Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Computer Sciences

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly Aug 2013

Introduction To Gis Using Open Source Software, 4th Ed, Frank Donnelly

Open Educational Resources

This tutorial was created to accompany the GIS Practicum, a day-long workshop offered by the Newman Library at Baruch College CUNY that introduces participants to geographic information systems (GIS) using the open source software QGIS. The practicum introduces GIS as a concept for envisioning information and as a tool for conducting geographic analyses and creating maps. Participants learn how to navigate a GIS interface, how to prepare layers and conduct a basic geographic analysis, and how to create thematic maps. This tutorial was written using QGIS version 1.8 "Lisboa", a cross-platform (Windows, Mac, Linux) desktop GIS software package.


Will We Connect Again? Machine Learning For Link Prediction In Mobile Social Networks, Ole J. Mengshoel, Raj Desai, Andrew Chen, Brian Tran Jul 2013

Will We Connect Again? Machine Learning For Link Prediction In Mobile Social Networks, Ole J. Mengshoel, Raj Desai, Andrew Chen, Brian Tran

Ole J Mengshoel

In this paper we examine link prediction for two types of data sets with mobility data, namely call data records (from the MIT Reality Mining project) and location-based social networking data (from the companies Gowalla and Brightkite). These data sets contain location information, which we incorporate in the features used for prediction. We also examine different strategies for data cleaning, in particular thresholding based on the amount of social interaction. We investigate the machine learning algorithms Decision Tree, Naïve Bayes, Support Vector Machine, and Logistic Regression. Generally, we find that our feature selection and filtering of the data sets have …


Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi Jul 2013

Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi

Andrei Ludu

This study used a logistic regression model to investigate the relationship between several predicting factors and burglary occurrence probability with regard to the epicenter. These factors include day of the week, time of the day, repeated victimization, connectors and barriers. Data was collected from a local police report on 2010 burglary incidents. Results showed the model has various degrees of significance in terms of predicting the occurrence within difference ranges from the epicenter. Follow-up refined multiple comparisons of different sizes were observed to further discover the pattern of prediction strength of these factors. Results are discussed and further research directions …


Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi Jul 2013

Burglary Crime Analysis Using Logistic Regression, Daniel Antolos, Dahai Liu, Andrei Ludu, Dennis Vincenzi

Dahai Liu

This study used a logistic regression model to investigate the relationship between several predicting factors and burglary occurrence probability with regard to the epicenter. These factors include day of the week, time of the day, repeated victimization, connectors and barriers. Data was collected from a local police report on 2010 burglary incidents. Results showed the model has various degrees of significance in terms of predicting the occurrence within difference ranges from the epicenter. Follow-up refined multiple comparisons of different sizes were observed to further discover the pattern of prediction strength of these factors. Results are discussed and further research directions …


Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross Apr 2013

Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross

Computer Science: Faculty Publications and Other Works

This presentation discusses how to address 21st Century employment challenges by dismantling gender-specific barriers to entry. We take an interdisciplinary approach by focusing on areas such as education, public policy, culture, and media (among others).


S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan Apr 2013

S.H.O.T. Db (Statistics Help Officer Tactics) – Officer-Involved Shootings Database, Hasan Arslan

Cornerstone 3 Reports : Interdisciplinary Informatics

No abstract provided.


Volume 05, Ian Karamarkovich, Jessica Cox, Kyle Fowlkes, Allison Pawlowski, Kaitlin Major, Carrie Dunham, Kelsey Scheitlin, Kathryn Grayson, Ashley Johnson, Jennifer Nehrt, Kelsey Stolzenbach, Kristin Mcquarrie, Sara Nelson, Melisa Michelle, Jessica Sudlow, Perry Bason, Danielle Dmuchawski, Mariah Asbell, Matthew Sakach, Timothy Smith Jr., Annaliese Troxell, T. Dane Summerell, Sarah Ganrude, Malina Rutherford, Hannah Hopper, John Berry Jr., James Early, Colleen Festa, Chelsea D. Taylor, Michelle Maddox, Kaitlyn Smith, Sarah Schu, Cabell Edmunds, Katherine Grayson, Kayla Tornai Apr 2013

Volume 05, Ian Karamarkovich, Jessica Cox, Kyle Fowlkes, Allison Pawlowski, Kaitlin Major, Carrie Dunham, Kelsey Scheitlin, Kathryn Grayson, Ashley Johnson, Jennifer Nehrt, Kelsey Stolzenbach, Kristin Mcquarrie, Sara Nelson, Melisa Michelle, Jessica Sudlow, Perry Bason, Danielle Dmuchawski, Mariah Asbell, Matthew Sakach, Timothy Smith Jr., Annaliese Troxell, T. Dane Summerell, Sarah Ganrude, Malina Rutherford, Hannah Hopper, John Berry Jr., James Early, Colleen Festa, Chelsea D. Taylor, Michelle Maddox, Kaitlyn Smith, Sarah Schu, Cabell Edmunds, Katherine Grayson, Kayla Tornai

Incite: The Journal of Undergraduate Scholarship

Introduction from Dean Dr. Charles Ross

The Tallis House as an Extension of Emily Tallis in McEwan's Atonement by Ian Karamarkovich

Graphic Design by Jessica Cox

Graphic Design by Kyle Fowlkes

Graphic Design by Allison Pawlowski

Incorporating Original Research in The Classroom: A Case Study Analyzing the Influence of the Chesapeake Bay on Local Temperatures by Kaitlin Major, Carrie Dunham and Dr. Kelsey Scheitlin

Graphic Design by Kathryn Grayson

Graphic Design by Ashley Johnson

Facing the Music: Environmental Impact Assessment of Building A Concert Hall on North Campus by Jennifer Nehrt, Kelsey Stolzenbach And Dr. Kelsey Scheitlin

Art by Kristin …


Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael Jan 2013

Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael

Professor Katina Michael

The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.


Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston Jan 2013

Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston

Professor Katina Michael

Australia's national emergency warning system alerts. Radio program in Greek.


Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes Jan 2013

Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes

Professor Katina Michael

Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …


Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael Jan 2013

Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael

Professor Katina Michael

But what if the website goes down in the way Victoria's Country Fire Authority website crashed as fires raged a few weeks ago? What about those people who don't own the latest technology? And what happens when the power goes out?

KATINA MICHAEL: Well there's no television, there isn't ability to access the internet potentially.

ASHLEY HALL: Professor Katina Michael is Associate Professor at the School of Information Systems and Technology at the University of Wollongong.

KATINA MICHAEL: I would suggest a long lasting powered radio because we don't want is we don't want when the lights go out, or …


Personal Reflections From Eportfolio: Ahrc New York City, Md Alam Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Md Alam

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Adriana Arias Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Adriana Arias

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Dominic Dibiase Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Dominic Dibiase

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Cindy Guerrero Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Cindy Guerrero

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Karen Mendoza Luis Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Karen Mendoza Luis

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Juliette Nieves Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Juliette Nieves

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Olivia Bustos Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Olivia Bustos

Community Action Forum: Seidenberg School

No abstract provided.


Personal Reflections From Eportfolio: Ahrc New York City, Erika Wong Zhang Jan 2013

Personal Reflections From Eportfolio: Ahrc New York City, Erika Wong Zhang

Community Action Forum: Seidenberg School

No abstract provided.


Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok Jan 2013

Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok

Research outputs 2013

While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …