Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (13)
- Social and Behavioral Sciences (4)
- Business (3)
- Databases and Information Systems (3)
- Communication (2)
-
- Community-Based Research (2)
- Computer Engineering (2)
- Digital Communications and Networking (2)
- Engineering (2)
- Sociology (2)
- Arts and Humanities (1)
- Asian Studies (1)
- Chemistry (1)
- Communication Technology and New Media (1)
- Education (1)
- Educational Assessment, Evaluation, and Research (1)
- Environmental Sciences (1)
- International and Area Studies (1)
- Management Information Systems (1)
- Mathematics (1)
- Medicine and Health Sciences (1)
- Numerical Analysis and Scientific Computing (1)
- Political Science (1)
- Institution
- Publication Year
- Publication
- Publication Type
- File Type
Articles 1 - 16 of 16
Full-Text Articles in Physical Sciences and Mathematics
Improving Rumor Detection By Promoting Information Campaigns With Transformer-Based Generative Adversarial Learning, Jing Ma, Jun Li, Wei Gao, Yang Yang, Kam-Fai Wong
Improving Rumor Detection By Promoting Information Campaigns With Transformer-Based Generative Adversarial Learning, Jing Ma, Jun Li, Wei Gao, Yang Yang, Kam-Fai Wong
Research Collection School Of Computing and Information Systems
Rumors can cause devastating consequences to individuals and our society. Analysis shows that the widespread of rumors typically results from deliberate promotion of information aiming to shape the collective public opinions on the concerned event. In this paper, we combat such chaotic phenomenon with a countermeasure by mirroring against how such chaos is created to make rumor detection more robust and effective. Our idea is inspired by adversarial learning method originated from Generative Adversarial Networks (GAN). We propose a GAN-style approach, where a generator is designed to produce uncertain or conflicting voices, further polarizing the original conversational threads to boost …
Of Stances, Themes, And Anomalies In Covid-19 Mask-Wearing Tweets, Jwen Fai Low, Benjamin C.M. Fung, Farkhund Iqbal, Ebrahim Bagheri
Of Stances, Themes, And Anomalies In Covid-19 Mask-Wearing Tweets, Jwen Fai Low, Benjamin C.M. Fung, Farkhund Iqbal, Ebrahim Bagheri
All Works
COVID-19 is an opportunity to study public acceptance of a ‘‘new’’ healthcare intervention, universal masking, which unlike vaccination, is mostly alien to the Anglosphere public despite being practiced in ages past. Using a collection of over two million tweets, we studied the ways in which proponents and opponents of masking vied for influence as well as the themes driving the discourse. Pro-mask tweets encouraging others to mask up dominated Twitter early in the pandemic though its continued dominance has been eroded by anti-mask tweets criticizing others for their masking behavior. Engagement, represented by the counts of likes, retweets, and replies, …
Spade: Multi-Stage Spam Account Detection For Online Social Networks, Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das
Spade: Multi-Stage Spam Account Detection For Online Social Networks, Federico Concone, Giuseppe Lo Re, Marco Morana, Sajal K. Das
Computer Science Faculty Research & Creative Works
In recent years, Online Social Networks (OSNs) have radically changed the way people communicate. The most widely used platforms, such as Facebook, Youtube, and Instagram, claim more than one billion monthly active users each. Beyond these, news-oriented micro-blogging services, e.g., Twitter, are daily accessed by more than 120 million users sharing contents from all over the world. Unfortunately, legitimate users of the OSNs are mixed with malicious ones, which are interested in spreading unwanted, misleading, harmful, or discriminatory content. Spam detection in OSNs is generally approached by considering the characteristics of the account under analysis, its connection with the rest …
Tweet-To-Act: Towards Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed
Tweet-To-Act: Towards Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed
All Works
The widespread popularity of social networking is leading to the adoption of Twitter as an information dissemination tool. Existing research has shown that information dissemination over Twitter has a much broader reach than traditional media and can be used for effective post-incident measures. People use informal language on Twitter, including acronyms, misspelled words, synonyms, transliteration, and ambiguous terms. This makes incident-related information extraction a non-trivial task. However, this information can be valuable for public safety organizations that need to respond in an emergency. This paper proposes an early event-related information extraction and reporting framework that monitors Twitter streams, synthesizes event-specific …
Toward Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed
Toward Tweet-Mining Framework For Extracting Terrorist Attack-Related Information And Reporting, Farkhund Iqbal, Rabia Batool, Benjamin C. M. Fung, Saiqa Aleem, Ahmed Abbasi, Abdul Rehman Javed
All Works
The widespread popularity of social networking is leading to the adoption of Twitter as an information dissemination tool. Existing research has shown that information dissemination over Twitter has a much broader reach than traditional media and can be used for effective post-incident measures. People use informal language on Twitter, including acronyms, misspelled words, synonyms, transliteration, and ambiguous terms. This makes incident-related information extraction a non-trivial task. However, this information can be valuable for public safety organizations that need to respond in an emergency. This paper proposes an early event-related information extraction and reporting framework that monitors Twitter streams synthesizes event-specific …
A Survey Of The Math Blogosphere, Katherine Thompson
A Survey Of The Math Blogosphere, Katherine Thompson
Journal of Humanistic Mathematics
This article provides an overview of different types of mathematical blogs currently available. There are over twenty blogs highlighted, ranging from the technical to the recreational, from those sponsored by national mathematical organizations to those run by individuals--including students.
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Reza Vaezi
The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …
Using Web 2.0 Technologies For Collaborative Learning In Distance Education- Case Studies From An Australian University, Kristin Den Exter, Stephen Rowe, William Boyd, David Lloyd
Using Web 2.0 Technologies For Collaborative Learning In Distance Education- Case Studies From An Australian University, Kristin Den Exter, Stephen Rowe, William Boyd, David Lloyd
Dr Kristin den Exter
This paper explores the use of Web 2.0 technologies for collaborative learning in a higher education context. A review of the literature exploring the strengths and weaknesses of Web 2.0 technology is presented, and a conceptual model of a Web 2.0 community of inquiry is introduced. Two Australian case studies are described, with an ex-poste evaluation of the use of Web 2.0 tools. Conclusions are drawn as to the potential for the use of Web 2.0 tools for collaborative e-learning in higher education. In particular, design and integration of Web 2.0 tools should be closely related to curriculum intent and …
Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang
Tweets And Votes: A Study Of The 2011 Singapore General Election, Marko M. Skoric, Nathaniel D. Poor, Palakorn Achananuparp, Ee Peng Lim, Jing Jiang
Research Collection School Of Computing and Information Systems
This study focuses on the uses of Twitter during the elections, examining whether the messages posted online are reflective of the climate of public opinion. Using Twitter data obtained during the official campaign period of the 2011 Singapore General Election, we test the predictive power of tweets in forecasting the election results. In line with some previous studies, we find that during the elections the Twitter sphere represents a rich source of data for gauging public opinion and that the frequency of tweets mentioning names of political parties, political candidates and contested constituencies could be used to make predictions about …
At Issue, Bill Feireisen, George K. Thiruvathukal
At Issue, Bill Feireisen, George K. Thiruvathukal
George K. Thiruvathukal
In this installment of At Issue, two of CiSE's editorial board members describe the magazine's current and future Web presence. We start with Bill Feiereisen's discussion of science on the Web and what it could mean for CiSE ("Are We There Yet?") and end with George Thiruvathukal's discussion of the challenges therein ("If We Build It, Will They Come?"). CiSE's official homepage is www.computer.org/cise; we gladly welcome comments with suggestions or feedback. You can contact lead editor (Jenny Stout; jstout@computer.org) or write to either Bill or George (their email addresses appear at the end of their respective essays).
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Understanding The Influence Of Blog On The Development Of Social Capital, Reza Vaezi, Gholamreza Torkzadeh, Jerry Cha-Jan Chang
Management, Entrepreneurship and Technology Faculty Publications
The rapid use and application of blogs in diverse areas such as education, marketing, journalism, and human resource management in recent years underlines the need for a better understanding of the impact of this new technology on social capital. Social capital reflects the norm of reciprocity and the level of trust among individuals who connect, interact, and benefit from one another. Blog is expected to influence the extent and the scope of this interaction by providing new means of networking among people. This paper examines the relationship between blog use and social capital and reports on the results of an …
Enhancing The Learning Experience: Learning For The Unknown Future, Barry Ryan
Enhancing The Learning Experience: Learning For The Unknown Future, Barry Ryan
Conference papers
In this presentation the effects of an altered teaching methodology, in which the "student as producer" approach was adopted, are outlined. Currently, many students exist as knowledge consumers; however, Neary and Winn (2009) have suggested the positive effect on students learning through the inclusion of research-like activities at the core of the undergraduate curriculum; the students act as "producers" of knowledge.
Towards The Integration Of Social Media With Traditional Information Systems, Michael J. Rees, Peta J. Hopkins
Towards The Integration Of Social Media With Traditional Information Systems, Michael J. Rees, Peta J. Hopkins
Michael J Rees
This paper was inspired by the authors’ personal experience of using social media systems over the last two years. During that time both authors have used a range of public, private and hosted social media systems for their professional activities and well as for personal use. They and other colleagues are convinced that a unified approach to social media systems can benefit the communications processes within our institution and our interaction with our important existing and potential clients, the students and alumni.
At Issue, Bill Feireisen, George K. Thiruvathukal
At Issue, Bill Feireisen, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
In this installment of At Issue, two of CiSE's editorial board members describe the magazine's current and future Web presence. We start with Bill Feiereisen's discussion of science on the Web and what it could mean for CiSE ("Are We There Yet?") and end with George Thiruvathukal's discussion of the challenges therein ("If We Build It, Will They Come?"). CiSE's official homepage is www.computer.org/cise; we gladly welcome comments with suggestions or feedback. You can contact lead editor (Jenny Stout; jstout@computer.org) or write to either Bill or George (their email addresses appear at the end of their respective essays).
Blogs: Anti-Forensics And Counter Anti-Forensics, Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan
Blogs: Anti-Forensics And Counter Anti-Forensics, Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan
Australian Digital Forensics Conference
Blogging gives an ordinary person the ability to have a conversation with a wide audience and has become one of the fastest growing uses of the Web. However, dozens of employee-bloggers have been terminated for exercising what they consider to be their First Amendment right to free speech and would-be consumer advocates face potential liability for voicing their opinions. To avoid identification and prevent retribution, bloggers have sought to maintain anonymity by taking advantage of various tools and procedures - anti-forensics. Unfortunately some anonymous bloggers also post content that is in violation of one or more laws. Some blogging content …
Health Information Text Characteristics, Gondy Leroy, Evren Eryilmaz '11, Benjamin T. Laroya
Health Information Text Characteristics, Gondy Leroy, Evren Eryilmaz '11, Benjamin T. Laroya
CGU Faculty Publications and Research
Millions of people search online for medical text, but these texts are often too complicated to understand. Readability evaluations are mostly based on surface metrics such as character or words counts and sentence syntax, but content is ignored. We compared four types of documents, easy and difficult WebMD documents, patient blogs, and patient educational material, for surface and content-based metrics. The documents differed significantly in reading grade levels and vocabulary used. WebMD pages with high readability also used terminology that was more consumer-friendly. Moreover, difficult documents are harder to understand due to their grammar and word choice and because they …