Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Sciences

Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang Dec 2021

Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang

Publications and Research

•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …


Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin Nov 2021

Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.

We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.

We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …


Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison Nov 2021

Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).

If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …


Student Academic Conference, Caitlin Brooks Apr 2021

Student Academic Conference, Caitlin Brooks

Student Academic Conference

No abstract provided.


The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie Apr 2021

The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie

Liberty University Research Week

Undergraduate

Textual or Investigative


Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski Jan 2021

Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski

Summer Scholarship, Creative Arts and Research Projects (SCARP)

Since the advent of technology, securely transferring data between two computers over the internet has been a difficult task. This is especially true for organizations and universities who want to take advantage of technology to securely transfer or share data. Although many file transfer services exist, none have achieved secure transfers while also offering a friendly and easy-to-use user interface. SECTOR uses an existing secure transfer service called Globus to conduct secure file transfers and has built a safe and secure user permissions system on top of their functionality. All data used by SECTOR is stored on a distributed ledger …