{"response":{"docs":[{"system_create_dtsi":"2019-07-22T14:45:19Z","system_modified_dtsi":"2021-01-30T04:02:26Z","has_model_ssim":["Article"],"id":"3197xn19c","accessControl_ssim":["65a68c4c-cd73-4291-9631-809d39b81af4"],"hasRelatedMediaFragment_ssim":["6t053h23g"],"hasRelatedImage_ssim":["6t053h23g"],"depositor_ssim":["ajmerahu@mail.uc.edu"],"depositor_tesim":["ajmerahu@mail.uc.edu"],"title_tesim":["Virtual Reality in Healthcare"],"date_uploaded_dtsi":"2019-07-22T14:45:19Z","date_modified_dtsi":"2021-01-30T04:02:04Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/93y7-t513"],"alternate_title_tesim":["VR in Healthcare"],"geo_subject_tesim":["Cincinnati, Ohio"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Ajmera, Himanshu","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["AR vs VR ","Immersion Breaking points","Healthcare","Virtual Reality"],"language_tesim":["English"],"description_tesim":["This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. \r\nThe resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-05-08"],"thumbnail_path_ss":"/downloads/6t053h23g?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6t053h23g"],"file_set_ids_ssim":["6t053h23g"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL REALITY IN HEALTHCARE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"read_access_person_ssim":["gonenbl@ucmail.uc.edu"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ajmerahu@mail.uc.edu"],"nesting_collection__pathnames_ssim":["3197xn19c"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697123083066802176,"timestamp":"2021-04-15T16:04:56.101Z","score":0.00049999997},{"system_create_dtsi":"2019-04-16T20:07:24Z","system_modified_dtsi":"2019-06-06T15:13:47Z","has_model_ssim":["Article"],"id":"3j333327g","accessControl_ssim":["38333f70-4d4f-4228-8261-0c3179cf70a4"],"hasRelatedMediaFragment_ssim":["k06988595"],"hasRelatedImage_ssim":["k06988595"],"depositor_ssim":["ajmerahu@mail.uc.edu"],"depositor_tesim":["ajmerahu@mail.uc.edu"],"title_tesim":["Challenges in Intelligent Applications development "],"date_uploaded_dtsi":"2019-04-16T20:07:24Z","date_modified_dtsi":"2019-05-23T18:00:24Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C24M7G"],"alternate_title_tesim":["Research Proposal"],"geo_subject_tesim":["Cincinnati, Ohio"],"time_period_tesim":["Era of AI"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Ajmera, Himanshu"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Intelligent Applications"],"language_tesim":["English"],"description_tesim":["Intelligent Application if defined technically is a strategy that uses hyper-personalized mobile app experiences and services and knowledge-extraction processes to increases the user experience (Jessica Ekholm, 2017). In simple words, the applications that not only know how to support or enable key decisions but also continually learn from the user interactions to become even more relevant and valuable to those users, are known as Intelligent apps. Such applications are smart enough to differentiate between relevant and irrelevant information with the help of AI algorithms. Moreover, these apps have the capability to ease the complex task into the as simple task as a single touch."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2017-12-13"],"related_url_tesim":["https://www.slideshare.net/himanshuajmera14/intelligent-apps-82787666"],"thumbnail_path_ss":"/downloads/k06988595?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["qb98mg53g","k06988595"],"file_set_ids_ssim":["qb98mg53g","k06988595"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CHALLENGES IN INTELLIGENT APPLICATIONS DEVELOPMENT ","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ajmerahu@mail.uc.edu"],"nesting_collection__pathnames_ssim":["3j333327g"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697125497795772416,"timestamp":"2021-04-15T16:43:18.966Z","score":0.00049999997},{"system_create_dtsi":"2019-04-12T15:06:11Z","system_modified_dtsi":"2019-04-12T15:06:17Z","has_model_ssim":["Document"],"id":"6q182m19n","accessControl_ssim":["36495ff9-5368-41d1-86ad-6f6a517c2797"],"hasRelatedMediaFragment_ssim":["0r967486w"],"hasRelatedImage_ssim":["0r967486w"],"depositor_ssim":["koshofae@ucmail.uc.edu"],"depositor_tesim":["koshofae@ucmail.uc.edu"],"title_tesim":["Working with Agency Data to Better Understand Racial Disparities: the Case of Disproportionate Minority Contact with the Juvenile Justice System - Panelist 7 - UC Data Day"],"date_uploaded_dtsi":"2019-04-12T15:06:11Z","date_modified_dtsi":"2019-04-12T15:06:11Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"geo_subject_tesim":["Ohio","Hamilton "],"genre_tesim":["Document"],"required_software_tesim":["PDF reader"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Criminal Justice"],"creator_tesim":["Sullivan, Christopher J."],"subject_tesim":["Criminal Justice"],"language_tesim":["English"],"description_tesim":["This talk was the third panelist in the Data Empowering Social Justice Session for the 4th Annual UC Data Day Conference hosted by UC Libraries.\r\n\r\nChristopher J. Sullivan, School of Criminal Justice, University of Cincinnati\r\n\r\nTalk Title: Working with Agency Data to Better Understand Racial Disparities: The Case of Disproportionate Minority Contact with the Juvenile Justice System\r\n\r\nThis presentation is based on a recently-concluded study that sought to better understand patterns of disproportionate minority contact (DMC) in Ohio’s juvenile justice system.  The project required extensive assessment and integration of record data that varied in their structures, availability of key fields, and operational definitions, which were collected or extracted from dozens of local juvenile court and police agencies across the state.  Currently lead federally-funded research studies on juvenile risk and needs assessment and important reforms in Ohio’s juvenile justice systems."],"license_tesim":["http://creativecommons.org/licenses/by-nc/4.0/"],"date_created_tesim":["2019-04-01"],"related_url_tesim":["https://libapps.libraries.uc.edu/blogs/dataday/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0r967486w"],"member_of_collections_ssim":["UC Data Day 2019"],"member_of_collection_ids_ssim":["zw12z6430"],"file_set_ids_ssim":["0r967486w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"WORKING WITH AGENCY DATA TO BETTER UNDERSTAND RACIAL DISPARITIES THE CASE OF DISPROPORTIONATE MINORITY CONTACT WITH THE JUVENILE JUSTICE SYSTEM PANELIST 7 UC DATA DAY","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["koshofae@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["1544bq614","1544bq614/zw12z6430"],"nesting_collection__parent_ids_ssim":["zw12z6430"],"nesting_collection__pathnames_ssim":["1544bq614/zw12z6430/6q182m19n"],"nesting_collection__deepest_nested_depth_isi":3,"_version_":1697100168818589696,"timestamp":"2021-04-15T10:00:43.371Z","score":0.00049999997},{"system_create_dtsi":"2019-03-01T05:47:51Z","system_modified_dtsi":"2019-06-06T15:12:41Z","has_model_ssim":["Document"],"id":"n009w3506","accessControl_ssim":["b3829d82-8265-4b4b-9984-6c5497850169"],"hasRelatedMediaFragment_ssim":["dv13zv41w"],"hasRelatedImage_ssim":["dv13zv41w"],"depositor_ssim":["angelwr@mail.uc.edu"],"depositor_tesim":["angelwr@mail.uc.edu"],"title_tesim":["Dark Knowledge: A Study on Public Perceptions of the Dark Web"],"date_uploaded_dtsi":"2019-03-01T05:47:51Z","date_modified_dtsi":"2019-03-01T05:47:51Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C27M5N"],"alternate_title_tesim":["Dark Knowledge: Public Perceptions of the Dark Web"],"genre_tesim":["Document"],"time_period_tesim":["21st Century"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Angel, William"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology","Black Market","Cyber Security","Dark Web"],"language_tesim":["English"],"description_tesim":["In this paper, I study how general technology users perceive the dark web. In this study, \r\nI conducted research on what these users know about dark web technologies, activities, \r\ncontent, and how their perceptions changed after a first-hand experience on dark web \r\nmarketplaces and sites. I aimed to tackle myths and misconceptions that users had about the \r\ndark web and present new data in order to educate and bring awareness to the dark web to \r\nthose who may never have the opportunity or reason to come upon this information on their \r\nown. It is my hope that the findings of this paper and the experiences of the participants will \r\nfoster the spread of knowledge and awareness to both the threats and benefits that the dark \r\nweb contributes to society. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-12-13"],"thumbnail_path_ss":"/downloads/dv13zv41w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dv13zv41w"],"file_set_ids_ssim":["dv13zv41w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DARK KNOWLEDGE A STUDY ON PUBLIC PERCEPTIONS OF THE DARK WEB","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["angelwr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["n009w3506"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697114531394748416,"timestamp":"2021-04-15T13:49:00.591Z","score":0.00049999997},{"system_create_dtsi":"2018-10-10T01:04:25Z","system_modified_dtsi":"2019-06-06T15:04:11Z","has_model_ssim":["Article"],"id":"d217qq50s","accessControl_ssim":["99478a1c-f46e-43b5-958e-4b1d284d5bfe"],"hasRelatedMediaFragment_ssim":["w6634486f"],"hasRelatedImage_ssim":["w6634486f"],"depositor_ssim":["angelwr@mail.uc.edu"],"depositor_tesim":["angelwr@mail.uc.edu"],"title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"date_uploaded_dtsi":"2018-10-10T01:04:25Z","date_modified_dtsi":"2018-10-10T01:11:06Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2VT4X"],"alternate_title_tesim":["The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry"],"time_period_tesim":["21st Century"],"required_software_tesim":[""],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"note_tesim":[""],"creator_tesim":["Angel, William"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Dark Web","Black Market","Cyber Security","Healthcare","Information Technology"],"language_tesim":["English"],"description_tesim":["In this paper, I study how medical records are being used by cyber-criminal for financial gain and patient manipulation. I studied what kind of criminal organizations may be involved in these operations and confirmed incidents from the black market. I conducted a literature review which generated several sources from online databases. I determined five major criminal factions that are most likely to use compromised medical records, determined possible motivations and looked at several cases of medical records being sold on the black market. The healthcare industry’s digitization efforts have left it tremendously ill-equip to combat emerging threats. It is evident that the healthcare industry must take extreme measures in order to counteract the evolving threat landscape. It is my hope that the findings of paper will being to shed light on these issues and help healthcare professionals understand what kind of threats the industry is facing."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-23"],"thumbnail_path_ss":"/downloads/w6634486f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["w6634486f"],"file_set_ids_ssim":["w6634486f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PULSE OF A NATION A STUDY ON THE CYBERSECURITY ISSUES PLAGUING THE HEALTHCARE INDUSTRY","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["angelwr@mail.uc.edu"],"nesting_collection__pathnames_ssim":["d217qq50s"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697076415246106624,"timestamp":"2021-04-15T03:43:10.199Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:31:06Z","system_modified_dtsi":"2019-05-23T18:31:56Z","has_model_ssim":["Article"],"id":"z603qz33r","accessControl_ssim":["d7ec4f0b-f18f-46f4-9318-977571c0dae5"],"hasRelatedMediaFragment_ssim":["s7526d34d"],"hasRelatedImage_ssim":["s7526d34d"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["To Post, Or Not To Post? Exploring Adjunct Faculty And Staff Social Media Use Among Collapsed Audiences"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:31:56Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/s7526d34d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["s7526d34d"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["s7526d34d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"TO POST OR NOT TO POST EXPLORING ADJUNCT FACULTY AND STAFF SOCIAL MEDIA USE AMONG COLLAPSED AUDIENCES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/z603qz33r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107519467421696,"timestamp":"2021-04-15T11:57:33.496Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:31:05Z","system_modified_dtsi":"2019-05-23T18:33:27Z","has_model_ssim":["Article"],"id":"9p290b11q","accessControl_ssim":["2c5ee55b-97d5-4006-9115-76c6f6c546d9"],"hasRelatedMediaFragment_ssim":["ws859g54r"],"hasRelatedImage_ssim":["ws859g54r"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Guidelines for Establishing A Software Support Practice"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:33:27Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/ws859g54r?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ws859g54r"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["ws859g54r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GUIDELINES FOR ESTABLISHING A SOFTWARE SUPPORT PRACTICE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/9p290b11q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107519882657792,"timestamp":"2021-04-15T11:57:33.892Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:31:04Z","system_modified_dtsi":"2019-05-23T18:35:32Z","has_model_ssim":["Article"],"id":"8k71nh914","accessControl_ssim":["2c9da20c-c5b7-4c1d-af13-e0bcf597a3aa"],"hasRelatedMediaFragment_ssim":["5d86p105p"],"hasRelatedImage_ssim":["5d86p105p"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Virtual Reality, Children, and Dinosaurs"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:35:32Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/5d86p105p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5d86p105p"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["5d86p105p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL REALITY CHILDREN AND DINOSAURS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/8k71nh914"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107520289505280,"timestamp":"2021-04-15T11:57:34.280Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:13:49Z","system_modified_dtsi":"2019-06-06T15:14:54Z","has_model_ssim":["Article"],"id":"9z9030736","accessControl_ssim":["73b4650a-ac58-4a14-b4d7-c166a6d2c267"],"hasRelatedMediaFragment_ssim":["kd17ct67q"],"hasRelatedImage_ssim":["kd17ct67q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A Virtual Wisdom Mining ‘Pan’ For Connecting Retired Experts With Currently Active Professionals"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:36:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C21Q32"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/kd17ct67q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["kd17ct67q"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["kd17ct67q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL WISDOM MINING PAN FOR CONNECTING RETIRED EXPERTS WITH CURRENTLY ACTIVE PROFESSIONALS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/9z9030736"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518332862464,"timestamp":"2021-04-15T11:57:32.414Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:13:48Z","system_modified_dtsi":"2019-06-06T15:03:30Z","has_model_ssim":["Article"],"id":"th83m0384","accessControl_ssim":["3714120a-b195-42d4-bc18-351e9565d28c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["DoD Requirements Toolkit for Manufactures"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:36:45Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2X12V"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f434n"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["pr76f434n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DOD REQUIREMENTS TOOLKIT FOR MANUFACTURES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/th83m0384"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518998708224,"timestamp":"2021-04-15T11:57:33.049Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Student Work","hits":485,"label":"Student Work"},{"value":"Article","hits":40,"label":"Article"},{"value":"Document","hits":11,"label":"Document"},{"value":"Image","hits":2,"label":"Image"},{"value":"Media","hits":2,"label":"Media"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Library Service, CECH","hits":57,"label":"Library Service, CECH"},{"value":"Green-Schwartz, Clair","hits":8,"label":"Green-Schwartz, Clair"},{"value":"Information Technology Research Symposium","hits":6,"label":"Information Technology Research Symposium"},{"value":"Turner, Grant","hits":5,"label":"Turner, Grant"},{"value":"Gonen, Bilal","hits":4,"label":"Gonen, Bilal"},{"value":"DenBleyker, Emma","hits":3,"label":"DenBleyker, Emma"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Information Technology","hits":32,"label":"Information Technology"},{"value":"Cyber Security","hits":4,"label":"Cyber Security"},{"value":"Economics","hits":3,"label":"Economics"},{"value":"Evidence-Based IT","hits":3,"label":"Evidence-Based IT"},{"value":"Black Market","hits":2,"label":"Black Market"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Information Technology","hits":171,"label":"Information Technology"},{"value":"CECH Library","hits":91,"label":"CECH Library"},{"value":"- School of Information Technology","hits":24,"label":"- School of Information Technology"},{"value":"School of Information Technology","hits":11,"label":"School of Information Technology"},{"value":"Impact Accelerator","hits":8,"label":"Impact Accelerator"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"en_US","hits":224,"label":"en_US"},{"value":"English","hits":40,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":469,"label":"University of Cincinnati"},{"value":"University of Cincinnnati","hits":2,"label":"University of Cincinnnati"},{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Grant W. Turner","hits":1,"label":"Grant W. Turner"},{"value":"IEEE","hits":1,"label":"IEEE"},{"value":"Le 'Wanda M. LaBoy","hits":1,"label":"Le 'Wanda M. LaBoy"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04","hits":55,"label":"2020-04"},{"value":"2021-04","hits":44,"label":"2021-04"},{"value":"2019-04","hits":33,"label":"2019-04"},{"value":"2022-04","hits":30,"label":"2022-04"},{"value":"2020-04-14","hits":14,"label":"2020-04-14"},{"value":"2005-06-02","hits":13,"label":"2005-06-02"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"7d278v66w","hits":52,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"xw42n9511","hits":41,"label":"xw42n9511"},{"value":"1r66j276h","hits":38,"label":"1r66j276h"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":541,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":23,"next_page":24,"prev_page":22,"total_pages":55,"limit_value":10,"offset_value":220,"total_count":541,"first_page?":false,"last_page?":false}}}