Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

8,124 Full-Text Articles 11,171 Authors 3,934,718 Downloads 190 Institutions

All Articles in Science and Technology Studies

Faceted Search

8,124 full-text articles. Page 1 of 325.

Alpha Phi-Shing Fraternity: Phishing Assessment In A Higher Education Institution, Marco Casagrande, Mauro Conti, Monica Fedeli, Eleonora Losiouk 2023 University of Padua

Alpha Phi-Shing Fraternity: Phishing Assessment In A Higher Education Institution, Marco Casagrande, Mauro Conti, Monica Fedeli, Eleonora Losiouk

Journal of Cybersecurity Education, Research and Practice

Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: 1) they store employees and students sensitive data, 2) they save confidential documents, 3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of Redacted aimed to identify the people, and the features of such people, that are more susceptible to phishing attacks. We delivered phishing emails to 1.508 subjects in three separate batches, collecting a clickrate equal to 30%, 11% and 13%, respectively. We considered several features (i.e., age, gender, role, working/studying field, email template) …


Faa Designated Pilot Examiner System Insights, Wendy Beckman, Timothy Rosser, Michael Gref 2023 Middle Tennessee State University

Faa Designated Pilot Examiner System Insights, Wendy Beckman, Timothy Rosser, Michael Gref

National Training Aircraft Symposium (NTAS)

As part of the Reauthorization Act of 2018 the FAA was required to assign to the Aviation Rulemaking Advisory Committee (ARAC) a review of the current Designated Pilot Examiner (DPE) policies. The ARAC in turn assigned this task to the Designated Pilot Examiner Reforms Working Group (DPERWG). This Group delivered its recommendations to the FAA in June 2021, with an FAA response to the Group due by June 2022. The purpose of this research project is to provide more insight regarding the current DPE system from all stakeholders prior to that deadline. Survey data from both current DPE’s and flight …


Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi 2023 Center for Educational and Instructional Technology Research Center (CEITR) / School of Advanced Studies / University of Phoenix

Revisiting Cybersecurity Awareness In The Midst Of Disruptions, Avideh Sadaghiani-Tabrizi

International Journal for Business Education

The awareness of cybersecurity and knowledge about risks from a variety of threats, which present harm or steal private information in internetworking could help in mitigation of vulnerabilities to risks of threats in safeguarding information from malware and bots. Revisiting cybersecurity awareness of every member and evaluation of organization’s posture might help to protect sensitive or private information from a network of computers, working together and forming into botnets. The purpose of the qualitative case study narrative was to explore prospects for integrating cybersecurity education into elementary school children’s curriculum through interviews of elementary schoolteachers, IT experts, and parents to …


A Field Test Of Popular Chatbots’ Responses To Questions Concerning Negative Body Image, Ruopeng An, Christopher W. Byron Jr., Chen Chen, Xiaoling Xiang 2023 Washington University in St. Louis

A Field Test Of Popular Chatbots’ Responses To Questions Concerning Negative Body Image, Ruopeng An, Christopher W. Byron Jr., Chen Chen, Xiaoling Xiang

Health Behavior Research

Background: Chatbots are computer programs, often built upon large artificial intelligence models, that employ dialogue systems to enable online, natural language conversations with users via text, speech, or both. Body image, broadly defined as a combination of thoughts and feelings about one’s physical appearance, has been implicated in many risk behaviors and health problems, especially among adolescents and young adults. Little is known about how chatbots respond to questions about body image.

Methods: This study assessed the responses of 14 widely-used chatbots (eight companion and six therapeutic chatbots) to ten body image-related questions developed upon validated instruments. Chatbots’ responses were …


Aclp - Updated Estimates Of State Bead Allocations - As Of January 2023, New York Law School 2023 New York Law School

Aclp - Updated Estimates Of State Bead Allocations - As Of January 2023, New York Law School

Reports and Resources

No abstract provided.


Research Protocol: Focus Group/Needs Assessment (Afam Community), Karen A. Rader, Cynthia Gibbs 2023 Virginia Commonwealth University

Research Protocol: Focus Group/Needs Assessment (Afam Community), Karen A. Rader, Cynthia Gibbs

STS in Science Cafes

No abstract provided.


Research Tool: Sts Assessment Survey Instrument, Karen A. Rader, Cynthia Gibbs 2023 Virginia Commonwealth University

Research Tool: Sts Assessment Survey Instrument, Karen A. Rader, Cynthia Gibbs

STS in Science Cafes

No abstract provided.


Dataset: Combined Coded Assessments Of Sts Science Cafes (2017-2019), Karen A. Rader, Cynthia Gibbs 2023 VCU

Dataset: Combined Coded Assessments Of Sts Science Cafes (2017-2019), Karen A. Rader, Cynthia Gibbs

STS in Science Cafes

No abstract provided.


Gender Ambiguity In Voice-Based Assistants: Gender Perception And Influences Of Context, Sandra Mooshammer, Katrin Etzrodt 2022 Technische Universitaet Dresden

Gender Ambiguity In Voice-Based Assistants: Gender Perception And Influences Of Context, Sandra Mooshammer, Katrin Etzrodt

Human-Machine Communication

Recently emerging synthetic acoustically gender-ambiguous voices could contribute to dissolving the still prevailing genderism. Yet, are we indeed perceiving these voices as “unassignable”? Or are we trying to assimilate them into existing genders? To investigate the perceived ambiguity, we conducted an explorative 3 (male, female, ambiguous voice) × 3 (male, female, ambiguous topic) experiment. We found that, although participants perceived the gender-ambiguous voice as ambiguous, they used a profoundly wide range of the scale, indicating tendencies toward a gender. We uncovered a mild dissolve of gender roles. Neither the listener’s gender nor the personal gender stereotypes impacted the perception. However, …


Jews And Science, Sander L. Gilman 2022 Emory University

Jews And Science, Sander L. Gilman

The Jewish Role in American Life: An Annual Review

Jews and Science examines the complicated relationship between Jewish identities and the evolving meanings of science throughout the history of Western academic culture. Jews have been not only the agents for study of things Jewish, but also the subject of examination by “scientists” across a range of disciplines, from biology and bioethics to anthropology and genetics. Even the most recent iteration of Jewish studies as an academic discipline—Israel studies—stresses the global cultural, economic, and social impact of Israeli science and medicine.

The 2022 volume of the Casden Institute’s Jewish Role in American Life series tackles a range of issues that …


Enterprise Risk Management: Small And Medium Business, vasili krespis 2022 California State University, San Bernardino

Enterprise Risk Management: Small And Medium Business, Vasili Krespis

Electronic Theses, Projects, and Dissertations

This culminating experience project examined common risk management trends and challenges that SMEs face and provided methods and tools that could limit threats and impact of unforeseeable events. This project demonstrates why business owners should use a risk management planning framework. The research questions were: (Q1) What are risk identification strategies which do not overstrain SMEs' limited resources? (Q2) How may risk analysis be performed effectively in SMEs? (Q3) How does the SMEs risk management system change over time? (Q4) What are the most effective risk analysis techniques and strategies for SMEs with limited resources?

A case study was examined …


An Exploration Into The Design Of A Portable Music Player For People With Alzheimer’S And Dementia, Jaxon V. Silva 2022 California Polytechnic State University, San Luis Obispo

An Exploration Into The Design Of A Portable Music Player For People With Alzheimer’S And Dementia, Jaxon V. Silva

Liberal Arts and Engineering Studies

An exploration into the design of a portable music player for people with Alzheimer's and dementia.


Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli 2022 University of Tennessee, Knoxville

Research Data Management Policy & Organizational Compliance: An Exploratory Study In The Academic Context, Monica Inez Ihli

Doctoral Dissertations

Research data management (RDM) describes a broad array of processes and activities aimed at ensuring that data are documented, organized, findable, and preserved for future access. In January 2023, the National Institutes of Health will begin enforcing the strictest data management requirements of a U.S. federal agency to date, including potential consequences for organizations whose researchers fail to demonstrate compliance with commitments to data management and sharing. This dissertation makes two major assessment-based contributions in support of organizational preparedness for policy compliance. First, it reports the results of a pilot study at a high research institution for a survey instrument, …


Mining Public Opinion On Covid-19 Vaccines Using Unstructured Social Media Data, Chad Aaron Melton 2022 University of Tennessee, Knoxville

Mining Public Opinion On Covid-19 Vaccines Using Unstructured Social Media Data, Chad Aaron Melton

Doctoral Dissertations

The emergence of the novel coronavirus (COVID-19), and the necessary separation of populations led to an unprecedented number of new social media users seeking information related to the pandemic. Nowadays, with an estimated 4.5 billion users worldwide, social media data offer an opportunity for near real-time analysis of large bodies of text related to disease outbreaks and vaccination. This study investigated and compared public discourse related to COVID-19 vaccines expressed on two popular social media platforms, Reddit and Twitter. Approximately 9.5 million Tweets and 70 thousand Reddit comments were analyzed from dates January 1, 2020, to March 1, 2022, and …


A Study On The Environmental And Societal Impact Of Salad Packaging, Nathanael Stephens 2022 Clemson University

A Study On The Environmental And Societal Impact Of Salad Packaging, Nathanael Stephens

All Theses

Packaged salads are becoming an increasingly popular segment of today’s fresh cut vegetables and salads market. This increased demand is leading to an increased need for packaging. This increase in packaging can lead to a potential increase in impact on the environment. With a large push for sustainability in the modern economy, this environmental impact is becoming more and more unacceptable. Several studies have been conducted to determine environmental impacts of packaging, but none have homed in on the salad packaging market segment in detail until this study. This study is also pioneering the way by pairing environmental impacts of …


Examining Mobile Health App Engagement In A North American Employee Population: A One-Year Longitudinal Observational Study, Nabil Ratanshi 2022 The University of Western Ontario

Examining Mobile Health App Engagement In A North American Employee Population: A One-Year Longitudinal Observational Study, Nabil Ratanshi

Electronic Thesis and Dissertation Repository

BACKGROUND: Mobile health (mHealth) apps may help promote physical activity and other health behaviours among office-based workers. Low app engagement, however, leading to little or no effect is typical. OBJECTIVE: To examine engagement with a rewards-based mHealth app and identify factors influencing engagement. METHODS: A one-year observational study was conducted with Canadian and U.S. users of the Sprout at Work app (N=2253; Female: 35.7%; Age: 39.3 years). Kaplan-Meier survival curves were used to examine engagement patterns from a ‘multiple-lives’ perspective (i.e., time to first disengagement, re-engagement, second disengagement). Regression models were used to identify factors influencing engagement. RESULTS: After one …


Competing Visions Of Fundamental Global Change: Comparative Book Review Of Rethinking Humanity By Seba & Arbib, Cristian Ziliberberg 2022 Aalborg University

Competing Visions Of Fundamental Global Change: Comparative Book Review Of Rethinking Humanity By Seba & Arbib, Cristian Ziliberberg

Markets, Globalization & Development Review

No abstract provided.


Breaking The Barriers: A Phenomenological Study Of Women’S Non-Governmental Organisations’ Adoption Of Social Media, Muhammad Kabir Abubakar, Patricia Neo Mooko 2022 Umaru Musa Yar-adua University, Katsina, Nigeria.

Breaking The Barriers: A Phenomenological Study Of Women’S Non-Governmental Organisations’ Adoption Of Social Media, Muhammad Kabir Abubakar, Patricia Neo Mooko

Library Philosophy and Practice (e-journal)

Organizations now frequently use social media as a tool for communication and information sharing. Although many studies have examined the various context-specific barriers to technology adoption in organizations, few of them have a direct bearing on the particular barriers to social media adoption. Organizations can use social media for their activities with the help of understanding the adoption barriers. Investigating the most important impediments to social media adoption in women’s non-governmental organisations (WNGOs) in North-West Nigeria is the goal of this study. The study used a phenomenological approach-based qualitative research design. Semi-structured interviews were used to gather data from ten …


Path Choice Of Algorithm Intellectual Property Protection, Yulu JIN, Youdan XIAO 2022 Law School, Beijing Normal University, Beijing 100875, China

Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao

Bulletin of Chinese Academy of Sciences (Chinese Version)

Protection of algorithm by intellectual property is a powerful way to stimulate innovation and regulate the risk of the algorithm. Algorithm that can be protected by intellectual property right is the program algorithm, which is compiled in computer language, in the form of coded instruction sequence, run by the computer and produce independent rational value results. The article is combed out that there are drawbacks to the traditional path of IP to protect program algorithms:it has conflict between program algorithm and copyright law system; the trade secret path is at odds with program algorithmic governance; and program algorithm can hardly …


Aclp - Broadband Planning Tool Kit - October 2022, New York Law School 2022 New York Law School

Aclp - Broadband Planning Tool Kit - October 2022, New York Law School

Reports and Resources

This Tool Kit provides state and local policymakers with a range of resources and analyses for use during broadband planning. The Tool Kit focuses on the array of grant and other funding opportunities available to states and localities as a result of the Infrastructure Investment & Jobs Act, as well as other pandemic-era stimulus programs. However, the Tool Kit is also useful for broadband planning outside of these specific funding programs. Indeed, the Tool Kit offers foundational planning resources that can be used now and in the future by officials, ISPs, and other stakeholders in the broadband space.


Digital Commons powered by bepress