Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (408)
- California State University, San Bernardino (127)
- University of Nebraska - Lincoln (114)
- Old Dominion University (74)
- University of New Haven (56)
-
- SelectedWorks (49)
- University of Pennsylvania Carey Law School (48)
- University of Central Florida (43)
- Selected Works (41)
- Stony Brook University (39)
- Singapore Management University (24)
- City University of New York (CUNY) (17)
- Purdue University (17)
- Kansas State University Libraries (15)
- University of South Florida (15)
- Chinese Academy of Sciences (14)
- Technological University Dublin (14)
- University of Arkansas, Fayetteville (14)
- Portland State University (13)
- University of Georgia School of Law (13)
- California Polytechnic State University, San Luis Obispo (12)
- San Jose State University (12)
- University of Nevada, Las Vegas (10)
- University of Denver (9)
- Chapman University (8)
- University of Connecticut (8)
- University of Kentucky (8)
- World Maritime University (8)
- SIT Graduate Institute/SIT Study Abroad (6)
- Marshall University (5)
- Keyword
-
- Digital forensics (54)
- Privacy (31)
- Internet (29)
- Machine learning (28)
- Artificial intelligence (24)
-
- Computer forensics (21)
- Security (21)
- Artificial Intelligence (20)
- Cybersecurity (20)
- Forensics (20)
- Social media (20)
- Technology (20)
- Digital Forensics (18)
- Machine Learning (16)
- Digital evidence (15)
- Bibliometric Analysis (14)
- Innovation (14)
- Virtual reality (14)
- AI (13)
- Survey (13)
- Data (12)
- Human-machine communication (12)
- Social Media (12)
- Deep learning (11)
- Cloud computing (10)
- Computer Forensics (10)
- Data mining (10)
- Digital preservation (10)
- ToC (10)
- Approximate matching (9)
- Publication Year
- Publication
-
- Journal of Digital Forensics, Security and Law (290)
- Journal of International Technology and Information Management (125)
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- Library Philosophy and Practice (e-journal) (84)
- Electrical & Computer Engineering and Computer Science Faculty Publications (56)
-
- All Faculty Scholarship (48)
- Human-Machine Communication (40)
- Journal of Network Music and Arts (39)
- Dr. Mutaz M. Al-Debei (24)
- Dr Deogratias Harorimana (21)
- Research Collection School Of Computing and Information Systems (20)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (14)
- Central Plains Network for Digital Asset Management (14)
- Computational Modeling & Simulation Engineering Faculty Publications (13)
- Electrical & Computer Engineering Theses & Dissertations (13)
- Military Cyber Affairs (13)
- Faculty Publications (10)
- Publications (9)
- Department of Anthropology: Faculty Publications (8)
- Matt Schultz (8)
- Publications and Research (8)
- Computer Science and Computer Engineering Undergraduate Honors Theses (6)
- Dissertations and Theses (6)
- Electronic Theses and Dissertations (6)
- Independent Study Project (ISP) Collection (6)
- International Bulletin of Political Psychology (6)
- Master's Theses (6)
- Modeling, Simulation and Visualization Student Capstone Conference (6)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (6)
- VMASC Publications (6)
Articles 1 - 30 of 1437
Full-Text Articles in Computer Engineering
Vysion Software, Isaias Hernandez-Dominguez Jr, Chander Luderman Miller
Vysion Software, Isaias Hernandez-Dominguez Jr, Chander Luderman Miller
2024 Symposium
Vision loss presents significant challenges in daily life. Existing solutions for blind and visually impaired individuals are often limited in functionality, expensive, or complex to use. Vysion Software addresses this gap by developing a user-friendly, all-in-one AI companion app that provides features including text summarization, real-time audio descriptions, and AI-enhanced navigation. This project details the development plan, initial functionalities, and future vision for Vysion Software.
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
Journal of Police and Legal Sciences
Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …
The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson
The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson
Journal of Network Music and Arts
No abstract provided.
Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang
Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang
Journal of Network Music and Arts
This paper aims to discuss to what extent telematic performances within the framework of the “Beyond Time and Space - London Tokyo Online 2023” initiative serve as a comparative paradigm to physical live performances, particularly in the domains of technical exigencies, artistic expression, and audience engagement.
Central to this study is the “Beyond Time and Space - London Tokyo Online 2023” event, a simultaneous, interactive electronic live music performance connecting physical venues in London and Tokyo. Through JackTrip and Open Broadcaster Software (OBS), this event aspired to explore the applicability and limitations of telematic technology in live electronic music performance …
Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller
Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller
Journal of Network Music and Arts
This paper explores concepts and practices of telematic performances, particularly through the lens of the project kompost*klang*küche*. It emphasizes spatial discontinuity within networked artistic collaborations, as opposed to immersive continuity.
Telematic performance formats utilize network technologies to facilitate low latency artistic endeavors across geographical divides, creating a complex interplay between local, remote, and intermediary spaces. In this context, we interpret spatial configurations from a phenomenological point of view as telematic SPACE in which technical components are in place in three spaces (local, remote and intermediary space) while practiced, embodied and inhabited in an anthropological space, where the overlay and dynamics …
How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock
How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock
Journal of Network Music and Arts
Immersion is a hot topic, but it is often invoked in a vague or shallow way. This essay aims to arrive at a more nuanced consideration of the immersive experience by presenting some perhaps surprising arguments from the past—from Renaissance music and visual arts—drawing parallels with our own time, and positing that the Network Arts can take inspiration from this history to enhance its own immersive endeavours. Four interrelated topics serve as the basis for this investigation: miniature devotionalia, polyphonic canons, anamorphic puzzles, and early cosmology. By using perspective to disclose hidden meanings, ideas, and realities, these varied practices draw …
Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti
Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti
Journal of Network Music and Arts
This article aims to discuss the notions of connectivity, presence, and time in the specific context of telematic music. To do so, we describe the work of the Telematic Ensemble LaFlauta, formed by students and professors from the University of São Paulo, Ribeirão Preto campus, for performance at the NowNet Arts Conference 2023.4 This work involved rehearsals and performances of three compositions dedicated to the group: Virtual Studies (2023) by Paulo C. Chagas, Modules 2 - My Words (2023) by Cássia Carrascoza, and Textural Studies (2023) by Danilo Rossetti. We conclude that the positive results of telematic music in a …
Editorial, Sarah Weaver
Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike
Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike
BAU Journal - Science and Technology
A new approach to user authentication using mental profiling saw light, which is a technique that involves measuring an individual's cognitive abilities and psychological traits to create a unique profile, using Artificial Intelligence techniques. These profiles can then be used to identify users securely and efficiently, even in the presence of sophisticated attacks, by harnessing AI-driven systems for mental profile creation and user authentication.
After reviewing the existing literature on authentication and mental profiling, it presents a new mental profiling test that is specifically designed for authentication purposes. The test was evaluated on a sample of 100 users, and results …
Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays
Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays
Human-Machine Communication
Considering possible impediments to authentic interactions with machines, this study explores contributors to robophobia from the potential dual influence of technological features and individual traits. Through a 2 x 2 x 3 online experiment, a robot’s physical human-likeness, gender, and status were manipulated and individual differences in robot beliefs and personality traits were measured. The effects of robot traits on phobia were non-significant. Overall, subjective beliefs about what robots are, cultivated by media portrayals, whether they threaten human identity, are moral, and have agency were the strongest predictors of robophobia. Those with higher internal locus of control and neuroticism, and …
What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence
What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence
Human-Machine Communication
Artificial intelligence (AI) is fundamentally a communication field. Thus, the study of how AI interacts with us is likely to be heavily driven by communication. The current study examined two things that may impact people’s perceptions of socialness of a social actor: one nonverbal (ontological frame) and one verbal (providing a name) with a 2 (human vs. robot) x 2 (named or not) experiment. Participants saw one of four videos of a study “host” crossing these conditions and responded to various perceptual measures about the socialness and task ability of that host. Overall, data were consistent with hypotheses that whether …
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
An-Najah University Journal for Research - B (Humanities)
Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …
Smart Robot Design And Implementation To Assist Pedestrian Road Crossing, Hovannes Kulhandjian
Smart Robot Design And Implementation To Assist Pedestrian Road Crossing, Hovannes Kulhandjian
Mineta Transportation Institute
This research focuses on designing and developing a smart robot to assist pedestrians with road crossings. Pedestrian safety is a major concern, as highlighted by the high annual rates of fatalities and injuries. In 2020, the United States recorded 6,516 pedestrian fatalities and approximately 55,000 injuries, with children under 16 being especially vulnerable. This project aims to address this need by offering an innovative solution that prioritizes real-time detection and intelligent decision-making at intersections. Unlike existing studies that rely on traffic light infrastructure, our approach accurately identifies both vehicles and pedestrians at intersections, creating a comprehensive safety system. Our strategy …
Technocene, Vir Joseph Naidu
Technocene, Vir Joseph Naidu
Masters Theses
Embodied human communication within the Anthropocene. Existing at the intersection of technology, and the body.
The design industry has developed technology that is, paradoxically, isolating. The exposure to a vast audience in the digital sphere has introduced new societal pressures, leading to a disconnection from our immediate surroundings, detached, and donning metaphorical masks. Technocene lives on the fringes of the discipline by blending conceptual thinking with practical application. Through curious, experimental artifacts, it prompts us to shed our masks and embrace vulnerability. Technocene endeavors to reimagine the human experience by acting as a discursive design project. It probes the boundaries …
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Journal of Demography
This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …
Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi
Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi
Electronic Thesis and Dissertation Repository
Renewed interest in Solar System exploration, along with ongoing improvements in computing, robotics and instrumentation technologies, have reinforced the case for remote science acquisition systems development in space exploration. Testing systems and procedures that allow for autonomously collected science has been the focus of analogue field deployments and mission planning for some time, with such systems becoming more relevant as missions increase in complexity and ambition. The introduction of lidar and laser scanning-type instruments into the geological and planetary sciences has proven popular, and, just as with the established image and photogrammetric methods, has found widespread use in several research …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Simulating Information And Communication Applications In Employee Interaction Network Models, Matthew Kanter
Simulating Information And Communication Applications In Employee Interaction Network Models, Matthew Kanter
Student Research Submissions
Information and communication technology (ICT) use has been identified throughout its development and evolution with the Internet boom as a net positive tool for most employees and organizations in the working world. Only recently have studies regarding employees’ well-being begun to come to the forefront of research regarding these rapidly evolving technologies, however these are important issues to discuss in the context of work-life boundary management, emotional exhaustion, overwhelming stress levels, and moral disengagement among other employee well-being dimensions. To explore how employees’ well being might be influenced by ICT use, this study conducted a quantitative survey and analyzed a …
Rgb Root Matriz Color Dance, Danielle E. Gauthier
Rgb Root Matriz Color Dance, Danielle E. Gauthier
Theses and Dissertations
RGB Root Matriz Color Dance (Color Dance) is an immersive, interactive experience that combines poetic phrases and color filters to create a womb-like environment. Designed by Danielle Gauthier, this artistic piece uses a webcam to respond to users’ movements in real time, allowing them to confront and express their emotions through metaphor and dance. Color Dance creates a unique platform for self-discovery and empowerment by fostering a connection between the body and discomforting emotions.
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman
Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research
Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …
Ai-Powered Information Retrieval In Meeting Records And Transcripts Enhancing Efficiency And User Experience, Srushti Nitin Ghadge
Ai-Powered Information Retrieval In Meeting Records And Transcripts Enhancing Efficiency And User Experience, Srushti Nitin Ghadge
Theses and Dissertations
This study compares the traditional search methods, which is to search from video recordings of the meetings by moving the slider back and forth or by keyword search in transcripts versus integrated AI video plus transcript search. Based on the previous test results, we introduced some human-centric design features to the AI and built a new enhanced AI search tool for information retrieval. For search technique efficiency testing, the method had two set of experiments. The first results of the experiment showed that AI-based search algorithms were more accurate and faster than conventional search approaches. Participants were also happier with …
Estimating Effects Of Tourism Using Multiple Data Sources: The Miranda Tool As Part Of A Spatial Decision Support System For Sustainable Destination Development, Tobias Heldt
GSTC Academic Symposium - In conjunction with the GSTC Global Conference Sweden April 23, 2024
Planning for sustainable mobility and destination development in rural areas is increasingly important when tourism grows in numbers. A key to address the challenge of transformation and adaptation of local communities to mitigate adverse effects in seasonal peak hours like traffic congestion, power failure, waste management and sewage flooding, is to properly estimate the number of visitors to a destination.
The problem of estimating tourism numbers is a known challenge since, for example, guest nights statistics are in-complete and non-commercial lodging (sharing solutions) are increasing. Recently, the promising utilization of mobile phone data has emerged as a means to estimate …
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Human-Machine Communication
As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
First-Year Engineering Students And Genai: Experience, Attitudes, Trust, And Ethics., Elisabeth Thomas, Cenetria Crockett, Campbell Rightmyer Bego
Undergraduate Research Events
Generative AI (GenAI) has the potential to benefit student learning by offering personalized feedback, idea generation, research, and analysis support, writing aid, and administrative support (Chan and Hu, 2023; Zhang, 2023). However, if used inappropriately, the same tools can lead to false/biased content creation and reduced ethical awareness leading to possible academic dishonesty and privacy issues (Schwartz, 2016; Wu, 2023). At this early stage, ethical standards and professorial guidance are unavailable, so it is important to understand what students are thinking about the recent technologies (Shen et al., 2013). Spring 2023 survey results revealed that some students used ChatGPT, a …