Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

2019

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 82

Full-Text Articles in Computer Engineering

Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan Dec 2019

Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan

Electrical & Computer Engineering and Computer Science Faculty Publications

With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …


Chapman Ambassador Tour Robot, Alexandra Lewandowski, Yanni Parissis, Khiry Carter, Hilary Lee Dec 2019

Chapman Ambassador Tour Robot, Alexandra Lewandowski, Yanni Parissis, Khiry Carter, Hilary Lee

Student Scholar Symposium Abstracts and Posters

Being a student ambassador improves a student's confidence and leadership skills. With an increasing demand for technology skills, our project will display how the ambassador robot can assist student ambassadors while improving upon their efficiency, by discussing information during college campus tours and familiarizing students with robot applications and their technology. The ambassador robot can support students during tours by answering a question about specific knowledge that may have slipped an ambassador's mind. The robot will also be able to create a group-focused atmosphere that will allow ambassadors to have the opportunity to lean on a dependable teammate for specific …


Tuning Networks For Prosocial Behavior: From Senseless Swarms To Smart Mobs [Commentary], Sun Sun Lim, Roland Bouffanais Dec 2019

Tuning Networks For Prosocial Behavior: From Senseless Swarms To Smart Mobs [Commentary], Sun Sun Lim, Roland Bouffanais

Research Collection College of Integrative Studies

Social media have been seen to accelerate the spread of negative content such as disinformation and hate speech, often unleashing a reckless herd mentality within networks, further aggravated by malicious entities using bots for amplification. So far, the response to this emerging global crisis has centered around social media platform companies making reactive moves that appear to have greater symbolic value than practical utility. Proposes a solution to favor prosocial behavior via social networks.


Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park Dec 2019

Of Promoting Networking And Protecting Privacy: Effects Of Defaults And Regulatory Focus On Social Media Users’ Preference Settings, Hichang Cho, Sungjong Roh, Byungho Park

Research Collection Lee Kong Chian School Of Business

Privacyresearch has debated whether privacy decision-making is determined by users'stable preferences (i.e., individual traits), privacy calculus (i.e.,cost-benefit analysis), or “responses on the spot” that vary across contexts.This study focuses on two factors—default setting as a contextual factor andregulatory focus as an individual difference factor—and examines the degree towhich these factors affect social media users' decisionmaking when usingprivacy preference settings in a fictitious social networking site. Theresults, based on two experimental studies (study 1, n = 414; study 2, n =213), show that default settings significantly affect users' privacypreferences, such that users choose the defaults or alternatives proximal tothem. Study 2 …


Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison Nov 2019

Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison

Journal of Network Music and Arts

In 2016, I created an interactive installation called Video Voto Matic. This project was a mashup between the Votomatic voting system and a Roland TR-808 drum machine. To coincide with the 2020 election season, I am currently working on an update of the project that will include a touch screen voting interface and multiple networked stations that also produce audio and video output. The interface will be housed in the same voting booths that once housed the Diebold Accuvote TS. The Diebold Accuvote TS is a screen-based voting machine that does not utilize paper as a backup. Researchers have examined …


Being Together—Or, Being Less Un-Together—With Networked Music, Rebekah Wilson, Andrew Mcmillan Nov 2019

Being Together—Or, Being Less Un-Together—With Networked Music, Rebekah Wilson, Andrew Mcmillan

Journal of Network Music and Arts

When musicians cannot travel to another location where other musicians are, they generally assume that this means they cannot perform music together—even while the technology exists to allow them to do so. The perception that Internet technology is not suited for music performance is due to a lack of exposure on navigating the limitations specific to networked music, along with the cultural belief that latency is incompatible with music performance. Many groups, however, have successfully created networked music performance systems. Such systems are particularly interesting in affording new musical and social opportunities in cases when musicians cannot travel due to …


Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice Nov 2019

Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice

Journal of Network Music and Arts

Participation in conferences is an elemental component of professional life throughout the world. Two problems offset the social synergy gained from attending a far-away gathering of like-minded people. The first is the highly pronounced carbon footprint from air travel, and the second is the expense involved to participate in a conference which may be on another continent. These factors prevent many from participating who could otherwise benefit as well as contribute. As videoconferencing becomes more common and more sophisticated, it will serve as an alternative that not only benefits constituencies, but will expand the reach of a conference to more …


Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler Nov 2019

Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler

Journal of Network Music and Arts

Under the conditions of its geographic distribution, the “telematic performance” can be regarded as a remediation of traditional concert, theater or dance formats. Conversely, and as this paper argues, the telematic performance can also be understood as an artistic format of its own right, one which then can serve as a trope for social interaction under the conditions of critical posthumanism. To gain a wider perspective, this paper analyzes Alan Turing’s “Imitation Game” from his seminal article Computing Machinery and Intelligence, 1950, proposing it as an early conceptualization of a telematic performance. This against-the-grain reading of Turing’s text reveals certain …


Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius Nov 2019

Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius

Journal of Network Music and Arts

INTIMAL is an interactive system for relational listening, which integrates physical-virtual interfaces for people to sonically improvise between distant locations. The aim is to embrace two key aspects in the context of human migration: the sense of place and the sense of presence. This paper reflects on the use of INTIMAL in a long-distance improvisation between the cities of Oslo, Barcelona and London in May 2019. This improvisation was performed by nine Colombian migrant women, who had been involved in a research process using the Deep Listening® practice developed by Pauline Oliveros. Here we describe the performance setting and the …


Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon Nov 2019

Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon

Journal of Network Music and Arts

No abstract provided.


Editorial, Sarah Weaver Nov 2019

Editorial, Sarah Weaver

Journal of Network Music and Arts

Welcome to the Journal of Network Music and Arts (JONMA). JONMA is a peer-reviewed open access digital research journal published by Stony Brook University. Network Music and Arts utilize the Internet and related technologies as an artistic medium for works created for this platform. JONMA will publish research by artists, technologists, educators, and related scholars. The journal content will include articles, audio and video documentation, and reviews for books and recordings.


Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr. Nov 2019

Bibliometric Survey Of Privacy Of Social Media Network Data Publishing, Rupali Gangarde Ass. Prof., Amit Sharma Dr., Ambika Pawar Dr.

Library Philosophy and Practice (e-journal)

We are witness to see exponential growth of the social media network since the year 2002. Leading social media networking sites used by people are Twitter, Snapchats, Facebook, Google, and Instagram, etc. The latest global digital report (Chaffey and Ellis-Chadwick 2019) states that there exist more than 800 million current online social media users, and the number is still exploding day by day. Users share their day to day activities such as their photos and locations etc. on social media platforms. This information gets consumed by third party users, like marketing companies, researchers, and government firms. Depending upon the purpose, …


The Art Of Selecting Phd Students: Combination Of Bibliometric And Ahp Approach, Preeti Mulay Dr., Rahul Raghvendra Joshi Prof., Sophia Gaikwad Dr. Nov 2019

The Art Of Selecting Phd Students: Combination Of Bibliometric And Ahp Approach, Preeti Mulay Dr., Rahul Raghvendra Joshi Prof., Sophia Gaikwad Dr.

Library Philosophy and Practice (e-journal)

For the PhD guide or the advisor selecting the accurate PhD scholar is the most elephantine task. It actually requires an art for the perfect selection; as the length, breadth, depth and volume of PhD work is spread across the years and this relationship between the scholar and the guide should start and flourish positively for the immense experience throughout the PhD process. Hence it was essential to understand bibliometric details including how many researchers have already published their contributions in the form of papers and patents, in the Scopus database. In addition to the bibliometric details, in this study, …


Personality Prediction Through Curriculam Vitae Analysis Involving Password Encryption And Prediction Analysis, Gagandeep Kaur, Shruti Maheshwari Nov 2019

Personality Prediction Through Curriculam Vitae Analysis Involving Password Encryption And Prediction Analysis, Gagandeep Kaur, Shruti Maheshwari

Library Philosophy and Practice (e-journal)

A recruitment process requires an eligibility check, an aptitude evaluation and a psychometric analysis of prospective candidates. The work puts forward an application where the system allows employers to post new job offerings and registered candidates can apply. The application estimates applicant’s emotional aptitude through a psychometric analysis based on a test whereas the professional standard is verified via a technical aptitude test. OCEAN Model is used to assess emotional quotient and predict the personality traits. Machine learning techniques such as Logistic Regression are used for modelling the personality predictor. The details of the candidates are kept secure by using …


Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma Nov 2019

Global Research Trend On Cyber Security: A Scientometric Analysis, Somesh Rai, Kunwar Singh Dr, Akhilesh Kumar Varma

Library Philosophy and Practice (e-journal)

Scientometrics is a quantitative analysis of scholarly literature related to a particular subject or area (well defined by some limits, scope and coverage), which helps to understand different aspects about the scholarly literature’s growth in various dimensions of knowledge. Similarly, this study is a quantitative analysis of the Global research trends in cyber security. Some works related to scientometrics of ‘deception, counter-deception in cyberspace’ had been published in 2011, but we have focused on ‘cyber security’ as the topic of research. For analysis we have utilised the published data available in Scopus database, which is directly related to ‘cyber security’. …


How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive Oct 2019

How To Create And Maintain An Effective Information Architecture And Navigation System For Science Gateway Websites, Noreen Y. Whysel, Omni Marketing Interactive

Publications and Research

Whether you have an existing Science Gateway website or are creating your first one, this hands-on tutorial will show you, step by step, how to create and update gateway websites so that their content is easier to find and easier to use.

As a Science Gateway provides its web-based tools and resources, it is essential that these sites utilize specific usability tests and other research methods to ensure positive and productive experiences with the sites. Successful information architecture (IA), intuitive site navigation, and clear user interfaces (UIs) all rely on knowing where various users expect to find needed information.

Since …


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …


Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd Oct 2019

Vrsensory: Designing Inclusive Virtual Games With Neurodiverse Children, Ben Wasserman, Derek Prate, Bryce Purnell, Alex Muse, Kaitlyn Abdo, Kendra Day, Louanne Boyd

Engineering Faculty Articles and Research

We explore virtual environments and accompanying interaction styles to enable inclusive play. In designing games for three neurodiverse children, we explore how designing for sensory diversity can be understood through a formal game design framework. Our process reveals that by using sensory processing needs as requirements we can make sensory and social accessible play spaces. We contribute empirical findings for accommodating sensory differences for neurodiverse children in a way that supports inclusive play. Specifically, we detail the sensory driven design choices that not only support the enjoyability of the leisure activities, but that also support the social inclusion of sensory-diverse …


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz Oct 2019

Modeling Social Learning: An Agent-Based Approach, Erika G. Ardiles Cruz

Computational Modeling & Simulation Engineering Theses & Dissertations

Learning is the process of acquiring or modifying knowledge, behavior, or skills. The ability to learn is inherent to humans, animals, and plants, and even machines are provided with algorithms that could mimic in a restricted way the processes of learning. Humans learn from the time they are born until they die because of a continuous process of interaction between them and their environment. Behavioral Psychology Theories and Social Learning Theories study behavior learned from the environment and social interactions through stimulus-response. Some computer approaches to modeling human behavior attempted to represent the learning and decision-making processes using agent-based models. …


Bibliometric Survey On Incremental Clustering Algorithms, Archana Chaudhari, Rahul Raghvendra Joshi, Preeti Mulay, Ketan Kotecha, Parag Kulkarni Sep 2019

Bibliometric Survey On Incremental Clustering Algorithms, Archana Chaudhari, Rahul Raghvendra Joshi, Preeti Mulay, Ketan Kotecha, Parag Kulkarni

Library Philosophy and Practice (e-journal)

For clustering accuracy, on influx of data, the parameter-free incremental clustering research is essential. The sole purpose of this bibliometric analysis is to understand the reach and utility of incremental clustering algorithms. This paper shows incremental clustering for time series dataset was first explored in 2000 and continued thereafter till date. This Bibliometric analysis is done using Scopus, Google Scholar, Research Gate, and the tools like Gephi, Table2Net, and GPS Visualizer etc. The survey revealed that maximum publications of incremental clustering algorithms are from conference and journals, affiliated to Computer Science, Chinese lead publications followed by India then United States. …


Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen Sep 2019

Research Toward A Partially-Automated, And Crime Specific Digital Triage Process Model, Gary Cantrell, David Dampier, Yoginder S. Dandass, Nan Niu, Chris Bogen

David Dampier

The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories.

The time it takes to complete these stages is quickly becoming a serious problem. Digital forensic laboratories do not have the resources and time to keep up with the growing demand for digital forensic examinations with the current methodologies. One solution to this problem is the use of pre-examination techniques …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …


Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang Aug 2019

Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang

Electrical & Computer Engineering and Computer Science Faculty Publications

The ongoing popularity of health and fitness applications catalyzes

the need for exploring forensic artifacts produced by them. Sensitive

Personal Identifiable Information (PII) is requested by the applications

during account creation. Augmenting that with ongoing

user activities, such as the user’s walking paths, could potentially

create exculpatory or inculpatory digital evidence. We conducted

extensive manual analysis and explored forensic artifacts produced

by (n = 13) popular Android mobile health and fitness applications.

We also developed and implemented a tool that aided in the timely

acquisition and identification of artifacts from the examined applications.

Additionally, our work explored the type of …


Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili Aug 2019

Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …


The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid Jul 2019

The Design And Implementation Of Aida: Ancient Inscription Database And Analytics System, M Parvez Rashid

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

AIDA, the Ancient Inscription Database and Analytic system can be used to translate and analyze ancient Minoan language. The AIDA system currently stores three types of ancient Minoan inscriptions: Linear A, Cretan Hieroglyph and Phaistos Disk inscriptions. In addition, AIDA provides candidate syllabic values and translations of Minoan words and inscriptions into English. The AIDA system allows the users to change these candidate phonetic assignments to the Linear A, Cretan Hieroglyph and Phaistos symbols. Hence the AIDA system provides for various scholars not only a convenient online resource to browse Minoan inscriptions but also provides an analysis tool to explore …


Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali Jul 2019

Personality And Technology: Big Five Personality Traits As Descriptors Of Universal Acceptance And Usage Of Technology Utaut., Shohar Bano, Ubaid Ullah Shah, Dr. Sabha Ali

Library Philosophy and Practice (e-journal)

Presently, information professionals are progressively dependent on information and communication technologies to complete their everyday tasks. As, result dependence on PC frameworks, programming and data innovation-related technologies are increasing for better working and providing quality services. Therefore, to understand, analyze and evaluate the acceptance and use of this technology several models of technology acceptance and use have been formulated in information science literature. Using eight such models, Venkatesh, Morris, Davis and Davis proposed a unified model called the Unified Theory of Acceptance and Use of Technology or (UTAUT) model. The UTAUT model has been studied and analyzed in various spheres …


A Systematic Review Of Studies On Educational Robotics, Saira Anwar, Nicholas Alexander Bascou, Muhsin Menekse, Asefeh Kardgar Jul 2019

A Systematic Review Of Studies On Educational Robotics, Saira Anwar, Nicholas Alexander Bascou, Muhsin Menekse, Asefeh Kardgar

Journal of Pre-College Engineering Education Research (J-PEER)

There has been a steady increase in the number of studies investigating educational robotics and its impact on academic and social skills of young learners. Educational robots are used both in and out of school environments to enhance K–12 students’ interest, engagement, and academic achievement in various fields of STEM education. Some prior studies show evidence for the general benefits of educational robotics as being effective in providing impactful learning experiences. However, there appears to be a need to determine the specific benefits which have been achieved through robotics implementation in K–12 formal and informal learning settings. In this study, …


Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che Jul 2019

Intelligent Software Tools For Recruiting, Swatee B. Kulkarni, Xiangdong Che

Journal of International Technology and Information Management

In this paper, we outline how recruiting and talent acquisition gained importance within HRM field, then give a brief introduction to the newest tools used by the professionals for recruiting and lastly, describe the Artificial Intelligence-based tools that have started playing an increasingly important role. We also provide further research suggestions for using artificial intelligence-based tools to make recruiting more efficient and cost-effective.