Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Science and Technology Studies

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 36

Full-Text Articles in Computer Engineering

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus Apr 2023

Para Cima Y Pa’ Abajo: Building Bridges Between Hci Research In Latin America And In The Global North, Pedro Reynolds-Cuéllar, Marisol Wong-Villacres, Karla A. Badillo-Urquiola, Mayra Donaji Barrera-Machuca, Franceli L. Cibrian, Marianela Ciolfi Felice, Carolina Fuentes, Laura Sanely Gaytán-Lugo, Vivian Genaro Motti, Monica Perusquía-Hernández, Oscar A. Lemus

Engineering Faculty Articles and Research

The Human-computer Interaction (HCI) community has the opportunity to foster the integration of research practices across the Global South and North to begin overcoming colonial relationships. In this paper, we focus on the case of Latin America (LATAM), where initiatives to increase the representation of HCI practitioners lack a consolidated understanding of the practices they employ, the factors that influence them, and the challenges that practitioners face. To address this knowledge gap, we employ a mixed-methods approach, comprising a survey (66 respondents) and in-depth interviews (19 interviewees). Our analyses characterize a set of research perspectives on how HCI is practiced …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha Oct 2020

A Bibliometric Analysis Of Online Extremism Detection, Mayur Gaikwad, Swati Ahirrao, Shraddha Pankaj Phansalkar, Ketan Kotecha

Library Philosophy and Practice (e-journal)

The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations actively radicalize and recruit youths by sharing inciting material on social media. Extremist organizations use social media to influence people to carry out lone-wolf attacks. Social media platforms employ various strategies to identify and remove the extremist content. But due to the sheer amount of data and …


Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth Aug 2020

Cyber Social Threats 2020 Workshop Meta-Report: Covid-19, Challenges, Methodological And Ethical Considerations, Ugur Kursuncu, Yelena Mejova, Jeremy Blackburn, Amit Sheth

Publications

Online platforms have been increasingly misused by ill-intentioned actors, affecting our society, often leading to real-world events of social significance. On the other hand, recog-nizing the narratives related to harmful behaviors is challeng-ing due to its complex and sensitive nature. The Cyber SocialThreats Workshop 2020 aimed to stimulate research for thechallenges on methodological and ethical considerations indeveloping novel approaches to analyze online harmful con-versations, concerning social, cultural, emotional, commu-nicative, and linguistic aspects. It provided a forum to bringtogether researchers and practitioners from both academiaand industry in the areas of computational social sciences, so-cial network analysis and mining, natural language process-ing, …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin Jun 2020

Curriculum Development For Robotics Technology Program, Sanjeevi Chitikeshi, Shirshak K. Dhali, Betsey Odell, Vukica Jovanovic, Cheng Y. Lin

Engineering Technology Faculty Publications

With a growing need for a more skilled workforce, providing industry-driven and employment centric training services is an important national priority. Over 3.4 million manufacturing jobs will need to be filled across the United Sates over the next decade. The skills gap is becoming greater based on the statistics provided by the Global Robotics Technology Market: Forecast, 2014-2020 published by Research and Markets, reporting that the worldwide robotics market is forecast to grow from the 2015 level of $26.98B to $82.78B in 2020. This 11 % compounded average growth in the next five years is unprecedented. Given the anticipated growth …


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum Apr 2019

The Pedagogy Of Design And Technology At Xavier University Of Louisiana, New Orleans, Shayna Tova Blum

Faculty and Staff Publications

Abstract. Xavier University of Louisiana (XULA) is a Science, Technology, Engineering, and Mathematics (STEM) university located in New Orleans, Louisiana. As a Historically Black University (HBCU), the university serves a diverse community of students in which many are first-generation, college graduates. Students enrolled in Design courses at XULA are studying in Bachelor of Science and Bachelor of Art programs and majoring in subjects such as Computer Science, Physics, Mass Communication, Art, Business, and Science. The interdisciplinary student environment offers a unique opportunity for collaboration and peer learning, whereby students are able to share diverse perspectives on a topic by relating …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell Apr 2017

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Information Technology Services: Publications

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students would be …


Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen May 2016

Influence Of Personality On Emotional Contagion Through Social Media, Theodore T. Jensen

Honors Scholar Theses

The rapid growth of computers and computing technologies in the recent past has led to dramatic changes in modern social interactions. Connectivity through the internet and social networking sites is a massive part of people's lives, with younger generations learning to interact more and more through these means. It is necessary to recognize the emotional influence of these forms of communication- their influence on mental health will grow as they become a larger part of the social fabric. Facebook and other social media have been shown to be a form of emotional contagion; emotional states can be transferred from one …


Design, Programming, And User-Experience, Kaila G. Manca May 2015

Design, Programming, And User-Experience, Kaila G. Manca

Honors Scholar Theses

This thesis is a culmination of my individualized major in Human-Computer Interaction. As such, it showcases my knowledge of design, computer engineering, user-experience research, and puts into practice my background in psychology, com- munications, and neuroscience.

I provided full-service design and development for a web application to be used by the Digital Media and Design Department and their students.This process involved several iterations of user-experience research, testing, concepting, branding and strategy, ideation, and design. It lead to two products.

The first product is full-scale development and optimization of the web appli- cation.The web application adheres to best practices. It was …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


The Taxation Of Cloud Computing And Digital Content, David Shakow Jul 2013

The Taxation Of Cloud Computing And Digital Content, David Shakow

All Faculty Scholarship

“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.

My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …


Applying Mobile Application Development To Help Dementia And Alzheimer Patients, Jean F. Coppola Phd, Marc A. Kowtko, Christina Yamagata, Shannon Joyce Jan 2013

Applying Mobile Application Development To Help Dementia And Alzheimer Patients, Jean F. Coppola Phd, Marc A. Kowtko, Christina Yamagata, Shannon Joyce

Wilson Center for Social Entrepreneurship

Caregiver anecdotes attest that music and photographs play an important role for family members diagnosed with Alzheimer’s disease (AD), even those with severe AD. Tablets and iPads, which are prevalent, can be utilized with dementia patients in portraying favorite music and family photographs via apps developed in close partnership with geriatric facilities. This study addresses cognitive functioning and quality of life for people diagnosed with dementia via technology. Research has shown that technology instruments such as iPods, help stimulate those with dementia. This study focuses on innovative devices such as iPads and tablets, which are mainstream and easy to use, …


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson May 2011

News Media Environment, Selective Perception, And The Survival Of Preference Diversity Within Communication Networks, Frank C.S. Liu, Paul E. Johnson

JITP 2011: The Future of Computational Social Science

There is a natural tension between the effects on public opinion of social networks and the news media. It is widely believed that social networks tend to harmonize opinions within them, but the presence of media may accentuate diversity by inserting discordant messages. On the other hand, in a totalitarian state where the government controls the media, social networks may mitigate the homogenizing pressure of a regime’s propaganda. The tendency of opinion to follow the “official line” may be mitigated because opponents of the government interact on a personal level and bolster one another’s views. This paper employs agent-based modeling—an …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File Jan 2011

Infoextractor – A Tool For Social Media Data Mining, Chirag Shah, Charles File

JITP 2011: The Future of Computational Social Science

We present InfoExtractor, a web-based tool for collecting data and metadata from focused social media content. InfoExtractor then provides this data in various structured and unstructured formats for easy manipulation and analysis. The tool allows social science researchers to easily collect data for quantitative analysis, and is designed to deliver data from popular and influential social media sites in a useful and easy to access way. InfoExtractor was designed to replace traditional means of content aggregation, such as page scraping and brute- force copying.


Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr Jan 2011

Researching Real-World Web Use With Roxy, A Research Proxy, Ericka Menchen-Trevino, Chris Karr

JITP 2011: The Future of Computational Social Science

Outside of a lab environment, it has been difficult for researchers to collect both behavioral and self-reported Web-use data from the same participants. To address this challenge we created Roxy, open source software that collects real-world Web-use data with participants’ informed consent. Roxy gathers Web log data as well as the text and HTML code of each page visited by participants. We describe Roxy’s data gathering capabilities and search functions and then illustrate how we used the software in a multi-method study. The use case examines selective exposure to political communication during the November 2010 U.S. general election campaign.


Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson Jan 2011

Tradeoffs In Accuracy And Efficiency In Supervised Learning Methods, Loren Collingwood, John Wilkerson

JITP 2011: The Future of Computational Social Science

Text is becoming a central source of data for social science research. With advances in digitization and open records practices, the central challenge has in large part shifted away from availability to usability. Automated text classification methodologies are becoming increasingly important within political science because they hold the promise of substantially reducing the costs of converting text to data for a variety of tasks. In this paper, we consider a number of questions of interest to prospective users of supervised learning methods, which are appropriate to classification tasks where known categories are applied. For the right task, supervised learning methods …


Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning Jan 2011

Facilitating Encounters With Political Difference: Engaging Voters With The Living Voters Guide, Deen G. Freelon, Travis Kriplean, John Morgan, W. Lance Bennett, Alan Borning

JITP 2011: The Future of Computational Social Science

Unlike 20th-century mass media, the Internet requires self-selection of content by its very nature. This has raised the normative concern that users may opt to encounter only political information and perspectives that accord with their preexisting views. This study examines the different ways that voters appropriated a new, purpose-built online engagement platform to engage with a wide variety of political opinions and arguments. In a deployment aimed at helping Washington state citizens make their 2010 election decisions, we find that users take significant advantage of three key opportunities to engage with political diversity: reading, acknowledging, and writing arguments on both …


Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia Jan 2011

Politics 2.0 With Facebook – Collecting And Analyzing Public Comments On Facebook For Studying Political Discourses, Chirag Shah, Tayebeh Yazdani Nia

JITP 2011: The Future of Computational Social Science

Analyzing publicly available content on various social media sites such as YouTube and Twitter, as well as social network sites such as Facebook, has become an increasingly popular method for studying socio-political issues. Such public-contributed content, primarily available as comments, let people express their opinions and sentiments on a given topic, news-story, or post, while allowing social and political scientists to extend their analysis of a political discourse to social sphere. We recognize the importance of Facebook in such analysis and present several approaches and observations of collecting and analyzing public comments from it. In particular, we demonstrate what it …


An Automated Snowball Census Of The Political Web, Abe Gong Jan 2011

An Automated Snowball Census Of The Political Web, Abe Gong

JITP 2011: The Future of Computational Social Science

This paper solves a persistent methodological problem for social scientists studying the political web: representative sampling. Virtu- ally all existing studies of the political web are based on incomplete samples, and therefore lack generalizability. In this paper, I combine methods from computer science and sampling theory to conduct an automated snowball census of the political web and constructs an all- but-complete index of English political websites. I check the robust- ness of this index, use it to generate descriptive statistics for the entire political web, and demonstrate that studies based on ad hoc sampling strategies are likely to be biased …


Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen Jan 2011

Obtaining Speech Assets For Judgement Analysis On Low-Pass Filtered Emotional Speech, John Snel, Charlie Cullen

Conference papers

Investigating the emotional content in speech from acoustic characteristics requires separating the semantic con- tent from the acoustic channel. For natural emotional speech, a widely used method to separate the two channels is the use of cue masking. Our objective is to investigate the use of cue masking in non-acted emotional speech by analyzing the extent to which filtering impacts the perception of emotional content of the modified speech material. However, obtaining a corpus of emotional speech can be quite difficult whereby verifying the emotional content is an issue thoroughly discussed. Currently, speech research is showing a tendency toward constructing …


Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …