New: Aligning 5-Steps Of The Innovator's Dna In Creating Thematic Discovery Systems For The Everglades, L. Bryan Cooper, Margarita Perez Martinez

Works of the FIU Libraries

This poster presentation from the May 2015 Florida Library Association Conference, along with the Everglades Explorer discovery portal at http://ee.fiu.edu, demonstrates how traditional bibliographic and curatorial principles can be applied to: 1) selection, cross-walking and aggregation of metadata linking end-users to wide-spread digital resources from multiple silos; 2) harvesting of select PDFs, HTML and media for web archiving and access; 3) selection of CMS domains, sub-domains and folders for targeted searching using an API.

Choosing content for this discovery portal is comparable to past scholarly practice of creating and publishing subject bibliographies, except metadata and data are housed in …


Finding Government Data On The Environment.Pdf, Ann Marshall Apr 2015

Finding Government Data On The Environment.Pdf, Ann Marshall

Ann Marshall

No abstract provided.


Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole Apr 2015

Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole

Susan Westerberg Cole

A sabbatical project looked at the research data needs of science faculty at a small liberal arts college in order to determine potential library support services. I concluded that support needs to come from multiple campus units. This study highlighted the value of personal interviews to discover actual needs that had been unanticipated.


The Next Page, Library And Information Technology Apr 2015

The Next Page, Library And Information Technology

The Next Page

The Next Page is a semi-annual newsletter published by Bucknell University's Library and Information Technology department. The publication serves the community by providing software, project, and service updates. Regular features include a letter from the Vice President for L&IT, new staff updates, and interviews. This issue includes the following articles: "From the Vice President for Library and Information Technology," "Follow-Me Printing," "Google Drive," "Residential Colleges," "BUI Award," "New Library and IT Staff," "Elise Nicol Exhibit."


Nsuworks Annual Report 2014-2015, Michele Gibney Mar 2015

Nsuworks Annual Report 2014-2015, Michele Gibney

Alvin Sherman Library Brochures, Pamphlets, Reports

In 2014 Nova Southeastern University celebrated its 50th. In conjunction with the anniversary, the NSU Libraries determined a need to preserve the past, present and future of the university by creating a campus wide repository for all scholarship, creative work, and historical materials produced by the university. NSUWorks is a part of the NSU Libraries’ contribution to the university’s ongoing growth and success as an internationally recognized research institution. NSUWorks was launched at the Dean’s Meeting on November 2014, and reached its one year anniversary at the end of February 2015. The NSUWorks Annual Report covers the period …


Using Gimlet Desk Statistics To Improve Library Services (Nellco), Susan Archambault Feb 2015

Using Gimlet Desk Statistics To Improve Library Services (Nellco), Susan Archambault

Susan Gardner Archambault

*What is Gimlet and how does it work? *Case study of how we use Gimlet at LMU *How can you perform content analysis on your Gimlet data? *Examples of resulting changes/advancements based on user needs at LMU


Error Correlation Between Co2 And Co As Constraint For Co2 Flux Inversions Using Satellite Data, H Wang, D J. Jacob, M Kopacz, D B. A Jones, P Suntharalingam, J A. Fisher, R Nassar, S Pawson, J E. Nielsen Feb 2015

Error Correlation Between Co2 And Co As Constraint For Co2 Flux Inversions Using Satellite Data, H Wang, D J. Jacob, M Kopacz, D B. A Jones, P Suntharalingam, J A. Fisher, R Nassar, S Pawson, J E. Nielsen

Jenny A Fisher

Inverse modeling of CO2 satellite observations to better quantify carbon surface fluxes requires a chemical transport model (CTM) to relate the fluxes to the observed column concentrations. CTM transport error is a major source of uncertainty. We show that its effect can be reduced by using CO satellite observations as additional constraint in a joint CO2-CO inversion. CO is measured from space with high precision, is strongly correlated with CO2, and is more sensitive than CO2 to CTM transport errors on synoptic and smaller scales. Exploiting this constraint requires statistics for the CTM transport error correlation between CO2 and CO, …


Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar Feb 2015

Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar

Hector Escobar

Purpose

Like many academic libraries, the University of Dayton’s Roesch Library houses a writing center. Currently located on the Library’s 2nd floor, it will soon move and become integrated with the library’s reference service. Since the writing center operates independently from the library (e.g., it is staffed by students and reports to different campus administrators), the library reference team, comprised of tenure-line faculty librarians, wanted to better understand writing center services. Given that research and writing are often intertwined, the library was particularly interested in learning how the writing center addressed the evaluation, integration and attribution of sources, tasks similar …


Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar Jan 2015

Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar

Heidi Gauder

Purpose Like many academic libraries, the University of Dayton’s Roesch Library houses a writing center. Currently located on the Library’s 2nd floor, it will soon move and become integrated with the library’s reference service. Since the writing center operates independently from the library (e.g., it is staffed by students and reports to different campus administrators), the library reference team, comprised of tenure-line faculty librarians, wanted to better understand writing center services. Given that research and writing are often intertwined, the library was particularly interested in learning how the writing center addressed the evaluation, integration and attribution of sources, tasks similar …


A Comparative Analysis Of Multichannel Data Acquisition Systems For Quality Assurance In External Beam Radiation Therapy, Iolanda Fuduli, Claudiu Porumb, Anthony Espinoza, Abdullah Aldosari, Martin Carolan, Michael Lf Lerch, Peter E. Metcalfe, Anatoly Rosenfeld, Marco Petasecca Jan 2015

A Comparative Analysis Of Multichannel Data Acquisition Systems For Quality Assurance In External Beam Radiation Therapy, Iolanda Fuduli, Claudiu Porumb, Anthony Espinoza, Abdullah Aldosari, Martin Carolan, Michael Lf Lerch, Peter E. Metcalfe, Anatoly Rosenfeld, Marco Petasecca

Anthony A Espinoza Mr

The paper presents a comparative study performed by the Centre of Medical Radiation Physics (CMRP) on three multichannel Data Acquisition Systems (DAQ) based on different analogue front-ends to suit a wide range of radiotherapy applications. The three front-ends are: a charge-to-frequency converter developed by INFN Torino, an electrometer and a charge-to-digital converter (both commercial devices from Texas Instruments). For the first two (named DAQ A and B), the CMRP has designed the read-out systems whilst the third one (DAQ C) comes with its own evaluation board. For the purpose of the characterization DAQ A and DAQ B have been equipped …


A Case Study Of Data In The Management Of Water Resources In The Gunnison River Basin, Colorado, Rhianna L. Williams Jan 2015

A Case Study Of Data In The Management Of Water Resources In The Gunnison River Basin, Colorado, Rhianna L. Williams

Dissertations, Master's Theses and Master's Reports - Open

In the American Southwest, a growing population combined with climate change induced weather pattern changes are creating growing conflict for uses of the over appropriated Colorado River System. Water managers use a variety of tools and data to make decisions at the local and regional level which will impact access for future users. The purpose of this study is to understand how water managers use data and knowledge to manage current and future access to water resources in a water scarce region. A case study of the Gunnison River Basin located within the larger Colorado River Basin was conducted over …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …