{"response":{"docs":[{"system_create_dtsi":"2020-07-08T16:12:53Z","system_modified_dtsi":"2020-07-08T16:13:08Z","has_model_ssim":["Document"],"id":"9306t085s","accessControl_ssim":["68adf3c3-a5b0-45b2-80b1-a806e019fffe"],"hasRelatedMediaFragment_ssim":["3484zj368"],"hasRelatedImage_ssim":["3484zj368"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["WORKING DRAFT - 5G and International Security: How the UK can Lead the Way"],"date_uploaded_dtsi":"2020-07-08T16:12:52Z","date_modified_dtsi":"2020-07-08T16:12:52Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/mm4a-v130"],"geo_subject_tesim":["Britain","United Kingdom","United States","Canada","Norway","Australia","PRC","Asia","Europe","New Zealand","Japan","World","Finland","UK","China"],"genre_tesim":["Manuscript"],"time_period_tesim":["21st Century"],"note_tesim":["This draft is in progress, though mostly complete. We are uploading this draft now both as a time stamp and so we can reference it in shorter articles summarizing our work."],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"creator_tesim":["Huang, Russell","Turner, Grant"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Defense","Internet of Things","6G","Sharp Power","Complex Systems","Economics","5G","Law","International Relations","Computer Science","Action Research","Competition","Hard Power","Intelligence Studies","Cyber Security","5 Eyes","Technology","Huawei","Diplomacy","Five Eyes","Soft Power","Security Studies","Political Science","International Affairs","Supply Chain Risk Management","Globalization"],"language_tesim":["English"],"description_tesim":["The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach. \r\n\r\nThis article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.\r\n"],"license_tesim":["http://creativecommons.org/licenses/by-sa/4.0/"],"date_created_tesim":["June 30, 2020"],"thumbnail_path_ss":"/downloads/3484zj368?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3484zj368"],"member_of_collections_ssim":["International Relations - China"],"member_of_collection_ids_ssim":["vx021g49h"],"file_set_ids_ssim":["3484zj368"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"WORKING DRAFT 5G AND INTERNATIONAL SECURITY HOW THE UK CAN LEAD THE WAY","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["vx021g49h"],"nesting_collection__parent_ids_ssim":["vx021g49h"],"nesting_collection__pathnames_ssim":["vx021g49h/9306t085s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697121837722370048,"timestamp":"2021-04-15T15:45:08.448Z","score":0.00049999997},{"system_create_dtsi":"2020-07-07T21:36:35Z","system_modified_dtsi":"2020-07-08T17:45:06Z","has_model_ssim":["Article"],"id":"cj82k8757","accessControl_ssim":["54d8f1dc-9b4d-403d-9b1e-54c09dc16391"],"hasRelatedMediaFragment_ssim":["v692t7665"],"hasRelatedImage_ssim":["v692t7665"],"depositor_ssim":["turnergw@mail.uc.edu"],"depositor_tesim":["turnergw@mail.uc.edu"],"title_tesim":["Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft, sharp, and hard power"],"date_uploaded_dtsi":"2020-07-07T21:36:35Z","date_modified_dtsi":"2020-07-08T17:45:06Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["DOI: 10.13140/RG.2.2.19274.18888"],"geo_subject_tesim":["Asia","China"],"time_period_tesim":["21st Century"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Educational Studies"],"note_tesim":["I completed this work as part of the Cambridge Security Initiative's International Security and Intelligence Summer Program and Conference, which I highly recommend. As part of it we each had to propose and complete an analytical essay. There was a word limit, which is why my analysis is somewhat truncated. I will be expanding this document for publication, but it is still worth glancing over if you are interested in China's means and ends of foreign policy."],"creator_tesim":["Turner, Grant"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Asian Studies","Soft Power","Public Relations","Economics","Foreign Policy","History","Security Studies","Hard Power","Politics","Diplomacy","Sharp Power","International Relations","Geopolitics","Political Science"],"language_tesim":["English"],"description_tesim":["This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker \u0026 Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy."],"license_tesim":["http://creativecommons.org/licenses/by-nc-sa/4.0/"],"date_created_tesim":["August 11, 2019"],"thumbnail_path_ss":"/downloads/v692t7665?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["v692t7665"],"member_of_collections_ssim":["International Relations - China"],"member_of_collection_ids_ssim":["vx021g49h"],"file_set_ids_ssim":["v692t7665"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DOES THE ONECHINA POLICY SHAPE THE PEOPLES REPUBLIC OF CHINAS FOREIGN POLICY SOFT SHARP AND HARD POWER","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["turnergw@mail.uc.edu"],"nesting_collection__ancestors_ssim":["vx021g49h"],"nesting_collection__parent_ids_ssim":["vx021g49h"],"nesting_collection__pathnames_ssim":["vx021g49h/cj82k8757"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697121838869512192,"timestamp":"2021-04-15T15:45:09.542Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:21:43Z","system_modified_dtsi":"2020-07-10T14:45:30Z","has_model_ssim":["StudentWork"],"id":"v405sb80s","accessControl_ssim":["754919ed-7e45-4de7-8049-cf2e915bda1e"],"hasRelatedMediaFragment_ssim":["dj52w6044"],"hasRelatedImage_ssim":["dj52w6044"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Fail-Safe Erase"],"date_uploaded_dtsi":"2020-07-06T13:21:43Z","date_modified_ssi":"Fri Jul 10 10:45:28 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Dean, Zackary","Bach, Spencer","Sullivan, Nicholas"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["The FCC reported that there were about 3.1 million smartphone thefts in 2013. Today nearly everyone owns at least one smart device, and many people tend to keep personal or business information on these same devices. If your device is lost the first reaction you might have is to use attempt to use 3rd party software to locate or wipe the sensitive data from your device, but what happens when the connection to those services is severed? The Fail-Safe Erase application aims to provide you with the ability to wipe your device after its disconnected from reaching network services. After setting up a personalized password and a wipe timer, the Fail-Safe Erase application will run in the background while looking for those services. Once the connection to GPS, network, and cellular service is interrupted the wipe timer begins its countdown. If the user does not access their device to interrupt the wipe timer within the time set by the user, the device will begin to wipe itself of all personal data. Fail-Safe Erase aims to ensure that if you can’t gain access to your mobile device, remotely or physically, the private data on it will be securely erased, hopefully before it falls into the wrong hands."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/dj52w6044?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dj52w6044","kd17cv22k"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["dj52w6044","kd17cv22k"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"FAILSAFE ERASE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/v405sb80s"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086701839581184,"timestamp":"2021-04-15T06:26:40.259Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:19:07Z","system_modified_dtsi":"2020-07-10T14:45:32Z","has_model_ssim":["StudentWork"],"id":"t722hb23r","accessControl_ssim":["b99f18e3-cc8d-4309-a08a-09f66cff47b0"],"hasRelatedMediaFragment_ssim":["hx11xg81c"],"hasRelatedImage_ssim":["hx11xg81c"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["GoCart"],"date_uploaded_dtsi":"2020-07-06T13:19:06Z","date_modified_ssi":"Fri Jul 10 10:45:30 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Basford, Zachary","Wroblewski, Casey","Mastroianni, Jacob"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["The use of the GoCart application will have the ability to enhance grocery shoppers’ experience by taking the shopping list and generating the most efficient shopping path. According to the Time Use Institute, the average shopping trip takes 45 minutes. In part, the time spent is attributed to confusing store layout, congested aisles, and uninformed staff (Marks, 2015). Results from our grocery shopping experience has shown that more time is directed towards roaming through the aisles searching for the items. There are applications dealing with allowing us to create a virtual list, but none directed towards the location of the items. Along with GoCart creating the most productive shopping path with the virtual list, there will also be a map with the store layout that pinpoints each item. Having GoCart will make the next trip to the grocery store quick and painless."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/hx11xg81c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gx41mk332","hx11xg81c"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["gx41mk332","hx11xg81c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GOCART","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/t722hb23r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086702360723456,"timestamp":"2021-04-15T06:26:40.756Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:14:40Z","system_modified_dtsi":"2020-07-10T14:45:37Z","has_model_ssim":["StudentWork"],"id":"j38608398","accessControl_ssim":["d9b5b074-cf58-4827-ac7e-062e06f0cbfb"],"hasRelatedMediaFragment_ssim":["02870x49z"],"hasRelatedImage_ssim":["02870x49z"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Nibbler"],"date_uploaded_dtsi":"2020-07-06T13:14:39Z","date_modified_ssi":"Fri Jul 10 10:45:35 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Young, Ryan","Schaller, Konrad","Ehemann, Vincent"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Nibbler is an android application used to search and find restaurants based on specific\r\nfilters applied by the user. Nibbler gives users the ability to apply multiple filters to their\r\nsearches and allows those with dietary restrictions or food allergies to find restaurants that fit\r\ntheir specific diet. Nibbler also aims to eliminate the issue of analysis paralysis by limiting the\r\nreturn on food locations that are returned to the user after completing a search. The reason for\r\nthis is simple, if there are too many options, then an individual can overanalyze or overthink the\r\nsituation. This way the user still has everything they originally searched for, but the decision is\r\neasier due to the fact that they are limited in their options. The application is simple to use and\r\nanyone with an android device can navigate the simple UI. This allows users to store personal\r\ndata and health information safely and securely."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/02870x49z?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["02870x49z","t435gf42q"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["02870x49z","t435gf42q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"NIBBLER","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/j38608398"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086724721606656,"timestamp":"2021-04-15T06:27:02.081Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:11:08Z","system_modified_dtsi":"2020-07-10T14:45:39Z","has_model_ssim":["StudentWork"],"id":"5425kc12b","accessControl_ssim":["cd4aeac3-44b1-49bb-8011-5c59116ed13e"],"hasRelatedMediaFragment_ssim":["4q77fs521"],"hasRelatedImage_ssim":["4q77fs521"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["PrepIN"],"date_uploaded_dtsi":"2020-07-06T13:11:08Z","date_modified_ssi":"Fri Jul 10 10:45:37 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Ferdiny, David","Millsap, Kyle","Thomas, Tyler"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Getting a job interview does not mean automatically landing a job. For people in IT, the interview process can be very lengthy and involve multiple face to face interviews and skill testing. These interviews can be stressful and hard to prepare for. No one should be held back from getting a job they are qualified for. In order to help people prepare for interviews, we have created PrepIN. PrepIN will do what sites like Indeed and Hackerrank do not. Anyone would be able to schedule a time for a practice interview. They will participate in a one to one host video call and have access to a video message chat. Having access to a test environment that will put them face to face with someone will better help stimulate the interview environment and process. That way job seekers can work to deal with the stress and anxiety that many face during interviews."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/4q77fs521?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["4t64gp60z","4q77fs521"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["4t64gp60z","4q77fs521"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PREPIN","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/5425kc12b"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086727656570880,"timestamp":"2021-04-15T06:27:04.880Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:07:39Z","system_modified_dtsi":"2020-07-10T14:45:41Z","has_model_ssim":["StudentWork"],"id":"hh63sx471","accessControl_ssim":["2b8bc013-55b8-4fe4-a96c-ea703fd6bc6a"],"hasRelatedMediaFragment_ssim":["6969z251d"],"hasRelatedImage_ssim":["6969z251d"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["UC CTF"],"date_uploaded_dtsi":"2020-07-06T13:07:39Z","date_modified_ssi":"Fri Jul 10 10:45:40 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Penn, Devaughn","Reilly, Taylor","Glecker, Sydney"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to cybersecurityventures.com, despite the high demand for new talent in the cyber security field, there are currently not enough cyber professionals to fill this need (Morgan, 2019, p. 1). To generate new cyber talent, the Ohio Cyber Range Institute utilizes its in-house web application to host regional Capture-the-Flag (CTF) events—exciting, cyber-themed competitions that help inform and spur interest in cyber security. Our project, UC CTF, takes that existing web application and greatly expands upon it. UC CTF features a completely redesigned application site, enhanced functionality and quality-of-life improvements for site administrators, and a brand new question repository of fun cyber challenges for CTF players—from beginner to expert and everything in between. UC CTF greatly improves upon the capabilities of the original application, allows for players of all skill levels to engage in an exciting CTF environment, and helps to develop new talent in cybersecurity."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/6969z251d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6969z251d","bk128c31j"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["6969z251d","bk128c31j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"UC CTF","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/hh63sx471"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086723543007232,"timestamp":"2021-04-15T06:27:00.957Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:05:22Z","system_modified_dtsi":"2020-07-10T14:45:44Z","has_model_ssim":["StudentWork"],"id":"6w924d41m","accessControl_ssim":["203f817b-0c1f-425c-827d-005a87a10495"],"hasRelatedMediaFragment_ssim":["t722hb22g"],"hasRelatedImage_ssim":["t722hb22g"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["iMechanic"],"date_uploaded_dtsi":"2020-07-06T13:05:22Z","date_modified_ssi":"Fri Jul 10 10:45:42 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Gill, Taylor","Gigliotti, Ryan","Nader, Alec"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Car maintenance management can be difficult due the different components that are commonly repaired and replaced. Even if an owner has vast knowledge of their vehicle’s maintenance routine, it is common to forget when a component was replaced. Consumer Reports advises that the best way to save money at the mechanic is to do proper research on specific components, and fix/replace components at the right time. iMechanic is a multi-platform web application that allows car owners to take maintenance into their own hands by keeping detailed work logs and allowing owners to efficiently organize their car’s data. The user can input simple vehicle information to create their dashboard, where they can get familiar with common maintenance routines, costs, and local mechanics. When a car owner uses a proper organization management tool, they can increase the well-being of their vehicle, while also saving money from avoiding unnecessary repairs."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["q811km162","t722hb22g"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["q811km162","t722hb22g"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IMECHANIC","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/6w924d41m"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086724163764224,"timestamp":"2021-04-15T06:27:01.549Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:03:28Z","system_modified_dtsi":"2020-07-10T14:45:46Z","has_model_ssim":["StudentWork"],"id":"k0698887b","accessControl_ssim":["adabcdd1-c969-46a6-8ce9-c4c4ec7f1fea"],"hasRelatedMediaFragment_ssim":["tt44pp176"],"hasRelatedImage_ssim":["tt44pp176"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["HomeWatch"],"date_uploaded_dtsi":"2020-07-06T13:03:28Z","date_modified_ssi":"Fri Jul 10 10:45:44 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Bosse, Josh","Salzmann, Stefan","Rankey, Mark"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to a study in 2018 from PSYCOM, it was concluded that 50% of teenagers feel they are addicted to their smartphones, 60% of adults say that they believe that their children are having issues with time on their phone and, on average, 60% adults and children state they immediately respond to notifications. HomeWatch is a web-based application that would give everyone ease of mind when it comes to overlogging by tracking the time used on certain websites and applications without limiting time or function. HomeWatch is meant to be a safeguard for expectations set by parents so that children aren’t abusing time on their device. With social media, and easy access apps on smartphones, it is easier to spend more time on the phone than it is to do productive work, and HomeWatch is there to make sure that work and play are budgeted effectively."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/tt44pp176?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["d504rm95c","tt44pp176"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["d504rm95c","tt44pp176"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HOMEWATCH","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/k0698887b"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086725907546112,"timestamp":"2021-04-15T06:27:03.212Z","score":0.00049999997},{"system_create_dtsi":"2020-07-06T13:01:43Z","system_modified_dtsi":"2020-07-10T14:45:48Z","has_model_ssim":["StudentWork"],"id":"pc289k498","accessControl_ssim":["798e5f87-1c93-483d-826a-dc8aba465317"],"hasRelatedMediaFragment_ssim":["8910jw28t"],"hasRelatedImage_ssim":["8910jw28t"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Easy DB"],"date_uploaded_dtsi":"2020-07-06T13:01:43Z","date_modified_ssi":"Fri Jul 10 10:45:47 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Watkins, William","Pelton, Spencer","Dantz, Austin"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["According to Marketing Metrics [1] businesses have a 60 to 70 percent chance to sell to existing customers versus just 5 to 20 percent for other prospects. A database can provide essential insights into a customer’s choices that can be used to grow a business. Unfortunately, many small businesses do not have the knowledge or budget to create and manage a database. EasyDB aims to alleviate the stress on small businesses by providing a tool to learn the basics of database design as well as getting a template database created in real time that a small business can set up quickly with some acquired knowledge. This is done using EasyDB’s guided template builder that walks users through the creation of essential database designs with the intention of creating an end database that the user can download for their own use. When the guided learning databases are not enough there are also templates, that users can edit and download to meet their specific needs. In the case that we tested with a small business owner, the owner was able to step through all of the guides and gain enough knowledge to implement a database that he could use in the future."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/8910jw28t?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["8910jw28t","hh63sx46r"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["8910jw28t","hh63sx46r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"EASY DB","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/pc289k498"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086723032350720,"timestamp":"2021-04-15T06:27:00.470Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Etd","hits":994,"label":"Etd"},{"value":"Image","hits":786,"label":"Image"},{"value":"Student Work","hits":675,"label":"Student Work"},{"value":"Document","hits":153,"label":"Document"},{"value":"Dataset","hits":145,"label":"Dataset"},{"value":"Article","hits":139,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"},{"value":"Depoe, Steve","hits":77,"label":"Depoe, Steve"},{"value":"Fitzsimons, Rodney","hits":76,"label":"Fitzsimons, Rodney"},{"value":"McCabe, Erin E.","hits":58,"label":"McCabe, Erin E."},{"value":"Acheson, Phoebe","hits":57,"label":"Acheson, Phoebe"},{"value":"Library Service, CECH","hits":49,"label":"Library Service, CECH"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Music","hits":135,"label":"Music"},{"value":"Geology","hits":113,"label":"Geology"},{"value":"Environmental Communication","hits":77,"label":"Environmental Communication"},{"value":"Design","hits":71,"label":"Design"},{"value":"Chemistry, Organic","hits":57,"label":"Chemistry, Organic"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Other","hits":1013,"label":"Other"},{"value":"Arts and Sciences","hits":901,"label":"Arts and Sciences"},{"value":"Education, Criminal Justice, and Human Services","hits":469,"label":"Education, Criminal Justice, and Human Services"},{"value":"Engineering and Applied Science","hits":258,"label":"Engineering and Applied Science"},{"value":"Libraries","hits":159,"label":"Libraries"},{"value":"Design, Architecture, Art and Planning","hits":132,"label":"Design, Architecture, Art and Planning"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Other","hits":992,"label":"Other"},{"value":"Classics","hits":767,"label":"Classics"},{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Mechanical Engineering Technology","hits":190,"label":"Mechanical Engineering Technology"},{"value":"Information Technology","hits":169,"label":"Information Technology"},{"value":"SCFMS Adjuncts","hits":77,"label":"SCFMS Adjuncts"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1412,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"Spanish","hits":17,"label":"Spanish"},{"value":"German","hits":5,"label":"German"},{"value":"French","hits":4,"label":"French"},{"value":"English ","hits":2,"label":"English "}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"Dispute Resolution Institute Press","hits":28,"label":"Dispute Resolution Institute Press"},{"value":"College of Design, Architecture, Art and Planning","hits":1,"label":"College of Design, Architecture, Art and Planning"},{"value":"ICAERA'2016","hits":1,"label":"ICAERA'2016"},{"value":"International Journal of Plant Sciences","hits":1,"label":"International Journal of Plant Sciences"},{"value":"Johns Hopkins University","hits":1,"label":"Johns Hopkins University"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"},{"value":"2003","hits":89,"label":"2003"},{"value":"2017-10-31","hits":75,"label":"2017-10-31"},{"value":"2001-03-18","hits":69,"label":"2001-03-18"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"bc387z838","hits":187,"label":"bc387z838"},{"value":"d504rk335","hits":70,"label":"d504rk335"},{"value":"7d278v66w","hits":50,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":3005,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":46,"next_page":47,"prev_page":45,"total_pages":301,"limit_value":10,"offset_value":450,"total_count":3005,"first_page?":false,"last_page?":false}}}