Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
From Ai With Love: Reading Big Data Poetry Through Gilbert Simondon’S Theory Of Transduction, Andrew Klobucar
From Ai With Love: Reading Big Data Poetry Through Gilbert Simondon’S Theory Of Transduction, Andrew Klobucar
Electronic Literature Organization Conference 2020
Computation initiated a far-reaching re-imagination of language, not just as an information tool, but as a social, bio-physical activity in general. Modern lexicology provides an important overview of the ongoing development of textual documentation and its applications in relation to language and linguistics. At the same time, the evolution of lexical tools from the first dictionaries and graphs to algorithmically generated scatter plots of live online interaction patterns has been surprisingly swift. Modern communication and information studies from Norbert Weiner to the present-day support direct parallels between coding and linguistic systems. However, most theories of computation as a model of …
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Human Behavior Is A Significant Flaw In Maintaining Cyber Security, Elizabeth Jackson
Cybersecurity Undergraduate Research Showcase
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data …
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
International Crisis and Risk Communication Conference
Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …
Accessibility Of Deepfakes, Andrew L. Collings
Accessibility Of Deepfakes, Andrew L. Collings
Cybersecurity Undergraduate Research Showcase
The danger posed by falsified media, commonly referred to as deepfakes, has been well researched and documented. The software Faceswap to was used to swap the faces of two politician (Joe Biden and Donald Trump). The testing was performed using an affordable consumer GPU (an AMD Radeon RX 570) over 100,000 iterations. The process and results for the two attempts with the best results (and largest differences) were recorded. The result was ultimately unconvincing, while the software was able to recreate the facial structure the lighting and skin tone did not blend at all.