Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Library and Information Science (7)
- Engineering (4)
- Life Sciences (3)
- Science and Technology Studies (3)
- Arts and Humanities (2)
-
- Medicine and Health Sciences (2)
- Physical Sciences and Mathematics (2)
- Scholarly Communication (2)
- Scholarly Publishing (2)
- Archival Science (1)
- Comparative and Foreign Law (1)
- Criminology and Criminal Justice (1)
- Environmental Law (1)
- Law (1)
- Legal Studies (1)
- Privacy Law (1)
- Science and Technology Law (1)
- Publication
- File Type
Articles 1 - 17 of 17
Full-Text Articles in Social and Behavioral Sciences
Institutional Repositories For Data Management, Michele Gibney
Institutional Repositories For Data Management, Michele Gibney
Michele Gibney
• Introduction to Institutional Repositories (IRs) / NSUWorks • Big Data in IRs • IRs - Options & Examples • DEEPEND Project Demo
Conversion Of Australian Food Composition Data From Ausnut1999 To 2007 In The Clinical Trial Context, Elizabeth P. Neale, Yasmine C. Probst, Rebecca Thorne, Qingsheng Zhang, Jane E. O'Shea, Marijka J. Batterham, Linda C. Tapsell
Conversion Of Australian Food Composition Data From Ausnut1999 To 2007 In The Clinical Trial Context, Elizabeth P. Neale, Yasmine C. Probst, Rebecca Thorne, Qingsheng Zhang, Jane E. O'Shea, Marijka J. Batterham, Linda C. Tapsell
Dr Marijka Batterham
An Australian food composition database, AUSNUT1999, does not include long chain omega-3 polyunsaturated fatty acid (LC omega-3 PUFA) data. Measurement of the fatty acid content of diets initially analysed using AUSNUT1999 requires conversion to AUSNUT2007, an updated database inclusive of LC omega-3 PUFA. The aim of this study was to convert clinical trial dietary data from AUSNUT1999 to AUSNUT2007 and measure LC omega-3 PUFA intake. Clinical trial diet history (DH) data was converted from AUSNUT1999 to 2007 using a staged approach. Macronutrient intake from AUSNUT1999 and 2007 were calculated and compared via paired t-tests and Wilcoxon Signed Ranks tests. Mean …
Addressing The Deficiencies In The Evidence-Base For Primary Practice In Regional Australia - Sentinel Practices Data Sourcing (Spds) Project: A Pilot Study, Abhijeet Ghosh, Karen E. Charlton, Lisa Girdo, Marijka J. Batterham, Keith Mcdonald
Addressing The Deficiencies In The Evidence-Base For Primary Practice In Regional Australia - Sentinel Practices Data Sourcing (Spds) Project: A Pilot Study, Abhijeet Ghosh, Karen E. Charlton, Lisa Girdo, Marijka J. Batterham, Keith Mcdonald
Dr Marijka Batterham
Background Chronic disease risk on a population level can be quantified through health surveys, either continuous or periodic. To date, information gathered from primary care interactions, using sentinel sites, has not been investigated as a potentially valuable surveillance system in Australia. Methods A pilot study was conducted in a single General Practice in a regional area of New South Wales, Australia to assess the feasibility of accessing data obtained through a computerised chronic disease management program that has been designed for desktop application (Pen Computer Systems (PCS) Clinical Audit Tool: ™ PCS CAT). Collated patient data included information on chronic …
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael
Professor Katina Michael
As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …
Tour-Based Travel Mode Choice Estimation Based On Data Mining And Fuzzy Techniques, Nagesh Shukla, Jun Ma, Rohan Wickramasuriya, Nam N. Huynh, Pascal Perez
Tour-Based Travel Mode Choice Estimation Based On Data Mining And Fuzzy Techniques, Nagesh Shukla, Jun Ma, Rohan Wickramasuriya, Nam N. Huynh, Pascal Perez
Nagesh Shukla
No abstract provided.
Nsuworks Annual Report 2014-2015, Michele Gibney
Nsuworks Annual Report 2014-2015, Michele Gibney
Michele Gibney
In 2014 Nova Southeastern University celebrated its 50th. In conjunction with the anniversary, the NSU Libraries determined a need to preserve the past, present and future of the university by creating a campus wide repository for all scholarship, creative work, and historical materials produced by the university. NSUWorks is a part of the NSU Libraries’ contribution to the university’s ongoing growth and success as an internationally recognized research institution. NSUWorks was launched at the Dean’s Meeting on November 2014, and reached its one year anniversary at the end of February 2015. The NSUWorks Annual Report covers the period of February …
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
Sara Smyth
This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …
Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway
Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway
Alexander Hayes Mr.
Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …
Aspiring To Excellence: Maximising Data To Sustain, Shift And Reshape A Library For The Future, Margie H. Jantti
Aspiring To Excellence: Maximising Data To Sustain, Shift And Reshape A Library For The Future, Margie H. Jantti
Margie Jantti
Perhaps more than ever before, libraries face the challenge of excelling during uncertain times. As library leaders, we have a responsibility to ensure our libraries are reputed as relevant, visible, valued and contemporary. It is imperative that we seek out new methods for maximizing the data that we are invested in and make it more readily accessible and comprehensible to key stakeholders: the senior leadership teams of the library and those of the institution. Yet where does the persuasive evidence lay to demonstrate outcomes aligned to the institution's aims? It is unlikely that library data on its own will be …
Finding Government Data On The Environment.Pdf, Ann Marshall
Finding Government Data On The Environment.Pdf, Ann Marshall
Ann Marshall
No abstract provided.
Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole
Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole
Susan Westerberg Cole
A sabbatical project looked at the research data needs of science faculty at a small liberal arts college in order to determine potential library support services. I concluded that support needs to come from multiple campus units. This study highlighted the value of personal interviews to discover actual needs that had been unanticipated.
Using Gimlet Desk Statistics To Improve Library Services (Nellco), Susan Archambault
Using Gimlet Desk Statistics To Improve Library Services (Nellco), Susan Archambault
Susan Gardner Archambault
*What is Gimlet and how does it work? *Case study of how we use Gimlet at LMU *How can you perform content analysis on your Gimlet data? *Examples of resulting changes/advancements based on user needs at LMU
Error Correlation Between Co2 And Co As Constraint For Co2 Flux Inversions Using Satellite Data, H Wang, D J. Jacob, M Kopacz, D B. A Jones, P Suntharalingam, J A. Fisher, R Nassar, S Pawson, J E. Nielsen
Error Correlation Between Co2 And Co As Constraint For Co2 Flux Inversions Using Satellite Data, H Wang, D J. Jacob, M Kopacz, D B. A Jones, P Suntharalingam, J A. Fisher, R Nassar, S Pawson, J E. Nielsen
Jenny A Fisher
Inverse modeling of CO2 satellite observations to better quantify carbon surface fluxes requires a chemical transport model (CTM) to relate the fluxes to the observed column concentrations. CTM transport error is a major source of uncertainty. We show that its effect can be reduced by using CO satellite observations as additional constraint in a joint CO2-CO inversion. CO is measured from space with high precision, is strongly correlated with CO2, and is more sensitive than CO2 to CTM transport errors on synoptic and smaller scales. Exploiting this constraint requires statistics for the CTM transport error correlation between CO2 and CO, …
Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar
Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar
Hector Escobar
Purpose
Like many academic libraries, the University of Dayton’s Roesch Library houses a writing center. Currently located on the Library’s 2nd floor, it will soon move and become integrated with the library’s reference service. Since the writing center operates independently from the library (e.g., it is staffed by students and reports to different campus administrators), the library reference team, comprised of tenure-line faculty librarians, wanted to better understand writing center services. Given that research and writing are often intertwined, the library was particularly interested in learning how the writing center addressed the evaluation, integration and attribution of sources, tasks similar …
Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar
Using Assessment To Leverage Collaboration With The Campus Writing Center, Heidi Gauder, Hector Escobar
Heidi Gauder
Purpose Like many academic libraries, the University of Dayton’s Roesch Library houses a writing center. Currently located on the Library’s 2nd floor, it will soon move and become integrated with the library’s reference service. Since the writing center operates independently from the library (e.g., it is staffed by students and reports to different campus administrators), the library reference team, comprised of tenure-line faculty librarians, wanted to better understand writing center services. Given that research and writing are often intertwined, the library was particularly interested in learning how the writing center addressed the evaluation, integration and attribution of sources, tasks similar …
A Comparative Analysis Of Multichannel Data Acquisition Systems For Quality Assurance In External Beam Radiation Therapy, Iolanda Fuduli, Claudiu Porumb, Anthony Espinoza, Abdullah Aldosari, Martin Carolan, Michael Lf Lerch, Peter E. Metcalfe, Anatoly Rosenfeld, Marco Petasecca
A Comparative Analysis Of Multichannel Data Acquisition Systems For Quality Assurance In External Beam Radiation Therapy, Iolanda Fuduli, Claudiu Porumb, Anthony Espinoza, Abdullah Aldosari, Martin Carolan, Michael Lf Lerch, Peter E. Metcalfe, Anatoly Rosenfeld, Marco Petasecca
Anthony A Espinoza Mr
The paper presents a comparative study performed by the Centre of Medical Radiation Physics (CMRP) on three multichannel Data Acquisition Systems (DAQ) based on different analogue front-ends to suit a wide range of radiotherapy applications. The three front-ends are: a charge-to-frequency converter developed by INFN Torino, an electrometer and a charge-to-digital converter (both commercial devices from Texas Instruments). For the first two (named DAQ A and B), the CMRP has designed the read-out systems whilst the third one (DAQ C) comes with its own evaluation board. For the purpose of the characterization DAQ A and DAQ B have been equipped …
The Urban, Infrastructural Geography Of ‘The Cloud’ Looking At Where Data Moves, Where It *Lives*, Alan Wiig
The Urban, Infrastructural Geography Of ‘The Cloud’ Looking At Where Data Moves, Where It *Lives*, Alan Wiig
Alan Wiig