Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

MS Powerpoint

Social and Behavioral Sciences

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 37

Full-Text Articles in Computer Sciences

Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke Oct 2023

Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke

Library Faculty Presentations

Machine learning seems to be newly everywhere. It's not new, so much as faster processing makes it newly useful. Imagine an automated cataloging program that takes 300 years to run, versus one that takes a week to run. Increased processing speed is a substantive change. This presentation overviews the history of libraries and artificial intelligence. First, teasing out past applications of machine learning in libraries. High quality results and concrete applications of artificial intelligence in libraries have been explored and published for decades. Over time, faster processing allows use at scale. Second, how library and metadata work contributes to machine …


Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah Apr 2023

Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah

ATU Research Symposium

Blind Fighter is a video game made to be playable by anyone, regardless of any visual impairments the player may have. The game relies on auditory queues to allow players to understand what is happening in the game without ever having to see the screen. The project’s goal is to serve as a proof of concept that video games can be made inclusive with a few additions during development, without sacrificing overall quality. To do this, the game features full graphics in addition to testing many strategies for visually impaired players, including direction-based audio, unique sound effects for each game …


Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig Aug 2022

Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig

Undergraduate Student Research Internships Conference

This project is primarily inspired by three papers: Colin Camerer and Xiaomin Li’s (2019 working paper)—Using Visual Salience in Empirical Game Theory, Ryan Oprea’s (2020)—What Makes a Rule Complex?, and Caplin et. al.’s (2011)—Search and Satisficing. Over the summer, I worked towards constructing a model of choice for the visual coordination game that can model player behavior more accurately than traditional game theoretic predictions. It attempts to do so by incorporating a degree of bias towards salience into a cellular automaton search algorithm and utilizing it alongside a sequential search mechanism of satisficing. This …


Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin Nov 2021

Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.

We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.

We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …


Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison Nov 2021

Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).

If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …


Decision Tree For Predicting The Party Of Legislators, Afsana Mimi May 2020

Decision Tree For Predicting The Party Of Legislators, Afsana Mimi

Publications and Research

The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.


Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook Oct 2019

Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook

Eric A. Kowalik

Learn how a team collaborated to develop a text mining process for 7,500 journal articles and 500+ keywords to determine how often, when, and in what context specific terms were used. We share our processes obtaining journal permissions, data conversion, and code writing, which you can replicate to assist researchers.


Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski Apr 2018

Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski

Student Scholar Showcase

The Enron Scandal of the early 2000s shook the financial world. The subsequent investigation of the Enron Corporation resulted in the arrests of many top-level executives, but are these employees the only ones responsible for the wide scale fraud in the company? A topical analysis of a social network of over 150 employees of the Enron Corporation using Graph Theory could result in new findings or prove that the investigators were correct in their original findings. The research is a retrospective analysis of a corpus of over 500,000 emails from more than 150 employees and top-level executives of the Enron …


Library Guides: An Aggregation Of User Research From 1998 To 2017, David Vess Jun 2017

Library Guides: An Aggregation Of User Research From 1998 To 2017, David Vess

Libraries

A truly comprehensive search tool for resources provided by libraries will continue to be a distant dream until daunting technical challenges are addressed. A Google-like search experience is desirable in some contexts, but a case can be made that hiding subject-specific article databases behind a comprehensive search tool is a disservice to researchers.

Librarians have a long history of addressing the complex landscape of the various resources they offer by crafting guides to library collections. These guides provide direct links to resources while educating inexperienced researchers about discipline-specific databases. Unfortunately, this solution creates more complexities in the research resource landscape. …


Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan Sep 2016

Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan

EKU Faculty and Staff Scholarship

After doing a library-wide StrengthsFinder assessment that highlighted the strengths of its individuals, EKU Libraries decided to put this strategy into practice by applying it to one of the most complex projects in the life of an academic library: the website redesign. This decentralized approach allowed project managers to align strengths-based teams with phases of the redesign that would most benefit from that team’s unique strengths.


Information Technology And Computer Science Programs: How Do We Relate?, Bonnie K. Mackellar, Gregory Hislop, Mihaela C. Sabin, Amber Settle Sep 2015

Information Technology And Computer Science Programs: How Do We Relate?, Bonnie K. Mackellar, Gregory Hislop, Mihaela C. Sabin, Amber Settle

Amber Settle

In this panel session, the relationship between computer science programs and information technology programs at universities that house both will be explored. People outside the computing disciplines often find the distinction between these programs confusing. The panelists, who have experience with both types of program, will discuss strategies for differentiating the programs in the eyes of administrators, for advising students into the correct program, and for maintaining focus and excellence in both computer science and information technology programs.


A Computer Science Linked-Courses Learning Community, Amber Settle, John Lalor, Theresa Steinbach Jun 2015

A Computer Science Linked-Courses Learning Community, Amber Settle, John Lalor, Theresa Steinbach

Amber Settle

Previous work has shown that factors such as student engagement and involvement can impact progress for computer science majors. One promising approach for improving student engagement is learning communities, which have a long history in academia but are relatively uncommon in computing. In this article we describe a linked-courses learning community for women and men of color majoring in development-focused computing degrees. We provide logistical information about the first offering of the learning community and assess the effectiveness of the community via a student survey. Our results show that students in the learning community are more likely to report that …


How The University Of California Runs One Repository For Ten Campuses, Katie Fortney Apr 2015

How The University Of California Runs One Repository For Ten Campuses, Katie Fortney

Inaugural CSU IR Conference, 2015

Katie Fortney, JD, MLIS, Copyright Policy & Education Officer, Office of Scholarly Communication, University of California http://osc.universityofcalifornia.edu/


Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard Apr 2015

Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard

Inaugural CSU IR Conference, 2015

Michele Wyngard, Digital Repository Coordinator, CSU Cal Poly


Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman May 2013

Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman

Amanda Hartman McLellan

This workshop will cover some websites and mobile apps that are free and easy to use for a variety of purposes, from organization to just plain fun. If you've got a laptop, iPad or other mobile device, please bring it so you can play along!


Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle Jan 2013

Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First slide]

The Problem

Institutional Tools, Personal Archivists

  • ON YOUR MACHINE

-Complex to Operate

-Require Infrastructure

  • DELEGATED TO INSTITUTIONS

-$$$

-Lose original perspective

  • Locale content tailoring (DC vs. San Francisco)
  • Observation Medium (PC web browser vs. Crawler)


Best Practices In Teaching Information Technology Development, Amber Settle, Deborah Labelle, Hazem Said, Sheila S. Sicilia Oct 2012

Best Practices In Teaching Information Technology Development, Amber Settle, Deborah Labelle, Hazem Said, Sheila S. Sicilia

Amber Settle

Programming is one of the most fundamental and central topics in the information technology curriculum. Because of its importance it is crucial to understand how to effectively teach development students. In this panel we share best practices for teaching programming to a variety of populations, including freshman, non-majors, and community college students. Various pedagogical approaches including pair programming, studiobased instruction, peer instruction, active learning, cooperative learning, project-based pedagogy, high-impact education practices, and CS Unplugged type activities are included.


Turning The Tables: Learning From Students About Teaching Cs1, Amber Settle Oct 2012

Turning The Tables: Learning From Students About Teaching Cs1, Amber Settle

Amber Settle

Programming has a central role in the computing curriculum, and introductory programming classes have been extensively studied in the computer science education literature. However, most of the studies focus on the effectiveness of various pedagogical approaches on student learning and engagement, and relative little attention is paid to faculty development. The gap in the literature puts CS1 faculty interested in effectively implementing innovative pedagogical approaches in a difficult situation. This article argues that taking a behaviorist approach to the CS1 classroom can provide much-needed feedback. Students provide instructors with one of the best sources of information about effective programming instruction, …


Interactive Learning Online: Challenges And Opportunities, Mihaela Sabin, Amber Settle, Becky Rutherfoord Oct 2012

Interactive Learning Online: Challenges And Opportunities, Mihaela Sabin, Amber Settle, Becky Rutherfoord

Amber Settle

Since the early 1990s online education and online learning systems have held the promise of increasing instructional productivity and reducing costs without sacrificing educational quality. There is no evidence to date that such promise has materialized. The impetus of the newest developments with free online courses to hundreds of thousands of students might drastically transform how we teach more and better with less. The innovation that prompted this panel is called Interactive Learning Online (ILO), and has the distinctive feature of highly interactive, machine-guided instruction that can be scaled to accommodate a large number of students who benefit from targeted …


Forced Displacement In Colombia, Fernando Estrada Jul 2012

Forced Displacement In Colombia, Fernando Estrada

Fernando Estrada

No abstract provided.


User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria Apr 2012

User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria

DLPS Faculty Publications

An analysis and comparison of two genealogical databases: Ancestry.com and Heritagequest.com.


Institutional Support For Computing Faculty Research Productivity: Does Gender Matter?, Monica M. Mcgill, Amber Settle Mar 2012

Institutional Support For Computing Faculty Research Productivity: Does Gender Matter?, Monica M. Mcgill, Amber Settle

Amber Settle

We address the question of how male and female computing faculty in the U.S. and Canada perceive research requirements and institutional support for promotion and tenure. Via a survey sent to approximately 7500 computing faculty at the 256 institutions that participate in the annual Taulbee Survey, our results identify differences in reported tenure and promotion requirements, including the number of publications required during the probationary period, the importance of the scope of publication venues, the importance of publishing in non-refereed journals, and the importance of collaborative presentations. Differences were also discovered in institutional support and the satisfaction levels with that …


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …


The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson Mar 2012

The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson

Jason A Bengtson

Mobile technology has exploded, with many libraries experiencing a surge in access to their resources through mobile devices. In response, many institutions have created or are creating mobile sites designed to accommodate themselves to the unique strictures of these devices. One hurdle faced by these organizations, however, is getting mobile users to those sites. One solution is mobile redirect scripts, which automatically redirect mobile users from a regular page to a mobile page. These scripts come in various forms and present unique challenges to libraries. How are these scripts created? What triggers can or should be used to activate them? …


Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson Mar 2012

Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson

Jason A Bengtson

Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …


Social Networks And Web2.0 Among Youth: Lessons For Pacific Island Nations, Deogratias Harorimana Sr Feb 2012

Social Networks And Web2.0 Among Youth: Lessons For Pacific Island Nations, Deogratias Harorimana Sr

Dr Deogratias Harorimana

This study is on social networks and web2 among youths and the lessons for Pacific Island nation. This study defines commonly used social networking sites used by the Pacific youths, average time spent, reasons behind the use of social networking sites and how social networking sites can be used as a development tool for Pacific Island nation. It was found that the popularity of social networking amongst youths in Pacific Island Countries is fast growing, increasing more than three folds year on year in the last 3years. Social Networks are a vital part of life for PIC youths, where, now …


Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2012

Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

[First Slide]

What is WARCreate?

  • Google Chrome extension
  • Creates WARC files
  • Enables preservation by users from their browser
  • First steps in bringing Institutional Archiving facilities to the PC


Institutional Repositories: Mechanism For Visibility, S M. Shafi, Nadim Akhtar Khan Dec 2011

Institutional Repositories: Mechanism For Visibility, S M. Shafi, Nadim Akhtar Khan

NADIM AKHTAR KHAN

Institutional repositories are a set of services that a university offers to the members of its community for the management and dissemination of digital materials created by the institution and its community members


A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr Oct 2011

A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr

Dr Deogratias Harorimana

Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.