Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social Media

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 61 - 90 of 142

Full-Text Articles in Computer Engineering

A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche May 2019

A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …


The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski May 2019

The Role Of Emotional Expression In Accessing Social Networks: The Case Of Newcomers' Blogs, Michael J. Hine, Luciara Nardon, Daniel Gulanowski

Journal of International Technology and Information Management

Research has established the critical role of social networks in facilitating adjustment to foreign environments. Increasingly, social interactions are happening through computer mediated technology. This paper explores the role of emotional expression in newcomers’ blogs in developing and interacting with social networks in a new country. This research uses a dictionary-based text analytics approach to detect emotional expression in newcomers’ blog posts and their associated discussions. Blog posts with more emotional expression had more associated responses; discussions tended to be more positive than posts; and the relative amount of negative emotion in the discussions increases as posts become more negative. …


Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He May 2019

Crude Oil Price Prediction With Decision Tree Based Regression Approach, Engu Chen, Xin James He

Journal of International Technology and Information Management

Crude oil is an essential commodity for industry and the prediction of its price is crucial for many business entities and government organizations. While there have been quite a few conventional statistical models to forecast oil prices, we find that there is not much research using decision tree models to predict crude oil prices. In this research, we develop decision tree models to forecast crude oil prices. In addition to historical crude oil price time series data, we also use some predictor variables that would potentially affect crude oil prices, including crude oil demand and supply, and monthly GDP and …


College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch May 2019

College Choice Criteria Utilizing Conjoint Analysis Enabled On A Saas Platform, Alison Munsch

Journal of International Technology and Information Management

College enrollments and low to moderate household incomes are stagnating while tuition costs are increasing. The New York State Legislature enacted the nation’s first tuition-free degree program, the Excelsior Scholarship, designed to make a college education more affordable to middle class families. This legislation can impact what institution of higher education students will choose upon high school graduation. In order to understand the choice criteria for selecting an institution of higher education, a research study was conducted among a representative sample of high school upper classmen and parents of this respondent segment. The data collection and analysis were accomplished using …


Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan Apr 2019

Evaluating Stakeholder Bias In Stakeholder Analysis In Social Media, Ahmad A. Bajarwan

Engineering Management & Systems Engineering Theses & Dissertations

Stakeholder analysis is the first step in the planning of most infrastructure projects. Selecting and then applying the best method for a project’s stakeholder analysis is extremely important for correctly assessing stakeholder opinions. Social media platforms allow stakeholders to participate directly in analysis. However, as with most other analysis methods, social media introduces inherent biases.

Social media is a powerful tool for communication and networking, and it also provides a valuable source of information for analyzing user opinions about infrastructure projects. By using data collected from Twitter, analysts can create networks to represent connections among users, quantify their similarities, and …


Table Of Contents Jitim Vol 28 Issue 1, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 1, 2019

Journal of International Technology and Information Management

Table of contents


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye Jan 2019

A Systematic Review Of Process Modelling Methods And Its Application For Personalised Adaptive Learning Systems, Kingsley Okoye

Journal of International Technology and Information Management

This systematic review work investigates current literature and methods that are related to the application of process mining and modelling in real-time particularly as it concerns personalisation of learning systems, or yet still, e-content development. The work compares available studies based on the domain area of study, the scope of the study, methods used, and the scientific contribution of the papers and results. Consequently, the findings of the identified papers were systematically evaluated in order to point out potential confounding variables or flaws that might have been overlooked or missing in the current literature. In turn, a critical structured analysis …


Table Of Contents Jitim Vol 27 Issue 4, 2018-2019 Jan 2019

Table Of Contents Jitim Vol 27 Issue 4, 2018-2019

Journal of International Technology and Information Management

ToC JITIM - Special Issue on ICT4D


A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng Jan 2019

A Multilayer Secured Messaging Protocol For Rest-Based Services, Idongesit Efaemiode Eteng

Journal of International Technology and Information Management

The lack of descriptive language and security guidelines poses a big challenge to implementing security in Representational State Transfer (REST) architecture. There is over reliance on Secure Socket Layer/Transport Layer Security (SSL/TLS), which in recent times has proven to be fallible. Some recent attacks against SSL/TLS include: POODLE, BREACH, CRIME, BEAST, FREAK etc. A secure messaging protocol is implemented in this work. The protocol is further compiled into a reusable library which can be called by other REST services. Using Feature Driven Development (FDD) software methodology, a two layer security protocol was developed. The first layer is a well hardened …


Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che Jan 2019

Agent-Based Modeling And Simulation Approaches In Stem Education Research, Shanna R. Simpson-Singleton, Xiangdong Che

Journal of International Technology and Information Management

The development of best practices that deliver quality STEM education to all students, while minimizing achievement gaps, have been solicited by several national agencies. ABMS is a feasible approach to provide insight into global behavior based upon the interactions amongst agents and environments. In this review, we systematically surveyed several modeling and simulation approaches and discussed their applications to the evaluation of relevant theories in STEM education. It was found that ABMS is optimal to simulate STEM education hypotheses, as ABMS will sensibly present emergent theories and causation in STEM education phenomena if the model is properly validated and calibrated.


Table Of Contents Jitim Vol 28 Issue 4, 2019 Jan 2019

Table Of Contents Jitim Vol 28 Issue 4, 2019

Journal of International Technology and Information Management

Table of Contents


Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He Dec 2018

Crude Oil Prices Forecasting: Time Series Vs. Svr Models, Xin James He

Journal of International Technology and Information Management

This research explores the weekly crude oil price data from U.S. Energy Information Administration over the time period 2009 - 2017 to test the forecasting accuracy by comparing time series models such as simple exponential smoothing (SES), moving average (MA), and autoregressive integrated moving average (ARIMA) against machine learning support vector regression (SVR) models. The main purpose of this research is to determine which model provides the best forecasting results for crude oil prices in light of the importance of crude oil price forecasting and its implications to the economy. While SVR is often considered the best forecasting model in …


Table Of Contents Jitim Vol 27 Issue 3, 2018 Dec 2018

Table Of Contents Jitim Vol 27 Issue 3, 2018

Journal of International Technology and Information Management

Table of Contents


Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali Jul 2018

Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali

Dissertations and Theses Collection (Open Access)

The rapid increase in online social networking services over the last decade has pre- sented an unprecedented opportunity to observe users’ behaviour both on a societal and individual level. The insight gained from analysing such data can help foster a deeper understanding of social media users and the flow of information, while also offering valuable business applications. User relationships are among the most studied aspects of online behaviour. These relationships are not homogeneous. Past research has shown that people use social networks to both socialize and source in- formation. Hence, different types of links – used to socialize, gain information, …


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu Jan 2018

Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu

Journal of International Technology and Information Management

Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.


Table Of Contents Jitim Vol 27 Issue 2, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 2, 2018

Journal of International Technology and Information Management

ToC JITIM vol 27 - 2, 2018


Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim Dec 2017

Developing A Digital Contents Valuing Model: How Users Appreciate Their Values, Changsu Kim, Jongheon Kim

Journal of International Technology and Information Management

The principal objective of this paper was to propose and verify a digital content valuing model, which is expected to perform a significant role in future research, and provide novel and practical implications. For the efficacy of a model for the evaluation of digital content value, this study reviewed digital content value and categorized it into intrinsic, interaction, and business value. Based on the research model, we attempted to identify and assess the effects of intrinsic digital content value on digital content interaction value, and to characterize the relationship between digital content interaction value and digital content business value. Consequently, …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Table Of Contents Jitim Vol 26 Issue 4, 2017 Dec 2017

Table Of Contents Jitim Vol 26 Issue 4, 2017

Journal of International Technology and Information Management

Table of Contents


An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim Nov 2017

An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Social media platforms are one of the fastest ways to disseminate information but they have also been used as a means to spread rumors. If left unchecked, rumors have serious consequences. Counter-rumors, messages used to refute rumors, are an important means of rumor curtailment. The objective of this paper is to examine the types of rumor and counter-rumor messages generated in Twitter in response to the falsely reported death of a politician, Lee Kuan Yew, who was Singapore’s first Prime Minister. Our content analysis of 4321Twitter tweets about Lee’s death revealed six categories of rumor messages, four categories ofcounter-rumor messages …


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco Oct 2017

A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco

Faculty Publications

Social media is rapidly becoming the main source of news consumption for users, raising significant challenges to news aggregation and recommendation tasks. One of these challenges concerns the recommendation of very recent news. To tackle this problem, approaches to the prediction of news popularity have been proposed. In this paper, we study the task of predicting news popularity upon their publication, when social feedback is unavailable or scarce, and to use such predictions to produce news rankings. Unlike previous work, we focus on accurately predicting highly popular news. Such cases are rare, causing known issues for standard prediction models and …


Table Of Contents Jitim Vol 26 Issue 3, 2017 Oct 2017

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


An Unsupervised Multilingual Approach For Online Social Media Topic Identification, Siaw Ling Lo, Raymond Chiong, David Cornforth Sep 2017

An Unsupervised Multilingual Approach For Online Social Media Topic Identification, Siaw Ling Lo, Raymond Chiong, David Cornforth

Research Collection School Of Computing and Information Systems

Social media data can be valuable in many ways. However, the vast amount of content shared and the linguistic variants of languages used on social media are making it very challenging for high-value topics to be identified. In this paper, we present an unsupervised multilingual approach for identifying highly relevant terms and topics from the mass of social media data. This approach combines term ranking, localised language analysis, unsupervised topic clustering and multilingual sentiment analysis to extract prominent topics through analysis of Twitter’s tweets from a period of time. It is observed that each of the ranking methods tested has …


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew Jun 2017

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Table Of Contents Jitim Vol 26 Issue 2, 2017 Jun 2017

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


Discovering Your Selling Points: Personalized Social Influential Tags Exploration, Yuchen Li, Kian-Lee Tan, Ju Fan, Dongxiang Zhang May 2017

Discovering Your Selling Points: Personalized Social Influential Tags Exploration, Yuchen Li, Kian-Lee Tan, Ju Fan, Dongxiang Zhang

Research Collection School Of Computing and Information Systems

Social influence has attracted significant attention owing to the prevalence of social networks (SNs). In this paper, we study a new social influence problem, called personalized social influential tags exploration (PITEX), to help any user in the SN explore how she influences the network. Given a target user, it finds a size-k tag set that maximizes this user’s social influence. We prove the problem is NP-hard to be approximated within any constant ratio. To solve it, we introduce a sampling-based framework, which has an approximation ratio of 1−ǫ 1+ǫ with high probabilistic guarantee. To speedup the computation, we devise more …


Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz Jan 2017

Communication Through Social Technologies: A Study Of Israeli Women, Jeretta Horn Nord 405-747-0320, Dafni Biran Achituv, Joanna Paliszkiewicz

Journal of International Technology and Information Management

Social technologies have changed the way we communicate allowing users to interact, share knowledge, reach out to friends and family, keep up with the news, and even promote and support a business. A study of Israeli women was conducted to determine how social technologies platforms — Facebook, Twitter, LinkedIn, YouTube, and Google+ — are used and the benefits realized. Women worldwide face challenges including economic, educational, health, and political. Israel women, like women in every other country in the world, are challenged with gender inequity. Do women who use social technologies believe that these platforms provide empowerment leading to greater …