Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Sciences
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Analyze And Examine Wildfire Events In California, Aleena Hoodith, Sakim Zaman, Safoan Hossain, Jiehao Huang
Publications and Research
•A wildfire is an unplanned, unwanted, uncontrolled fire in an area of combustible vegetation starting in rural areas and urban areas. •Recent studies have shown that the effect of anthropogenic climate change has fueled the wildfire events, leading to an increase in the annual burned areas and number of events. •California is one of the places having the most deadliest and destructive wildfire seasons. With the global warming effect of 1°C since 1850, the 20 largest wildfires events that have occurred in California, 8 of them were in 2017. (Center For Climate And Energy Solutions) •Climate change is primarily caused …
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.
We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.
We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).
If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …
Student Academic Conference, Caitlin Brooks
Student Academic Conference, Caitlin Brooks
Student Academic Conference
No abstract provided.
The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie
The Origin & Evolution Of The Chinese Language, Charity Bullis, Yan Xie
Liberty University Research Week
Undergraduate
Textual or Investigative
Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski
Sector: A Web-Based Data Management And Sharing System Secured By Blockchain, Matthew Grohotolski
Summer Scholarship, Creative Arts and Research Projects (SCARP)
Since the advent of technology, securely transferring data between two computers over the internet has been a difficult task. This is especially true for organizations and universities who want to take advantage of technology to securely transfer or share data. Although many file transfer services exist, none have achieved secure transfers while also offering a friendly and easy-to-use user interface. SECTOR uses an existing secure transfer service called Globus to conduct secure file transfers and has built a safe and secure user permissions system on top of their functionality. All data used by SECTOR is stored on a distributed ledger …