Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Personality (3)
- Cybersecurity (2)
- Extraversion (2)
- Game design (2)
- ICT for Development and Poverty Alleviation (2)
-
- Introversion (2)
- Presentations (2)
- Twitter (2)
- Apps (1)
- Art (1)
- Behavioral economics (1)
- Best practices (1)
- CS Unplugged (1)
- CS1 (1)
- Cellular automata (1)
- Chrome extensions (1)
- Collaboration (1)
- Color theory (1)
- Computational Thinking (1)
- Computational thinking (1)
- Computing curricula (1)
- Conflict Studies (1)
- Content capture (1)
- Context (1)
- Curriculum (1)
- Data visualization (1)
- Development (1)
- Education (1)
- Egovernment (1)
- Emoji (1)
- Publication Year
- Publication
-
- Amber Settle (10)
- Jason A Bengtson (3)
- Computer Science Faculty Publications (2)
- Computer Science: Faculty Publications and Other Works (2)
- Dr Deogratias Harorimana (2)
-
- Inaugural CSU IR Conference, 2015 (2)
- Publications and Research (2)
- ATU Research Symposium (1)
- Amanda Hartman McLellan (1)
- DLPS Faculty Publications (1)
- Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations (1)
- EKU Faculty and Staff Scholarship (1)
- Eric A. Kowalik (1)
- Fernando Estrada (1)
- Giving Undergraduate Research a Worldwide Voice: Institutional Repositories as Publishers (1)
- Libraries (1)
- Library Faculty Presentations (1)
- NADIM AKHTAR KHAN (1)
- Open Educational Resources (1)
- Student Scholar Showcase (1)
- Undergraduate Student Research Internships Conference (1)
- Publication Type
Articles 1 - 30 of 37
Full-Text Articles in Computer Sciences
Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke
Artificial Intelligence History, And Libraries: History And Legacy Of Library Contributions To Machine Learning, Wilhelmina Randtke
Library Faculty Presentations
Machine learning seems to be newly everywhere. It's not new, so much as faster processing makes it newly useful. Imagine an automated cataloging program that takes 300 years to run, versus one that takes a week to run. Increased processing speed is a substantive change. This presentation overviews the history of libraries and artificial intelligence. First, teasing out past applications of machine learning in libraries. High quality results and concrete applications of artificial intelligence in libraries have been explored and published for decades. Over time, faster processing allows use at scale. Second, how library and metadata work contributes to machine …
Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah
Blind Fighter – A Video Game For The Visually Impaired, Avery Wayne Harrah
ATU Research Symposium
Blind Fighter is a video game made to be playable by anyone, regardless of any visual impairments the player may have. The game relies on auditory queues to allow players to understand what is happening in the game without ever having to see the screen. The project’s goal is to serve as a proof of concept that video games can be made inclusive with a few additions during development, without sacrificing overall quality. To do this, the game features full graphics in addition to testing many strategies for visually impaired players, including direction-based audio, unique sound effects for each game …
Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig
Simulating Salience: Developing A Model Of Choice In The Visual Coordination Game, Adib Sedig
Undergraduate Student Research Internships Conference
This project is primarily inspired by three papers: Colin Camerer and Xiaomin Li’s (2019 working paper)—Using Visual Salience in Empirical Game Theory, Ryan Oprea’s (2020)—What Makes a Rule Complex?, and Caplin et. al.’s (2011)—Search and Satisficing. Over the summer, I worked towards constructing a model of choice for the visual coordination game that can model player behavior more accurately than traditional game theoretic predictions. It attempts to do so by incorporating a degree of bias towards salience into a cellular automaton search algorithm and utilizing it alongside a sequential search mechanism of satisficing. This …
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.
We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.
We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).
If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Decision Tree For Predicting The Party Of Legislators, Afsana Mimi
Publications and Research
The motivation of the project is to identify the legislators who voted frequently against their party in terms of their roll call votes using Office of Clerk U.S. House of Representatives Data Sets collected in 2018 and 2019. We construct a model to predict the parties of legislators based on their votes. The method we used is Decision Tree from Data Mining. Python was used to collect raw data from internet, SAS was used to clean data, and all other calculations and graphical presentations are performed using the R software.
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Eric A. Kowalik
Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski
Topical Analysis Of The Enron Emails Using Graph Theory, Casey Kalinowski
Student Scholar Showcase
The Enron Scandal of the early 2000s shook the financial world. The subsequent investigation of the Enron Corporation resulted in the arrests of many top-level executives, but are these employees the only ones responsible for the wide scale fraud in the company? A topical analysis of a social network of over 150 employees of the Enron Corporation using Graph Theory could result in new findings or prove that the investigators were correct in their original findings. The research is a retrospective analysis of a corpus of over 500,000 emails from more than 150 employees and top-level executives of the Enron …
Library Guides: An Aggregation Of User Research From 1998 To 2017, David Vess
Library Guides: An Aggregation Of User Research From 1998 To 2017, David Vess
Libraries
A truly comprehensive search tool for resources provided by libraries will continue to be a distant dream until daunting technical challenges are addressed. A Google-like search experience is desirable in some contexts, but a case can be made that hiding subject-specific article databases behind a comprehensive search tool is a disservice to researchers.
Librarians have a long history of addressing the complex landscape of the various resources they offer by crafting guides to library collections. These guides provide direct links to resources while educating inexperienced researchers about discipline-specific databases. Unfortunately, this solution creates more complexities in the research resource landscape. …
Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan
Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan
EKU Faculty and Staff Scholarship
After doing a library-wide StrengthsFinder assessment that highlighted the strengths of its individuals, EKU Libraries decided to put this strategy into practice by applying it to one of the most complex projects in the life of an academic library: the website redesign. This decentralized approach allowed project managers to align strengths-based teams with phases of the redesign that would most benefit from that team’s unique strengths.
Information Technology And Computer Science Programs: How Do We Relate?, Bonnie K. Mackellar, Gregory Hislop, Mihaela C. Sabin, Amber Settle
Information Technology And Computer Science Programs: How Do We Relate?, Bonnie K. Mackellar, Gregory Hislop, Mihaela C. Sabin, Amber Settle
Amber Settle
A Computer Science Linked-Courses Learning Community, Amber Settle, John Lalor, Theresa Steinbach
A Computer Science Linked-Courses Learning Community, Amber Settle, John Lalor, Theresa Steinbach
Amber Settle
How The University Of California Runs One Repository For Ten Campuses, Katie Fortney
How The University Of California Runs One Repository For Ten Campuses, Katie Fortney
Inaugural CSU IR Conference, 2015
Katie Fortney, JD, MLIS, Copyright Policy & Education Officer, Office of Scholarly Communication, University of California http://osc.universityofcalifornia.edu/
Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard
Implementing Metaarchive And Lockss At Digital Commons @Cal Poly, Michele Wyngard
Inaugural CSU IR Conference, 2015
Michele Wyngard, Digital Repository Coordinator, CSU Cal Poly
Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman
Fast And Free: Apps And Websites You Can Use Today, Amanda Hartman
Amanda Hartman McLellan
This workshop will cover some websites and mobile apps that are free and easy to use for a variety of purposes, from organization to just plain fun. If you've got a laptop, iPad or other mobile device, please bring it so you can play along!
Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle
Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle
Computer Science Faculty Publications
[First slide]
The Problem
Institutional Tools, Personal Archivists
- ON YOUR MACHINE
-Complex to Operate
-Require Infrastructure
- DELEGATED TO INSTITUTIONS
-$$$
-Lose original perspective
- Locale content tailoring (DC vs. San Francisco)
- Observation Medium (PC web browser vs. Crawler)
Best Practices In Teaching Information Technology Development, Amber Settle, Deborah Labelle, Hazem Said, Sheila S. Sicilia
Best Practices In Teaching Information Technology Development, Amber Settle, Deborah Labelle, Hazem Said, Sheila S. Sicilia
Amber Settle
Turning The Tables: Learning From Students About Teaching Cs1, Amber Settle
Turning The Tables: Learning From Students About Teaching Cs1, Amber Settle
Amber Settle
Interactive Learning Online: Challenges And Opportunities, Mihaela Sabin, Amber Settle, Becky Rutherfoord
Interactive Learning Online: Challenges And Opportunities, Mihaela Sabin, Amber Settle, Becky Rutherfoord
Amber Settle
Forced Displacement In Colombia, Fernando Estrada
Forced Displacement In Colombia, Fernando Estrada
Fernando Estrada
No abstract provided.
User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria
User Expectations Of Library Genealogy Databases V. What They Actually Get, Rosemary L. Meszaros, Katherine Pennavaria
DLPS Faculty Publications
An analysis and comparison of two genealogical databases: Ancestry.com and Heritagequest.com.
Institutional Support For Computing Faculty Research Productivity: Does Gender Matter?, Monica M. Mcgill, Amber Settle
Institutional Support For Computing Faculty Research Productivity: Does Gender Matter?, Monica M. Mcgill, Amber Settle
Amber Settle
Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson
Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson
Jason A Bengtson
Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …
The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson
The Art Of Redirection: Putting Mobile Devices Where You Want Them, Jason A. Bengtson
Jason A Bengtson
Mobile technology has exploded, with many libraries experiencing a surge in access to their resources through mobile devices. In response, many institutions have created or are creating mobile sites designed to accommodate themselves to the unique strictures of these devices. One hurdle faced by these organizations, however, is getting mobile users to those sites. One solution is mobile redirect scripts, which automatically redirect mobile users from a regular page to a mobile page. These scripts come in various forms and present unique challenges to libraries. How are these scripts created? What triggers can or should be used to activate them? …
Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson
Imagining Emergent Metadata, Realizing The Emergent Web, Jason A. Bengtson
Jason A Bengtson
Current metadata schemas are largely analog technology grafted onto the digital format. They have three inherent limitations that need to be transcended: they generate a static product which must be changed manually, they revolve around the needs of human, rather than mechanistic agents, and they are limited by the imagination and organizational capabilities of human agency. The author argues that to meet future challenges metadata will have to take a more flexible, adaptive form that centers on the needs of the machine in searching, interpretation and organization until the information it proxies enters into the human sphere. The author further …
Social Networks And Web2.0 Among Youth: Lessons For Pacific Island Nations, Deogratias Harorimana Sr
Social Networks And Web2.0 Among Youth: Lessons For Pacific Island Nations, Deogratias Harorimana Sr
Dr Deogratias Harorimana
This study is on social networks and web2 among youths and the lessons for Pacific Island nation. This study defines commonly used social networking sites used by the Pacific youths, average time spent, reasons behind the use of social networking sites and how social networking sites can be used as a development tool for Pacific Island nation. It was found that the popularity of social networking amongst youths in Pacific Island Countries is fast growing, increasing more than three folds year on year in the last 3years. Social Networks are a vital part of life for PIC youths, where, now …
Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson
Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
[First Slide]
What is WARCreate?
- Google Chrome extension
- Creates WARC files
- Enables preservation by users from their browser
- First steps in bringing Institutional Archiving facilities to the PC
Institutional Repositories: Mechanism For Visibility, S M. Shafi, Nadim Akhtar Khan
Institutional Repositories: Mechanism For Visibility, S M. Shafi, Nadim Akhtar Khan
NADIM AKHTAR KHAN
Institutional repositories are a set of services that a university offers to the members of its community for the management and dissemination of digital materials created by the institution and its community members
A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr
A Review Of International Best Practice In E-Governmentsome Lessons For New Adopters, Deogratias Harorimana Sr
Dr Deogratias Harorimana
Efficient bureaucratic processes as essential to attract and retain investment, as well as promote SME growth. The e_Gov is one of many ways emerging economies have used to streamline public service delivery and create a freindly and conducive atmosphere for business -both MNC and SMEs. This presentation provide an overview of some of the World's most recent case examples on the successful design-plan-implementation of eGov to build a strong basis to attract investment and deliver seamless essential services to Citizens.