Browsing Technology Systems by Title
Now showing items 15-34 of 52
-
Enhancing the Distance Learning Experience: Designing Virtual Classroom and Laboratory Environments
(2009-04)New virtual environments are evolving to a point where academics can visualize the benefits of these more socially interactive distance media. A first step in evaluating these virtual environments is to build virtual ... -
An Ergonomic Evaluation of a Front Support Chair for Forward Leaning Seated Tasks
(East Carolina University, 2014)The prevalence of low back pain in industry has contributed to employee days away from work and therefore decreased production. Low back pain is even more pervasive in industries where the work requires the employee to ... -
Evaluating effectiveness of the application of the new perspective in safety, Safety-II: by Functional Resonance Analysis Method (FRAM) in a manufacturing environment
(East Carolina University, 2017-07-25)The risk matrix has been used by safety professionals for many years as a significant tool for hazard management, risk assessment and prioritization, and to aid in offering a proactive approach to prevent negative outcomes. ... -
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
(East Carolina University, 2022-04-22)While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions. This researcher studied ... -
Evaluation of Underreporting of Work-Related Injuries and Illnesses in the United States Military
(East Carolina University, 2020-06-22)The purpose of the research was to characterize underreporting of occupational illnesses and injuries among the United States (U.S.) military veterans. The researcher interviewed 100 U.S. veterans and 100 U.S. civilians. ... -
GOAL SETTING AND UNETHICAL BEHAVIOR: IMPLICATIONS FOR OCCUPATIONAL SAFETY AND HEALTH AND THE SAFETY INCENTIVE PROGRAM
(East Carolina University, 2020-06-22)Goal setting is a popular and often beneficial tool used to motivate workers worldwide. Recent research has revealed that negative side-effects including unethical behavior are associated with goal setting. In occupational ... -
Implementation of a System for Monitoring Overall Equipment Effectiveness (OEE) and Exploring Correlation Between OEE and Process Capability
(East Carolina University, 2011)An effective process equipment monitoring tool widely accepted in manufacturing units today is overall equipment effectiveness (OEE). OEE began its debut as a pillar of the total productive maintenance (TPM) system, where ... -
Incidents in Educational and Academic Chemistry Laboratories: A Comparative Case Study Project
(East Carolina University, 2019-12-10)For this thesis, eleven published case studies of laboratory incidents that involved hazardous chemicals and occurred at primary educational and academic institutions were compared. The important information on the incident ... -
Is Digital Piracy a Crime?
(2022-04-19)Digital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. ... -
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ... -
MEASURING LEADERSHIP ROUNDING PERFORMANCE IN A HOSPITAL ENVIRONMENT USING REAL TIME LOCATION SYSTEMS
(East Carolina University, 2015)Among the major industries, healthcare accounts for over ten percent of jobs today and is continuing to grow per the surges of baby boomers requiring more care, rising costs in medicine and equipment, and current legislative ... -
Mobile Device Management Policy
(2022-04-08)The use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
A New Approach to Communications Management Planning Through 3D Web and Semantic Web Technologies
(2011-09)Communication management plans are used to determine not only who needs what information but also how that information will be collected and transmitted. Now two evolving technologies are looking to drive project planners ...