Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 33

Full-Text Articles in Other Computer Engineering

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


Human-Machine Communication: Complete Volume. Volume 6 Jul 2023

Human-Machine Communication: Complete Volume. Volume 6

Human-Machine Communication

This is the complete volume of HMC Volume 6.


Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz Jul 2023

Chatgpt, Lamda, And The Hype Around Communicative Ai: The Automation Of Communication As A Field Of Research In Media And Communication Studies, Andreas Hepp, Wiebke Loosen, Stephan Dreyer, Juliane Jarke, Sigrid Kannengießer, Christian Katzenbach, Rainer Malaka, Michaela Pfadenhauer, Cornelius Puschmann, Wolfgang Schulz

Human-Machine Communication

The aim of this article is to more precisely define the field of research on the automation of communication, which is still only vaguely discernible. The central thesis argues that to be able to fully grasp the transformation of the media environment associated with the automation of communication, our view must be broadened from a preoccupation with direct interactions between humans and machines to societal communication. This more widely targeted question asks how the dynamics of societal communication change when communicative artificial intelligence—in short: communicative AI—is integrated into aspects of societal communication. To this end, we recommend an approach that …


Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt Jul 2023

Disentangling Two Fundamental Paradigms In Human-Machine Communication Research: Media Equation And Media Evocation, Margot J. Van Der Goot, Katrin Etzrodt

Human-Machine Communication

In this theoretical paper, we delineate two fundamental paradigms in how scholars conceptualize the nature of machines in human-machine communication (HMC). In addition to the well-known Media Equation paradigm, we distinguish the Media Evocation paradigm. The Media Equation paradigm entails that people respond to machines as if they are humans, whereas the Media Evocation paradigm conceptualizes machines as objects that can evoke reflections about ontological categories. For each paradigm, we present the main propositions, research methodologies, and current challenges. We conclude with theoretical implications on how to integrate the two paradigms, and with a call for mixed-method research that includes …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel Dec 2022

The Evolution Of Gendered Software: Products, Scientific Reasoning, Criticism, And Tools, Victoria A. E. Kratel

Human-Machine Communication

Over the past 7 decades, gendered software has become globally established. In this theoretical distribution, I outline the evolution of gendered software. The journey of gendered software started with the raw idea fueled by Alan Turing’s imitation game in the 1950s. And only shortly thereafter, in the 1960s and 1970s, the first gendered software products like Joseph Weizenbaum’s ELIZA were developed. Thus, academia took its time to not only explore technological aspects, but to further investigate the matter of gender in the 1990s CASA-paradigm (Nass et al., 1994) and Media Equation (Reeves & Nass, 1996). As these theories reasoned the …


Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca Dec 2022

Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca

Human-Machine Communication

Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn May 2022

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Vr Sound Mapping: Make Sound Accessible For Dhh People In Virtual Reality Environments, Ziming Li, Roshan Peiris Apr 2022

Vr Sound Mapping: Make Sound Accessible For Dhh People In Virtual Reality Environments, Ziming Li, Roshan Peiris

Frameless

In-game audio plays an important role in enhancing the sense of reality and immersion in the gaming experience. In many games, sounds are also used to provide notifications and clues which are essential to the gameplay. However, in this case, the DHH (deaf and hard of hearing) players may fail to access the information conveyed by sounds, which degrades their gaming experience (Jain et al. 2021).


Human-Machine Communication Scholarship Trends: An Examination Of Research From 2011 To 2021 In Communication Journals, Riley J. Richards, Patric R. Spence, Chad Edwards Apr 2022

Human-Machine Communication Scholarship Trends: An Examination Of Research From 2011 To 2021 In Communication Journals, Riley J. Richards, Patric R. Spence, Chad Edwards

Human-Machine Communication

Despite a relatively short history, the modern-day study of communication has grown into multiple subfields. To better understand the relationship between Human-Machine Communication (HMC) research and traditional communication science, this study examines the published scholarship in 28 communication-specific journals from 2011–2021 focused on human-machine communication (HMC). Findings suggest limited prior emphasis of HMC research within the 28 reviewed journals; however, more recent trends show a promising future for HMC scholarship. Additionally, HMC appears to be diverse in the specific context areas of research in the communication context. Finally, we offer future directions of research and suggestions for the development of …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


Incorporating Virtual Reality Training In An Introductory Public Speaking Course, Kevin Kryston, Henry Goble, Allison Eden Sep 2021

Incorporating Virtual Reality Training In An Introductory Public Speaking Course, Kevin Kryston, Henry Goble, Allison Eden

Journal of Communication Pedagogy

This study presents the results of two studies using a virtual reality (VR) public-speaking training simulation as an instructional aid in a basic communication course. Results from the first study suggest that VR practice was associated with higher subsequent speech delivery grades in the course compared to no practice. However, VR practice did not reduce public speaking anxiety (PSA). In a follow-up study, VR practice was compared with other forms of lab-based practice including in front of a mirror and a recorded video session. All forms of lab practice (VR, mirror, or video) were associated with higher speech grades than …


A New Era Of Education: Incorporating Machine Teachers Into Education, Jihyun Kim Sep 2021

A New Era Of Education: Incorporating Machine Teachers Into Education, Jihyun Kim

Journal of Communication Pedagogy

This editorial briefly discusses the potential of machine agents in education that can assist in creating more positive and meaningful teaching and learning environments. Then, it introduces three articles, two empirical research studies and one research-based instructional activity, compromising a special section on “Machine Teachers in Education” of Journal of Communication Pedagogy. Collectively, these articles help us better understand the role of machines in education and facilitate intellectual dialogues.


Human-Machine Communication: Complete Volume. Volume 3. Diffusion Of Human-Machine Communication During And After The Covid-19 Pandemic Sep 2021

Human-Machine Communication: Complete Volume. Volume 3. Diffusion Of Human-Machine Communication During And After The Covid-19 Pandemic

Human-Machine Communication

This is the complete volume of HMC Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemic


What Will Affect The Diffusion Of Ai Agents?, James W. Dearing Sep 2021

What Will Affect The Diffusion Of Ai Agents?, James W. Dearing

Human-Machine Communication

For billions of people, the threat of the Novel Coronavirus SARS-CoV-2 and its variants has precipitated the adoption of new behaviors. Pandemics are radical events that disrupt the gradual course of societal change, offering the possibility that some rapidly adopted innovations will persist in use past the time period of the event and, thus, diffuse more rapidly than in the absence of such an event. Human-machine communication includes a range of technologies with which many of us have quickly become more familiar due to stay-athome orders, distancing, workplace closures, remote instruction, home-bound entertainment, fear of contracting COVID-19, and boredom. In …


The Role Of Vidura Chatbot In The Diffusion Of Knowcovid-19 Gateway, Kerk F. Kee, Prasad P. Calyam, Hariharan Regunath Sep 2021

The Role Of Vidura Chatbot In The Diffusion Of Knowcovid-19 Gateway, Kerk F. Kee, Prasad P. Calyam, Hariharan Regunath

Human-Machine Communication

The COVID-19 pandemic is an unprecedented global emergency. Clinicians and medical researchers are suddenly thrown into a situation where they need to keep up with the latest and best evidence for decision-making at work in order to save lives and develop solutions for COVID-19 treatments and preventions. However, a challenge is the overwhelming numbers of online publications with a wide range of quality. We explain a science gateway platform designed to help users to filter the overwhelming amount of literature efficiently (with speed) and effectively (with quality), to find answers to their scientific questions. It is equipped with a chatbot …


Communicative Development And Diffusion Of Humanoid Ai Robots For The Post-Pandemic Health Care System, Do Kyun David Kim, Gary Kreps, Rukhsana Ahmed Sep 2021

Communicative Development And Diffusion Of Humanoid Ai Robots For The Post-Pandemic Health Care System, Do Kyun David Kim, Gary Kreps, Rukhsana Ahmed

Human-Machine Communication

As humanoid robot technology, anthropomorphized by artificial intelligence (AI), has rapidly advanced to introduce more human-resembling automated robots that can communicate, interact, and work like humans, we have begun to expect active interactions with Humanoid AI Robots (HAIRs) in the near future. Coupled with the HAIR technology development, the COVID-19 pandemic triggered our interest in using health care robots with many substantial advantages that overcome critical human vulnerabilities against the strong infectious COVID-19 virus. Recognizing the tremendous potential for the active application of HAIRs, this article explores feasible ways to implement HAIRs in health care and patient services and suggests …


Projection-Based Ar For Hearing Parent-Deaf Child Communication, Victor N. Antony, Adira Blumenthal, Ziyue Qiu, Ashely Tenesaca, Wanyin Hu, Zhen Bai Jul 2021

Projection-Based Ar For Hearing Parent-Deaf Child Communication, Victor N. Antony, Adira Blumenthal, Ziyue Qiu, Ashely Tenesaca, Wanyin Hu, Zhen Bai

Frameless

Deaf infants born to hearing parents are at risk of language deprivation due to lack of sign language fluency and subpar parent-child communication. We present a projection-based Augmented Reality (AR) prototype designed to improve parent-child communication and American Sign Language (ASL) acquisition. Our system aims to non-intrusively augment play episodes by projecting just-in-time and context-aware ASL equivalents extracted from nursery rhymes being sung by parents. This paper presents the initial implementation of the prototype .


Designing Blended Experiences: Laugh Traders Design Fiction, Brian J. Okeefe Jul 2021

Designing Blended Experiences: Laugh Traders Design Fiction, Brian J. Okeefe

Frameless

The increasing ubiquity of interactions that involve complementary digital content, physical objects, and spaces, brings about new challenges for designers. There is a need to embed designs in legacy systems, whether those are existing physical structures or existing digital platforms. Traditional approaches to product design, interaction design, and user experience design often do not take this new context into account. Many systems do not consider how designers produce new digital and physical experiences that work harmoniously, while supporting new interactions and relationships with people (Imaz and Benyon 2007; Jetter, Geyer, Schwarz & Reiterer 2012). To address this, we propose the …


Human-Machine Communication: Complete Volume. Volume 2 Apr 2021

Human-Machine Communication: Complete Volume. Volume 2

Human-Machine Communication

This is the complete volume of HMC Volume 2.


Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh Jan 2021

Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh

Journal of Aviation/Aerospace Education & Research

Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …


Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier Oct 2019

Cyber Metaphors And Cyber Goals: Lessons From “Flatland”, Pierre Trepagnier

Military Cyber Affairs

Reasoning about complex and abstract ideas is greatly influenced by the choice of metaphors through which they are represented. In this paper we consider the framing effect in military doctrine of considering cyberspace as a domain of action, parallel to the traditional domains of land, sea, air, and space. By means of the well-known Victorian science-fiction novella Flatland, we offer a critique of this dominant cyber metaphor. In Flatland, the problems of lower-dimensional beings comprehending additional dimensions are explored at some length. Inspired by Flatland, our suggested alternate metaphor for cyber is an additional (fourth) dimension. We …


Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels Jan 2019

Finding Truth In Fake News: Reverse Plagiarism And Other Models Of Classification, Matthew Przybyla, David Tran, Amber Whelpley, Daniel W. Engels

SMU Data Science Review

As the digital age creates new ways of spreading news, fake stories are propagated to widen audiences. A majority of people obtain both fake and truthful news without knowing which is which. There is not currently a reliable and efficient method to identify “fake news”. Several ways of detecting fake news have been produced, but the various algorithms have low accuracy of detection and the definition of what makes a news item ‘fake’ remains unclear. In this paper, we propose a new method of detecting on of fake news through comparison to other news items on the same topic, as …


Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro Jan 2018

Employing A User-Centered Design Process For Cybersecurity Awareness In The Power Grid, Jean C. Scholtz, Lyndsey Franklin, Aditya Ashok, Katya Leblanc, Christopher Bonebrake, Eric Andersen, Michael Cassiadoro

Journal of Human Performance in Extreme Environments

In this paper, we discuss the process we are using in the design and implementation of a tool to improve the situation awareness of cyberattacks in the power grid. We provide details of the steps we have taken to date and describe the steps that still need to be accomplished. The focus of this work is to provide situation awareness of the power grid to staff from different, non-overlapping roles in an electrical transmission organization in order to facilitate an understanding of a possible occurrence of a cyberattack. Our approach follows a user-centered design process and includes determining the types …


Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu Oct 2016

Content Mining Techniques For Detecting Cyberbullying In Social Media, Shawniece L. Parker, Yen-Hung Hu

Virginia Journal of Science

The use of social media has become an increasingly popular trend, and it is most favorite amongst teenagers. A major problem concerning teens using social media is that they are often unaware of the dangers involved when using these media. Also, teenagers are more inclined to misuse social media because they are often unaware of the privacy rights associated with the use of that particular media, or the rights of the other users. As a result, cyberbullying cases have a steady rise in recent years and have gone undiscovered, or are not discovered until serious harm has been caused to …