- Browse by Date Submitted
IUPUI Research Day 2016
Permanent URI for this collection
A program describing the Research Day 2016 events and posters is available from: http://hdl.handle.net/1805/9288.
Browse
Browsing IUPUI Research Day 2016 by browse.metadata.dateaccessioned
Now showing 1 - 10 of 251
Results Per Page
Sort Options
Item Journal flipping: A case study from Metropolitan Universities(2016-04-08) Polley, David E.; Odell, Jere D.; Pollock, Caitlin M.J.; Proctor, AnnaRecent events in scholarly publishing, such as the editorial board of Elsevier’s Lingua resigning en masse, shed light on the dilemma faced by many journal editors: balancing a desire to increase impact with promoting open and sustainable models for publishing. These two goals are not mutually exclusive. Recently, editors and publishers are seeing success in reconciling these goals by converting subscription-based journals to open-access, through a process commonly called journal flipping. The IUPUI University Library has a history of supporting the publication of open-access scholarly journals through its Open Access Journals at IUPUI program (http://journals.iupui.edu/). A number of titles, most notably Advances in Social Work and Metropolitan Universities, began as subscription-based journals that were only available in print. This poster presents the process for "flipping" Metropolitan Universities, digitizing the full run of issues and making them openly available via IUPUI’s instance of Open Journal Systems.Item Rebuilding from the Ground Up: User-Centered Methodology for Web Design Moves Non-Profit Organization into the 21st Century(2016-04-08) Pachhapurkar, Shilpa; Hook, Sara AnneMicrofinance projects are a proven approach for economic development, but an indicator of future success is that these projects involve a number of community partners, both in the U.S. and on the ground in the locale where the project will take place. As part of a series of microfinance projects in Sierra Leone, a pleasing partnership has developed between the Rotary Club of Indianapolis and Right Sharing of World Resources, which has personnel on the ground in Sierra Leone, one of three countries that it currently focuses on.1-3 Although established in 1967, Right Sharing remains a small organization as compared with other NGOs and has not had the time or expertise to update its website or to take advantage of the power of social media for outreach and public relations. The presenters agreed to develop recommendations for a total redesign of Right Sharing’s website and a social media marketing strategy. After a thorough analysis of Right Sharing’s website, we inspected some 70 NGO websites to identify current trends in layout, design and navigation flow, including the websites of large, well-established international organizations such as Care and smaller organizations with more targeted missions.4-7 Various screenshots of websites we considered to be impactful, that incorporated best practices and usability principles and that seemed to contain a “call to action” to potential donors, volunteers and supporters were grouped into a variety of collages for easy comparison. A preliminary new information architecture was developed to assist users in transitioning from one section of the website to another with more logical categories and a better organization of information under each category. One challenge is to integrate Right Sharing’s substantial material about past projects, including images and audio, while still presenting the freshest and most compelling content about current and future initiatives. 1. Rotary Club of Indianapolis, http://indyrotary.com/071013wp/, (last visited 3/14/2015). 2. Right Sharing of World Resources, http://www.rswr.org/, (last visited 3/14/2015). 3. Care, http://www.care.org/, (last visited 3/14/2015). 4. Alliance for African Assistance, http://www.alliance-for-africa.org/, (last visited 3/14/2015). 5. Manna Foodbank, http://www.mannafoodbank.org/, (last visited 3/14/2015). 6. Ambassadors for Life, http://www.ambassadorsforlife.org/, (last visited 3/14/2015). 7. Not for Sale, https://www.notforsalecampaign.org/, (last visited 3/14/2015).Item Designing a Predictive Coding System for Electronic Discovery(2016-04-08) Soundarajan, Dhivya; Hook, Sara AnneNot long ago, the concept of using predictive coding and other technologies to assist with the electronic discovery process seemed revolutionary. Da Silva Moore and Global Aerospace stand as the first major cases where judges strongly supported predictive coding.1-2 A recent Indiana case recognized it as a useful method for reducing the amount of potentially relevant evidence that has to be searched and culled.3 Within just a few short years, using predictive coding as part of an electronic discovery process is now considered acceptable and perhaps even expected. It is not difficult to appreciate the advantages of predictive coding and its superiority over a manual process at various steps of electronic discovery, particularly during the review step.4-11 However, questions still remain about the efficacy of the predictive coding process and the tools that are available.12-13 Because the use of predictive coding systems in law is still in its infancy, it presents us with an opportunity to design something that will not only take advantage of the power of big data and computational algorithms, but that will also incorporate design and usability principles to provide an attractive and easy-to-use interface for lawyers to interact with. Predictive coding uses natural language processing and other mathematical models to enhance search results, but the essence of these systems is that they actually learn and the precision of the retrieval improves as additional collections of evidence are entered. Behind-the-scenes will be a repository where all of the evidence for a case resides. Our system will assist the lawyers in reducing the time and cost of an electronic discovery process as well as minimize the chances for mistakes in determining which evidence is relevant to a case and which evidence can be withheld under attorney-client privilege, as attorney work-product or another confidentiality doctrine. 1. Da Silva Moore v. Publicis Groupe & MSL Group, No. 11 Civ. 1279, 2012 WL 607412 (ALC) (AJP) (S.D.N.Y. Feb. 24, 2012). 2. Global Aerospace, Inc. v. Landow Aviation, L.P., No. CL 61040 (Vir. Cir. Ct. Apr. 23, 2012). 3. In re Biomet, 2013 WL 1729682 (N.D. Ind. Apr. 18, 2013). 4. Alison Silverstein and Geoffrey Vance. E-Discovery Myth Busters: Why Predictive Coding is Safe, Successful and Smart. Peer to Peer, Vol. 29, No. 4, December 2013, pp. 66-69. 5. John Papageorge. Predictive Coding Gaining Support in Courts. Indiana Lawyer, January 29-February 11, 2014, p. 8. 6. Adam M. Acosta. Predictive Coding: The Beginning of a New E-Discovery Era. Res Gestae, October 2012, pp. 8-14. 7. Ajith (AJ) Samuel. Analytics Driving the E-Discovery Process. Peer to Peer, Vol. 28, No. 2, June 2012. 8. Richard Acello. Beyond Prediction: Technology-Assisted Review Enters the Lexicon. ABA Journal, August 2012, pp. 37, 70. 9. Barry Murphy. The Rise of Technology-Assisted Review (TAR). Peer to Peer, Vol. 28, No. 2, June 2012, pp. 10. Brian Ingram. Controlling E-Discovery Costs in a Big Data World. Peer to Peer, Vol. 29, No. 1, March 2013. 11. Hal Marcus and Susan Stone. Beyond Predictive Coding - The True Power of Data Analytics [webinar]. International Legal Technology Association, May 19, 2015. 12. Jessica Watts and Gareth Evans. Predictive Coding in the Real World [webinar]. International Legal Technology Association, August 5, 2015. 13. Danielle Bethea. Predictive Coding: Revolutionizing Review or Still Gaining Momentum? Litigation and Practice Support: ITLA White Paper, International Legal Technology Association, June 2014.Item An Investigation of Legal and Ethical Issues with User-Generated Content and Other Forms of Electronically Stored Information Communicated via Social Media, Messaging Apps and Social Devices, Including the Internet of Things(2016-04-08) Faklaris, Cori; Hook, Sara AnneOn social networking services, sharing is caring. However, depending on who or what is involved, sharing can be the source of a community transgression, copyright infringement, a violation of employment policies or worse. If people who use social media, mobile messaging apps and social devices do not know where the ethical or legal lines are drawn, in jurisprudence, in vendor Terms of Service, in professional codes of conduct or in keeping with online social norms, they are in jeopardy of being publicly shamed or even sued. Users may also put their employers, friends and colleagues at risk of community, professional or legal penalties in an era where the boundary between work and leisure is becoming even more blurred. This mixed-methods, interdisciplinary research project explores the current state of awareness on a range of legal and ethical issues involving User-Generated Content (UGC) and other forms of Electronically Stored Information (ESI) on social networks and devices for personal and enterprise use and for several different constituencies, including marketers, artists, journalists, academics, educators, entrepreneurs, bloggers, photographers and videographers. The quantitative, numeric data resulting from an online survey as well as qualitative, descriptive data gathered from semi-structured interviews with participants and observations gleaned in contextual inquiry will help address gaps in current research on this subject. In addition, the research findings will guide design directions for a tool, intervention or affordance to help users become better informed about privacy, intellectual property and information governance in the context of electronic sharing and more easily put this knowledge into practice. The first phase of developing the survey protocol is already underway, with a literature review completed and the survey submitted for IRB review as #1602921512. Pilot contextual inquiries and field studies are being pursued to guide development of qualitative research phases in the future. 1. Bohn, J., et al. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. Ambient Intelligence. Springer Berlin Heidelberg, 2005, 5-29. 2. Cohen, J.E. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. Yale University Press, 2012. 3. Erickson, T., and Kellogg, W.A. Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction (TOCHI) 7.1 (2000): 5983. 4. Faklaris, C., and Hook, S.A. Oh, Snap! The State of Electronic Discovery Amid the Rise of Snapchat, WhatsApp, Kik and Other Mobile Messaging Apps. Federal Lawyer, May 2016 [in press]. 5. Fiesler, C., and Bruckman, A.S. Remixers' understandings of fair use online. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 2014. 6. Hook, S.A., and Faklaris, C. Social Media, The Internet and Electronically Stored Information (ESI) Challenges. National Business Institute, 2015. Available at https://scholarworks.iupui.edu/handle/1805/7177.Item The Impact of Social Media on Social Behaviors and Alcohol Consumption(2016-04-08) Burress, KimberlyThis research project examines the subliminal effects that alcohol consumption may or may not have on a person’s technology-based social behaviors. If the effect of alcohol consumption alters social behaviors, then a logical question is whether and how these behaviors are expressed through social media. Sub-areas of inquiry include alcohol’s effect on mood, alcohol-based interactions on social media and the impact of alcohol on an individual’s use of different social media platforms. The main objective of this research is to obtain a clearer understanding of the extent to which alcohol consumption and advertisement impact social media interactions. If correlations can be found, then a further step is to examine alcohol consumption interactions and advertising-based interactions and their influence on the activities of other social media users and the content of their posts. The research will examine social media content created about consuming alcohol through the use of keyword analysis. It will focus specifically on data that can be gleaned from Facebook and Twitter postings. The frequency of social media content creation when under the influence of alcohol will be compared with content creation during periods of sobriety. The research will discern whether there is a noticeable change in content subject matter, attitude and/or tone when alcohol is being consumed. It will also determine whether there is a correlation between social media advertisements related to alcohol, and if so, whether the followers of those advertisements increase their own alcohol-related user content and whether this then increases alcohol consumption. Technology such as social media has significantly reduced the time and distance between communication channels and users. This research project examines technology-based social behaviors to discern whether user content on social media can be collected and analyzed to cultivate additional sales within the alcohol industry.Item Progress in Healthcare: Securing a New Common Norm in Medical Technology(2016-04-08) Gookins, AlexandraIn the modern age of Healthcare Technology, there are vast changes in patient records. In the 1960s, the first use of EHRs (Electronic Health Records) was implemented in the Mayo Clinic of Rochester, Minnesota. (Earl) However, EHRs continue to enhance at a rapid rate and are becoming one of the fastest growing industries worldwide. The problem that arises with keeping confidential patient information on the cloud or servers is the access to hackers looking to steal information for misuse and causing detrimental harm to patients’ privacy. Thus, HIMSS (Healthcare Information and Management Systems Society) has continued to put rules and regulations into effect across the board of EHR systems. The issue is that these security measures do not fall on to the EHR system software creators but the medical practices themselves. (Health IT) But who in these practices or hospitals are going to regulate these significant measures? Many do not know that there is a software on the market today what will handle these tedious adjustments for the safety of the businesses and patients. Software companies like HIPAA One will do just that. (HIPAA One) These small companies will work with your current EHRs in compliance with the federally regulated HIPAA laws to ensure practices and hospitals alike are providing safety of patient information by using security risk assessment tools. However, numerous users of electronic health records do not use these critical tools because there are not well known. I have observed many EHR systems, leading me to believe the importance of an EHR software that will integrate HIPAA compliant technology without a middle man such as HIPAA One; putting this responsibility on software designers instead of practices. 1. Earl, Elizabeth. Health IT & CIO Review. 16 Februrary 2015. 01 March 2016. . 2. Health IT. n.d. https://www.healthit.gov/providers-professionals/security-risk-assessment-tool. 01 March 2016. 3. HIPAA One. n.d. 05 March 2016.Item Enhancing Critical Awareness of Health Information from Wearable Devices(2016-04-08) Kumari, VishakhaWith the advent of wearable health and fitness tracking devices, the way health care will be delivered will change because of the opportunity for people and providers to more easily track and respond to even small changes in a person’s heath status. Wearable devices perceive and record health information about users continuously and discreetly. One question is whether there is a distinction between information that may be less sensitive, such as how many steps someone walks, and more sensitive medical information, such as someone’s blood sugar or heart rate. The awareness of people about the distinction between non-sensitive versus sensitive information has to be analyzed, which will address how comfortable people are in sharing this information when they know the risks involved. Unfortunately, health information is not considered protected health information unless it is shared with doctors, hospitals or any third-party vendors (Business Associates) of these entities. These devices are not covered under the Health Care Portability and Accountability Act (HIPAA) and thus there can be little expectation of privacy or security as provided for under this legislation. Although not required, at least one major vendor for wearable devices has indicated that its devices are compliant with HIPAA, which results in questions about why this vendor chose to comply with HIPAA and why other vendors are not yet following suit. My research explores the perception of people with respect to how the information gathered from wearable and fitness tracking devices is used and shared by vendors and third parties and what options might need to be provided to users by vendors or mandated by law to increase the security and privacy of this information. As part of my research, I have reviewed the terms of service and other information for a selected number of devices. References 1. Meingast, M., Roosta, T., & Sastry, S. (2006). Security and privacy issues with health care information technology. In Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE (pp. 5453-5458). IEEE. 2. Motti, V. G., & Caine, K. (2015). Users’ Privacy Concerns About Wearables. In Financial Cryptography and Data Security (pp. 231-244). Springer Berlin Heidelberg.Item Bio-Hydrogen Refueling Station(Office of the Vice Chancellor for Research, 2016-04-08) Schubert, Peter J.Hydrogen fuel cell cars are now available for lease and for sale. Renewable hydrogen fuel can be produced from water via electrolysis, or from biomass via gasification. Electrolysis is powerhungry with high demand from solar or wind power. Gasification, however, can be energy selfsufficient using a recently-patented thermochemical conversion technology known as Indirectly- Heated Pyrolytic Gasification. I-HPG produces a tar-free syngas from non-food woody biomass. This means the balance of plant can be small, so the overall system is economical at modest sizes. This makes it possible to produce renewable hydrogen from local agricultural residues; sufficient to create distributed refueling stations wherever there is feedstock. This work describes the specifics of a novel bio-hydrogen refueling station whereby the syngas produced has much of the hydrogen extracted with the remainder powering a generator to provide the electric power to the I-HPG system. Thus the system runs continuously. When paired with another new technology, moderate-pressure storage of hydrogen in porous silicon, there is the potential to also power the refueling operation. Such systems can be operated independently. It is even possible to design an energy self-sufficient farm where all electric power, heat, and hydrogen fuel is produced from the non-food residues of agricultural operations. No water is required, and the carbon footprint is negative, or at least neutral.Item Brownfield remediation powered by renewable energy(Office of the Vice Chancellor for Research, 2016-04-08) Schubert, Peter J.Subsurface contaminant plumes are a plague upon the earth. Some 1900 plumes remain after the go-fast atom bomb projects of the Cold War. Countless gasoline station sites dot our cities, leaching heavy metals and chlorinated solvents into drinking water. Superfund-type cleanup is so expensive that many sites languish while toxins continue to spread throughout the ecosystem. Federal funding for remediation research stopped 15 years ago. The only solution now is to move bad soil from one location to another. New advances in stem cell manipulation offer promise to clean up solvent-infused earth with a minimum of excavation at greatly reduced costs. Dielectrophoresis is the means by which polar molecules, in a matrix having a different dielectric constant, can be made to migrate along electric field gradients. A unique configuration called “pills and pillars” facilitates remediation of solvents. Electric field gradients originating in the deeply-driven “pillars” motivate solvents molecules towards the slightly-buried “pill”. When powered by renewable sources, such as solar panels, contaminants within a 1000 m3 volume can be concentrated within a 1 m3 volume at the pill, and then removed for disposal in a certified toxic waste repository. The pills and pillars are easily extracted for removal to a new site every 40 days. The solar panels are man-portable so that a single capital expenditure of a truckmounted kit can serve multiple sites simultaneously, and sequentially. The low labor overhead, the greatly reduced excavation, and the re-use of hardware contribute to make this novel method of brownfield remediation far cheaper than traditional, presently-available methods. Computer simulations including both vadose zone diffusion (natural spreading out) and drift via dielectrophoresis, demonstrate the effectiveness of this approach. The next research step is to build a benchtop model to validate the simulation model, followed by field trials with partners in the environmental remediation industry.Item Solar power satellite with no moving parts(Office of the Vice Chancellor for Research, IUPUI, 2016-04-08) Schubert, Peter J.The only solution to the global energy mess is sunlight captured in space. No other technology scales as well, and is as clean as Space Solar Power. Best of all, this is baseload power – “always on” – without the intermittency which will always plague ground-based solar and wind. Although invented in 1968, SSP designs have been impractical until now. A novel design architecture, relying on use of materials already in space, enables SSP at costs competitive with existing baseload power sources. And all this without greenhouse gas emissions. This work describes the technology and economics. The “tin can” solar power satellite is comprised of a cylindrical shell of solar panels. This configuration has integral thermal management by using the non-illuminated portions of the shell as a radiating heat shield, maintaining the solar cells within workable temperature ranges. The tethers holding the shell to the central conductor spire present a complex radiative environment which is studied further herein to obtain a more precise measurement of high and low temperature limits. Heat generated by the transmitting antenna and its power electronics is also studied to understand its impact on the requirements imposed on components and subsystems. Achieving a slow rotation of a very large diameter cylindrical shell with minimal internal strength interacts with the assembly process through tradeoffs between propellant, assembly jigs, and construction spacecraft. Vibrations induced in the cylindrical shell are studied including transient behavior during spin-up. The panel-to-panel forces expected during spin-up, and during on-going operations as gravity gradients excite low-frequency modes are studied in order to derive specifications for linkage rotation and strength. Finally, the results of imperfect assembly, lost parts, and meteorite strikes are investigated to assess risk to other spacecraft. Solar wind pressure is evaluated to determine station-keeping requirements. Assembly in an orbit slightly higher than GEO may be selected to minimize collateral damages, and means of adjusting the orbit are studied to derive overall architecture propellant requirements, anticipating a mixture of in situ propellant options versus earth-sourced propellants. This work charts a pathway to the ultimate energy source for all mankind for all time to come.