To see the other types of publications on this topic, follow the link: Political aspects of Electronic data processing.

Dissertations / Theses on the topic 'Political aspects of Electronic data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 dissertations / theses for your research on the topic 'Political aspects of Electronic data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wan, Charn Wing. "The political economy of digital copyright in Hong Kong /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?jsd-slw-b23750893f.pdf.

Full text
Abstract:
Thesis (JSD)--City University of Hong Kong, 2009.
"Submitted to School of Law in partial fulfillment of the requirements for the degree of Doctor of Juridical Science." Includes bibliographical references (leaves 435-452)
APA, Harvard, Vancouver, ISO, and other styles
2

Marks, Steven Adam. "Nurses' attitudes toward computer use for point-of-care charting." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/2006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Devaney, Mark David. "Plan recognition in a large-scale multi-agent tactical domain." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/9195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pelletier, Johanne. "A matter of time : digital patina and timeboundedness in new media." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98571.

Full text
Abstract:
The term patina refers to a particular quality of decay in material objects, where the decay is both a physical and symbolic property of the object. As a physical property patina is an expression of the passage of time, a visual marker of the object's timeboundedness reflected in signs of ageing and/or use. This thesis considers the implications of a digital patina, including its relevance for an analysis of the relationship between things and time or timeboundedness.
APA, Harvard, Vancouver, ISO, and other styles
5

Wilson, Kevin G. 1952. "The social significance of home networking : public surveillance and social management." Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=72035.

Full text
Abstract:
This thesis analyzes the social significance of the integration of the home into computer networks. The social significance of home networking is grasped when these systems are understood in their relationship to emerging forms of electronic social control. The thesis establishes this connection through an analysis of structural trends in the videotex industry which demonstrates the value to the corporate sector of cybernetic information generated by interactive systems. The North American tradition of privacy policy is reviewed and demonstrated as inadequate for the protection of personal privacy in home networking. It is further shown that privacy policy does not represent an adequate theorization of social control in computer networking, since it does not account for practices of aggregate social control, which have been termed in the thesis "social management," so vital to the cybernetic economy of late capitalism. Finally, the thesis argues that current conceptual frameworks and policy mechanisms cannot assure the socially beneficial development of home networking, given the tendency towards the integration of such systems into structures of social control.
APA, Harvard, Vancouver, ISO, and other styles
6

Hunter, Marc W. "CRT anti-glare treatments, image quality, and human performance." Diss., Virginia Polytechnic Institute and State University, 1988. http://hdl.handle.net/10919/52323.

Full text
Abstract:
This dissertation was a two-phase effort. Phase I investigated the physical image quality of 16 mesh, etched, and quarterwave antireflection filters for varying levels of filter transmissivity. Three levels of ambient lighting and two levels of monochrome CRT resolution were combined factorially with the filters. In addition, user measures of readability, legibility, and perceived image quality were obtained for these same filter and environmental conditions. Quantitative models were developed to predict the performance and subjective data based on signal and noise measures derived from the physical measurements. Phase II examined the effects of a wide range of filter transmissions and diffuse illuminance on measured image quality and the same user measures as in Phase I. Phase I showed that while none of the glare filters yielded improved readability or legibility over a baseline condition, the etched and low transmission filters were notable for their degradation of human performance. Mesh and quarterwave filters were found to improve perceived image quality when a specular glare source was present. Modeling was minimally successful for the reading and legibility tasks, but yielded good fit models for perceived image quality. Phase II showed that when even extreme losses in display contrast occurred, users were capable of good reading and legibility performance. Perceived image quality was inversely related to illuminance level. Prediction of performance by image quality metrics was generally not too successful. It was concluded that in office-type environments, mesh or quarterwave filters can be used to improve perceived image quality when specular glare sources are present, but that no anti-glare filters yielded enhanced short-term readability or legibility over a baseline. Etched filters were not recommended. Measures of physical image quality proved to be good predictors of perceived image quality, but not of timed measures of readability or legibility. Under moderate lighting conditions, monochrome CRTs should be fitted with fairly high transmission filters as it was found the contrast enhancement offered by low transmission filters had negligible effects on performance. Finally, consistent and repeatable findings of degraded legibility for high luminance contrast levels (low illuminance) generated questions as to the existing standards regarding maximum contrast requirements for CRT use.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Quiñones, Cesar. "Implementation business-to-consumer electronic commerce website using asp.net web programming framework." CSUSB ScholarWorks, 2003. https://scholarworks.lib.csusb.edu/etd-project/2948.

Full text
Abstract:
The purpose of this project is to demonstrate an integration of real world, real time e-commerce with the knowledge and experience gained in participating in the Masters of Business Administration -- Information Management program at California State University, San Bernardino. It is this knowledge and experience that is used to create a Business-To-Consumer (B2C) electronic commerce application (ECA) using available Internet and information management technology. This project presents all aspects of the simulation beginning with the background research of the canine services and supplies industry and ending with an e-commerce simulation and post implementation audit.
APA, Harvard, Vancouver, ISO, and other styles
8

Gottleber, Timothy Theodore. "The Association between Attitudes toward Computers and Understanding of Ethical Issues Affecting Their Use." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc277720/.

Full text
Abstract:
This study examines the association between the attitudes of students toward computers and their knowledge of the ethical uses of computers. The focus for this research was undergraduate students in the Colleges of Arts and Sciences (Department of Computer Science), Business and Education at the University of North Texas in Denton, Texas.
APA, Harvard, Vancouver, ISO, and other styles
9

Teesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.

Full text
Abstract:
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
APA, Harvard, Vancouver, ISO, and other styles
10

Fu, Yuk-kam Connie, and 傅玉琴. "The use of web 2.0 social media tools by the HKSAR Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46780324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fung, Man-chee, and 馮敏芝. "Evaluation of the implementation of social media of Hong Kong Government." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46780361.

Full text
Abstract:
E-engagement in public policies can be defined as citizens’ connection with and participation in making public policies. The primary goal of connecting citizens during making public policies is to improve efficiency of the governance of government and the acceptance of public policies. To enhance public engagement in making public policies, the Hong Kong Government is trying out to take soundings from the community and to gauge public views on the government and public policies through social media platform, such as Facebook, twitters, blogs and so on. To evaluate the implementation of social media of the Hong Kong Government, including how the social media encourages public engagement in public policies, how and why the government employs the views collected from social media platforms in making public policies, framework of Public Involvement Spectrum in Local Governance put forward by the International Association for Public Participation (IAP2), its adapted form developed by Lukensmeyer and Torres and case studies methodology will be applied in this dissertation. This dissertation sought to understand more on the implementation of social media by the Hong Kong Government and what strategy should be applied by the government in e-engagement. This study suggested that the Hong Kong Government tend to use social media to inform, involve and collect views from the public rather than empowering the public in making public policies. And the Hong Kong Government has successfully increased public awareness of certain public policies or issues through social media platform but the acceptance on certain policies or the support rating for the Government may not be benefited from the use of social media. Based on the analysis and observations from this study, it provides a useful and practical roadmap for future study and development of social media in e-engagement.
published_or_final_version
Politics and Public Administration
Master
Master of Public Administration
APA, Harvard, Vancouver, ISO, and other styles
12

Riley, Will. "We the undersigned." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28102.

Full text
Abstract:
Thesis (M. S.)--Literature, Communication, and Culture, Georgia Institute of Technology, 2009.
Committee Chair: DiSalvo, Carl; Committee Member: Bogost, Ian; Committee Member: Klein, Hans; Committee Member: Murray, Janet; Committee Member: Pearce, Celia
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Ching-Ling. "Java/XML-based Trading Information Processing System for produce wholesale market." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Jie. "Moral Judgment and Digital Piracy: Predicting Attitudes, Intention, and Behavior Regarding Digital Piracy Using a Modified Version of the Defining Issues Test." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc822761/.

Full text
Abstract:
Digital piracy, the illegal copying or downloading of copyrighted digital products without approval from the copyright holders, has brought great economic loss to the software and digital media industries. Previous studies using moral developmental theory have not found consistent relationships between moral judgment and attitudes towards digital piracy. While some researchers have developed individual test items to assess relationships between moral judgment and attitudes toward digital piracy, others have relied on the Defining Issues Test (DIT). However, in that the DIT represents a general measure of moral judgment based on broad social issues, it, too, may not adequately assess an individual’s reasoning specific to issues regarding digital piracy. The purpose of this study was to create a reliable instrument (i.e., DP-DIT) modeled after the DIT designed to assess moral judgment regarding digital piracy as well as to examine and compare the ability of both DP-DIT and DIT2-short to predict attitudes, intentions and behaviors regarding digital piracy of college students. Results indicated the reliability of both the DIT2-short and the DP-DIT were discounted, quite likely due to the small number of stories contained in each. DP-DIT appeared to have greater predictive ability due to its advantage in predicting attitudes toward digital piracy, especially using DP-DIT MNS. However, even though here DP-DIT MNS was the strongest predictor of attitudes toward digital piracy, it explained a limited amount of variance. Further research to improve reliability and validity of DP-DIT is warranted.
APA, Harvard, Vancouver, ISO, and other styles
15

Kativu, Tatenda Kevin. "A framework for the secure consumerisation of mobile, handheld devices in the healthcare institutional context." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18630.

Full text
Abstract:
The advances in communication technologies have resulted in a significant shift in the workplace culture. Mobile computing devices are increasingly becoming an integral part of workplace culture. Mobility has several advantages to the organisation, one such example is the “always online” workforce resulting in increased productivity hours. As a result, organisations are increasingly providing mobile computing devices to the workforce to enable remote productivity at the organisations cost. A challenge associated with mobility is that these devices are likely to connect to a variety of networks, some which may insecure, and because of their smaller form factor and perceived value, are vulnerable to loss and theft amongst other information security challenges. Increased mobility has far reaching benefits for remote and rural communities, particularly in the healthcare domain where health workers are able to provide services to previously inaccessible populations. The adverse economic and infrastructure environment means institution provided devices make up the bulk of the mobile computing devices, and taking away the ownership, the usage patterns and the susceptibility of information to adversity are similar. It is for this reason that this study focuses on information security on institution provided devices in a rural healthcare setting. This study falls into the design science paradigm and is guided by the principles of design science proposed by Hevner et al. The research process incorporates literature reviews focusing on health information systems security and identifying theoretical constructs that support the low-resource based secure deployment of health information technologies. Thereafter, the artifact is developed and evaluated through an implementation case study and expert reviews. The outcomes from the feedback are integrated into the framework.
APA, Harvard, Vancouver, ISO, and other styles
16

Castelini, Pricila. "Mulheres ma computação: percepções, memórias e participação de estudantes e egressas." Universidade Tecnológica Federal do Paraná, 2018. http://repositorio.utfpr.edu.br/jspui/handle/1/2944.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Pesquisas do Instituto Nacional de Estudos e Pesquisas Educacionais (INEP), Censo da Educação Superior, Teses e Dissertações, apontam que os cursos de graduação na área de Computação são os com menor número de mulheres matriculadas. Assim, para compreender quais os fatores para esta disparidade, foram propostas, nesta pesquisa, três oficinas com estudantes e egressas de cursos da área de computação de uma universidade federal: a primeira foi uma atividade presencial com estudantes da área de Computação para entender as percepções e memórias destas pessoas; a segunda também foi uma atividade presencial com este mesmo intuito, porém, com egressas de Bacharelado em Sistemas de Informação (BSI) e Engenharia de Computação (EC); e a terceira, um espaço virtual para promover a participação e discussão sobre as memórias das egressas. Para essas três oficinas, utilizou-se uma prática de Design Participativo (DP), a Oficina de Futuro. O Design Participativo proporcionou que cada uma das atividades tivesse o desenvolvimento conduzido de forma diferente, pois a proposta de DP permitiu que as práticas fossem organizadas colaborativamente pelos participantes, o que difere dos dados obtidos por questionários, por exemplo. Os resultados destas aproximações trazem as percepções e memórias de estudantes e egressas sobre a participação de mulheres na área de Computação. Estes resultados encaminham que cabe à sociedade e à comunidade acadêmica promover discussões para a implementação de política de cotas para gêneros, promover mudanças, apontando para a igualdade de gênero, no ambiente escolar, no mercado de trabalho e nos papéis sociais.
In researches of National Institute for Educational Studies and Research (NIES), Higher Education Census, Theses and Dissertation, it was observed that undergraduate courses in Computing are those with fewer women enrolled. Accessing such information identifies that quantify data about women participation in Computing area is insufficient. Thus, to comprehend which factors to this disparity has proposed three workshops: first face-to-face workshop with students of Computing area; second also a workshop, however, with recent grads of Bachelor of Information Systems and Computer Engineering; and third a virtual space for collaboration on topics that involve the women participation in Computing, remote mode, in corais.org plataform, three workshops were with students and recent grads from the same Institution – Federal Technological University of Paraná – in Curitiba. The three workshops used Participatory Design (PD) practice - future workshop, however in each of them the development was different, because (PD) allowed that participants organized the approach collaboratively. The results bring perceptions and memories of students and recent grad about women participation in Computing, and these results point out that is up to society and to University, to promote discussions to implementing genre quotas, changes since childhood, at school, and the participation of parents and all the society; it is necessary to point to gender equality; labor market; opportunities; destruction of gender categories and the development of public policy for equity.
APA, Harvard, Vancouver, ISO, and other styles
17

"漫長的電子革命: 計算機與紅色中國的技術政治1955-1984 = Machine for a long revolution : computer as the nexus of technology and class politics in China 1955-1984." 2014. http://library.cuhk.edu.hk/record=b6115444.

Full text
Abstract:
這項研究探討信息科技在中國的技術政治。研究試圖書寫電子計算機作為一種新的電子信息科技在中國早期設置過程的技術政治社會史,並在理論層面上尝试构建一個拓展了的「技術、社會、與勞動」的進路。源於冷戰的地緣政治結構,不像韓國、台灣、或香港等其他亞洲國家和地區 ,在1980年代改革開放以前,中國大陸的計算機工業已經經歷了近30年(1955-1984)連續且激進的獨立發展。特別需要指出的是,中國社會主義時代的計算機發展不僅僅是爲了滿足冷戰中的國防需要和技術民族主義意識形態下社會動員的需要,同時高度嵌入了有關階級政治和技術哲學的社會主義「社會實驗」當中。而隨著文革群眾運動的終結和中國的「改革開放」,鄧小平為首的國家決策層爲了回應來自外部的壓力和來自社會主義內部的危機,用實用主義的技術發展觀取代了社會主義的技術民主實踐。1984年,隨著阿尔文.托夫勒(Alvin Toffler)的《第三次浪潮》(The Third Wave)風靡中國大陸,革命中國的計算機工業和技術政策逐步被隨新自由主義全球化而來的「信息社會」和「矽谷模式」所取代。
作為一個技術和文化的雙重物件,電子計算機及其衍生科技(臺式計算機、筆記本電腦、智慧手機、平板電腦等)是理解當代資本主義生產、消費、與勞動關係的指標性科技。然而在社會主義中國的革命現代化進程中,它卻曾經一度拐入了一條另類的發展路徑。中國的信息化(informationalization)或曰計算機化(computerization)過程中的技術路線鬥爭和轉型是如何發生的,這一進程與中國「從毛到鄧」的獨特現代化道路之間是怎樣的關係?時至今日,批判的傳播研究對這段歷史依然所知甚少。本文試圖重訪這個歷史轉折,探查計算機在中國的早期技術政治史。通過追蹤關鍵的歷史事件、人物、思潮、和政策,論文試圖探尋冷戰架構下東西方技術政治之間的交鋒,如何在被計算機仲介的生產與勞動關係中顯影。從這個「閃回」中得到的知識,有助我們將對今日中國信息產業和信息勞動的理解,重新納入中國革命現代性的潮起潮落之中。
This paper traces the political and social history for the installation process of digital technology in China, in order to shed light on the ways in which computer interacted with the transformation of Chinese socialism. Due to geopolitical structure of the Cold War, unlike other East Asian countries, before 1980s China had developed its independent computer industry for more than 30 years. This development was not just under the rubric of techno-nationalism, which mainly helps to fulfill military and national defense aims, but also embedded into proletariat political debates. Maoist China developed a dialectical approach to technology, in which the most powerful productive power is the revolutionary proletariat class per se, not the machine or technology. So the process of socialist technology development, like the process of socialist culture and arts development is also a dialectical process, which must follow mass line to not just develop productive force, but also transform production relations and create socialist subjectivity. Instead, the post-Mao leadership under Deng Xiaoping responded to external Cold War pressures and the profound internal crises of state socialism by a massive market-oriented "reform and open-up" process. It is during the same period that the self-reliant computer industry system was replaced step-by-step by a western-oriented system, signified by the popularity of Alvin Toffler’s The Third Wave. In this context, computer became a machine for labor control and scientific management, no longer a machine for people’s emancipation.
With a focus on technology politics of computer in China during 1955-1984, this study examines how the concept of computer was introduced into the country and conceived by key players at the time, how such discourses led to the production and consumption of computer by different actors, and how this process triggered the transformation of hegemony and practice related to computer-mediated labor relationship, and finally how such a historical formation was conditioned by the post-cold war structure in East Asia, as well as struggles between Maoist socialist legacy and transborder neo-liberalism ethic. This dissertation revisits this transformation, traces its Key Figures and several historical moments, which shows debates and struggles on computer as the articulation of technology and class politics. Reflections from this flashback will rehistorize China’s working-class formation in its electronic industry nowadays into the ebbs and flows of China’s revolutionary modernity.
Detailed summary in vernacular field only.
Detailed summary in vernacular field only.
王洪喆.
Thesis (Ph.D.) Chinese University of Hong Kong, 2014.
Includes bibliographical references (leaves 336-360).
Abstracts also in English.
Wang Hongzhe.
APA, Harvard, Vancouver, ISO, and other styles
18

Whittaker, Louise. "An object-oriented approach to the privacy problems posed by digital information and communication technologies." Thesis, 2016. http://hdl.handle.net/10539/21975.

Full text
Abstract:
A research report submitted to the Faculty of Humanities, University of the Witwatersrand, Johannesburg, partial fulfilment of the requirements for the degree of Master of Arts Applied ethics for professionals Johannesburg
The advent of digital ICT has raised a range of privacy problems that previously did not occur, owing to the scope and volume of data that can be collected, as well as the processing capacity of the application. These digital privacy problems are arguably not easily addressed within any particular traditional macroethical framework. We may therefore need to find an alternative approach. One such approach is proposed by Luciano Floridi, who has devised “Information Ethics” - a macroethics for the identification, clarification and solution of digital ethical issues. While IE is useful in that it highlights questions of digital agency, it will be demonstrated that it is flawed when applied to problems of privacy posed by digital ICT. IE, however, points us in the right direction: An object-oriented ethics may be able to address the issue of digital agents. In this essay I develop an argument for the moral intentionality of digital agents, based on the concepts of emergent value and indirect intentionality, that can underpin an object-oriented ethical approach to digital privacy for both digital and human agents. Using Nissenbaum’s concept of contextual spheres, I provide normative guidelines for evaluating the competing interests of agent-objects in various digital spheres. A brief evaluation of the approach, by way of an example, shows that the object-oriented LoA that I am proposing can be adopted for digital privacy problems. In such cases, and for the specific purpose of weighing up the competing rights and values of the agents and patients, we can treat all agents (human and non-human) as both intentionality and real. This provides a reading of the case that goes beyond the consequentialist or ownership-based approaches, and arguably gets closer to the heart of the issue. Where the approach is still open, however, is that we still have to justify and balance these interests. There is no simple formula to apply. A need for practical wisdom or Phronesis, in the form of a judicious weighing of moral interests, continues to apply to digital problems posed by ICT.
GR2017
APA, Harvard, Vancouver, ISO, and other styles
19

Daya, Jithendra Chotoo. "Privacy policies and practices: an investigation of secondary use of information within South African retail banking institutions." Thesis, 1996. http://hdl.handle.net/10539/21614.

Full text
Abstract:
A research report submitted to the Faculty of Commerce, University of the Witwatersrand, Johannesburg, in the partial fulfilment of the requirements for the degree of Master of Commerce. Johannesburg 1996.
This paper addresses concerns surrounding information privacy and the secondary use of information in South African corporations. This study also attempts to assess the level of concern that management and information technology practitioners if! South African retail banks have about privacy issues. The research suggests that privacy is a huge concern internationally and may affect South African corporations if they do not follow certain policies and practices. Eleven in-person structured interviews were conducted at four banks. The research proposes a set of guidelines by which South African management and IT practitioners, who are involved with the identification and solution of some of the problems that may be presented by possible privacy legislation, will be able to assess their policies and practices against international practices and policies. The results inform IS managers and executives about appropriate business policies they can implement voluntarily to address public concerns about specific information practices that may be considered a threat to privacy. The findings suggest that the executives are deliberately avoiding confronting the issue of information privacy for as long as possible. The executives are adopting a wait-and-see attitude and will react 011 whatever legislation requires them to do. At the time of the report senior executives at banks were not accepting responsibility for information privacy policies and practices and were leaving this responsibility; to the middle level managers who implement their own practices based on their own needs.
GR2017
APA, Harvard, Vancouver, ISO, and other styles
20

Pritchard, Maritha. "The Gautrain : active communication research on the manifestations of the hacker ethic by citizen journalists." Thesis, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001288.

Full text
Abstract:
Thesis (MTech. degree in Journalism) -- Tshwane University of Technology, 2010.
Explores the themes derived from the six tenets of the hacker ethic in blog posts about the Gautrain project over a one-year period. It also describes how citizen journalists express the six tenets of the hacker ethic when blogging about the Gautrain project.
APA, Harvard, Vancouver, ISO, and other styles
21

Pitcher, Sandra. "The mass collaboration of digital information : an ethical examination of YouTube and intellectual property rights." Thesis, 2010. http://hdl.handle.net/10413/565.

Full text
Abstract:
The Internet has been lauded as an open and free platform from which one is able to engage with, and share large amounts of information (Stallman, 1997). As one witnesses the shift from analogue media to digitalism, so too is it possible to note a change in cultural practices of media consumers. Users of the media can now be viewed as “prosumers”, producing as well as consuming media products (Marshall, 2004). Digital media users have been given the ability to engineer their own unique media experiences, especially within the realms of the Internet. However, this process has seemingly led to mass copyright infringement as Internet users appropriate various movies, music, television programmes, photographs and animations in order to create such an experience. The art of digital mashing in particular, has been deemed an explicit exploitation of intellectual property rights as it re-cuts, re-mixes and re-broadcasts popular media in a number of alternative ways. YouTube especially has been at the forefront of the copyright furore surrounding digital mash-ups because it allows online users the facility to post and share these video clips freely with other online users. While YouTube claims that they do not promote the illegal use of copyrighted material, they simultaneously acknowledge that they do not actively patrol that which is posted on their website. As such, copyright infringement appears seemingly rife as users share their own versions of popular media through the art of digital mashing. This dissertation however, explores the concept that the creation of mash-ups is not undermining intellectual property rights, but instead produces a new avenue from which culture can emerge. It highlights how Internet users are utilising the culture which surrounds them in an attempt to navigate the new social structures of the online, subsequently arguing that mash-ups are an important element of defining a new postmodern culture, and that the traditional copyright laws of analogue need to be modified in order to secure the development of new and emerging societal structures.
Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2010.
APA, Harvard, Vancouver, ISO, and other styles
22

Desai, Akshay A. "Data analysis and creation of epigenetics database." Thesis, 2014. http://hdl.handle.net/1805/4452.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
This thesis is aimed at creating a pipeline for analyzing DNA methylation epigenetics data and creating a data model structured well enough to store the analysis results of the pipeline. In addition to storing the results, the model is also designed to hold information which will help researchers to decipher a meaningful epigenetics sense from the results made available. Current major epigenetics resources such as PubMeth, MethyCancer, MethDB and NCBI’s Epigenomics database fail to provide holistic view of epigenetics. They provide datasets produced from different analysis techniques which raises an important issue of data integration. The resources also fail to include numerous factors defining the epigenetic nature of a gene. Some of the resources are also struggling to keep the data stored in their databases up-to-date. This has diminished their validity and coverage of epigenetics data. In this thesis we have tackled a major branch of epigenetics: DNA methylation. As a case study to prove the effectiveness of our pipeline, we have used stage-wise DNA methylation and expression raw data for Lung adenocarcinoma (LUAD) from TCGA data repository. The pipeline helped us to identify progressive methylation patterns across different stages of LUAD. It also identified some key targets which have a potential for being a drug target. Along with the results from methylation data analysis pipeline we combined data from various online data reserves such as KEGG database, GO database, UCSC database and BioGRID database which helped us to overcome the shortcomings of existing data collections and present a resource as complete solution for studying DNA methylation epigenetics data.
APA, Harvard, Vancouver, ISO, and other styles
23

Kalash, Abeer. "Trust modelling through social sciences." Thesis, 2014. http://hdl.handle.net/1805/6454.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
In today's fast paced world, people have become increasingly interested in online communication to facilitate their lives and make it faster. This goes on from simple social interactions to more advanced actions like shopping on the internet. The presence of such activities makes it crucial for people to use their common sense and judgment to process all this information and evaluate what/who they trust and what/whom they do not. This process would have been much easier if the number of people in such networks is really small and manageable. However, there are millions of users who are hooked online every day. This makes the person very overwhelmed with his trusting decision, especially when it comes to interacting with strangers over the internet, and/or buying personal items, especially expensive ones. Therefore, many trust models have been proposed by computer scientists trying to evaluate and manage the trust between users using different techniques and combining many factors. What these computer scientists basically do is coming up with mathematical formulas and models to express trust in online networks and capture its parameters. However, social scientists are the people better trained to deal with concepts related to human behaviors and their cognitive thinking such as trust. Thus, in order for computer scientists to support their ideas and get a better insight about how to direct their research, people like social scientists should contribute. With this in mind, we realized in our group work the importance of such contribution, so we came up with the idea of my research work. In my search, I tried to find how these social scientists think and tackle a dynamic notion like trust, so we can use their findings in order to enhance our work and trust model. Through the chapters, I will discuss an already developed trust model that uses measurement theory in modeling trust. I will refer back to this model and see how other social scientists dealt with some of the issues encountered by the model and its functionality. Some small experiments have been done to show and compare our results with social scientists results for the same matter. One of the most important and controversial points to be discussed from social scientists' point of view is whether trust is transitive or not. Other points to be discussed and supported by social scientists' research include aggregation, reputation, timing effects on trust, reciprocity, and experience effects on trust. Some of these points are classified into trust mapping categories and others are related to trust management or decision making stages. In sum, this work is a multidisciplinary study of trust whose overall goal is to enhance our work and results, as computer scientists.
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Tao. "Brand and usability in content-intensive websites." Thesis, 2014. http://hdl.handle.net/1805/4667.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
Our connections to the digital world are invoked by brands, but the intersection of branding and interaction design is still an under-investigated area. Particularly, current websites are designed not only to support essential user tasks, but also to communicate an institution's intended brand values and traits. What we do not yet know, however, is which design factors affect which aspect of a brand. To demystify this issue, three sub-projects were conducted. The first project developed a systematic approach for evaluating the branding effectiveness of content-intensive websites (BREW). BREW gauges users' brand perceptions on four well-known branding constructs: brand as product, brand as organization, user image, and brand as person. It also provides rich guidelines for eBranding researchers in regard to planning and executing a user study and making improvement recommendations based on the study results. The second project offered a standardized perceived usability questionnaire entitled DEEP (design-oriented evaluation of perceived web usability). DEEP captures the perceived website usability on five design-oriented dimensions: content, information architecture, navigation, layout consistency, and visual guidance. While existing questionnaires assess more holistic concepts, such as ease-of-use and learnability, DEEP can more transparently reveal where the problem actually lies. Moreover, DEEP suggests that the two most critical and reliable usability dimensions are interface consistency and visual guidance. Capitalizing on the BREW approach and the findings from DEEP, a controlled experiment (N=261) was conducted by manipulating interface consistency and visual guidance of an anonymized university website to see how these variables may affect the university's image. Unexpectedly, consistency did not significantly predict brand image, while the effect of visual guidance on brand perception showed a remarkable gender difference. When visual guidance was significantly worsened, females became much less satisfied with the university in terms of brand as product (e.g., teaching and research quality) and user image (e.g., students' characteristics). In contrast, males' perceptions of the university's brand image stayed the same in most circumstances. The reason for this gender difference was revealed through a further path analysis and a follow-up interview, which inspired new research directions to unpack even more the nexus between branding and interaction design.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography