Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Sciences

Multivariate Fairness For Paper Selection, Reem Alsaffar Dec 2022

Multivariate Fairness For Paper Selection, Reem Alsaffar

Graduate Theses and Dissertations

Peer review is the process by which publishers select the best publications for inclusion in a journal or a conference. Bias in the peer review process can impact which papers are selected for inclusion in conferences and journals. Although often implicit, race, gender and other demographics can prevent members of underrepresented groups from presenting at major conferences. To try to avoid bias, many conferences use a double-blind review process to increase fairness during reviewing. However, recent studies argue that the bias has not been removed completely. Our research focuses on developing fair algorithms that correct for these biases and select …


Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He May 2022

Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He

Dissertations

Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main …


Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne May 2022

Read This: A Content Analysis Framework For Book Recommendation Applications, Cypress S. Payne

Honors Projects

Book recommendation applications combine word-of-mouth recommendations with algorithms that can suggest books based on a user’s account activity, creating a robust system for finding new books to read. Current research on recommendation systems is purely quantitative, focusing on the efficacy of the system, and content analyses are only just beginning to be performed on mobile applications. I use previous content analyses on applications as a basis for creating a content analysis framework for book recommendation applications. This framework can be used to analyze what users find important in book recommendation apps and inform app creators about their users’ wants and …


Tiktok As A Digital Activism Space: Social Justice Under Algorithmic Control, Brittany Haslem May 2022

Tiktok As A Digital Activism Space: Social Justice Under Algorithmic Control, Brittany Haslem

Institute for the Humanities Theses

TikTok, a video sharing application, has become the center of viral internet culture. The app has risen in popularity so quickly that scholarly literature investigating its vast societal impact is still nascent. TikTok is not only used to discuss popular culture topics and create trends, but also being utilized as a tool for social justice activism in the United States in the wake of a tumultuous year with major events such as the coronavirus pandemic, a resurgence of the Black Lives Matter movement, and the 2020 presidential election. TikTok activism is not without critiques, ranging from concerns of foreign government …


Pad Beyond The Classroom: Integrating Pad In The Scrum Workplace, Jade S. Weiss Mar 2022

Pad Beyond The Classroom: Integrating Pad In The Scrum Workplace, Jade S. Weiss

USF Tampa Graduate Theses and Dissertations

Purpose: The “story” format used in Scrum ticket writing is confusing to developers and leadsto insufficient ticket content, which lends to miscommunication between team members and administrators, and disrupts workflow from the bottom up. A burgeoning methodology in Technical Writing, Purpose, Audience, Design (PAD) is an alternative ticket format that is easier to teach developers and improves the aforementioned conditions than the existing “story” format. The goal of this paper is to lay out why and how PAD can benefit developers on smaller Scrum teams who are tasked with writing their own tickets. This paper does not offer solutions for …


Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia Feb 2022

Usability Of Health-Related Websites By Filipino-American Adults And Nursing Informatics Experts, Kathleen Begonia

Dissertations, Theses, and Capstone Projects

Filipino-Americans are an understudied minority group with high prevalence and mortality from chronic conditions, such as cardiovascular disease and diabetes. Facing barriers to care and lack of culturally appropriate health resources, they frequently use the internet to obtain health information. It is unknown whether they perceive health-related websites to be useful or easy to use because there are no published usability studies involving this population. Using the Technology Acceptance Model as a theoretical framework, this study investigated the difference between website design ratings by experts and the perceptions of Filipino-American users to determine if usability guidelines influenced the perceived ease …


A Human-Centered Approach To Improving Adolescent Online Sexual Risk Detection Algorithms, Afsaneh Razi Jan 2022

A Human-Centered Approach To Improving Adolescent Online Sexual Risk Detection Algorithms, Afsaneh Razi

Electronic Theses and Dissertations, 2020-

Computational risk detection has the potential to protect especially vulnerable populations from online victimization. Conducting a comprehensive literature review on computational approaches for online sexual risk detection led to the identification that the majority of this work has focused on identifying sexual predators after-the-fact. Also, many studies rely on public datasets and third-party annotators to establish ground truth and train their algorithms, which do not accurately represent young social media users and their perspectives to prevent victimization. To address these gaps, this dissertation integrated human-centered approaches to both creating representative datasets and developing sexual risk detection machine learning models to …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao Jan 2022

Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao

Walden Dissertations and Doctoral Studies

User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …


Identifying Challenges And Opportunities For Designing Social Media Nudges For Adolescents, Oluwatomisin Obajemu Jan 2022

Identifying Challenges And Opportunities For Designing Social Media Nudges For Adolescents, Oluwatomisin Obajemu

Electronic Theses and Dissertations, 2020-

With the prevalence of online risks encountered by youth online, strength-based approaches such as nudges have been recommended as a potential solution to subtly guide teens toward safer decisions. However, most nudging interventions to date have not been designed to cater to teens’ unique needs and online safety concerns. To address this gap, this study aimed to better understand adolescents’ perceptions and feedback on online safety nudges to inform the design of more effective online safety interventions. We conducted 12 semi-structured interviews and 3 focus group sessions with 21 teens (13 – 17 years old) to get their feedback on …