Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Journal

2024

Institution
Keyword
Publication

Articles 1 - 27 of 27

Full-Text Articles in Social and Behavioral Sciences

“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din Jul 2024

“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din

Journal of Police and Legal Sciences

Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …


The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson Jul 2024

The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson

Journal of Network Music and Arts

No abstract provided.


Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang Jul 2024

Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang

Journal of Network Music and Arts

This paper aims to discuss to what extent telematic performances within the framework of the “Beyond Time and Space - London Tokyo Online 2023” initiative serve as a comparative paradigm to physical live performances, particularly in the domains of technical exigencies, artistic expression, and audience engagement.

Central to this study is the “Beyond Time and Space - London Tokyo Online 2023” event, a simultaneous, interactive electronic live music performance connecting physical venues in London and Tokyo. Through JackTrip and Open Broadcaster Software (OBS), this event aspired to explore the applicability and limitations of telematic technology in live electronic music performance …


Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller Jul 2024

Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller

Journal of Network Music and Arts

This paper explores concepts and practices of telematic performances, particularly through the lens of the project kompost*klang*küche*. It emphasizes spatial discontinuity within networked artistic collaborations, as opposed to immersive continuity.

Telematic performance formats utilize network technologies to facilitate low latency artistic endeavors across geographical divides, creating a complex interplay between local, remote, and intermediary spaces. In this context, we interpret spatial configurations from a phenomenological point of view as telematic SPACE in which technical components are in place in three spaces (local, remote and intermediary space) while practiced, embodied and inhabited in an anthropological space, where the overlay and dynamics …


How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock Jul 2024

How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock

Journal of Network Music and Arts

Immersion is a hot topic, but it is often invoked in a vague or shallow way. This essay aims to arrive at a more nuanced consideration of the immersive experience by presenting some perhaps surprising arguments from the past—from Renaissance music and visual arts—drawing parallels with our own time, and positing that the Network Arts can take inspiration from this history to enhance its own immersive endeavours. Four interrelated topics serve as the basis for this investigation: miniature devotionalia, polyphonic canons, anamorphic puzzles, and early cosmology. By using perspective to disclose hidden meanings, ideas, and realities, these varied practices draw …


Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti Jul 2024

Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti

Journal of Network Music and Arts

This article aims to discuss the notions of connectivity, presence, and time in the specific context of telematic music. To do so, we describe the work of the Telematic Ensemble LaFlauta, formed by students and professors from the University of São Paulo, Ribeirão Preto campus, for performance at the NowNet Arts Conference 2023.4 This work involved rehearsals and performances of three compositions dedicated to the group: Virtual Studies (2023) by Paulo C. Chagas, Modules 2 - My Words (2023) by Cássia Carrascoza, and Textural Studies (2023) by Danilo Rossetti. We conclude that the positive results of telematic music in a …


Editorial, Sarah Weaver Jul 2024

Editorial, Sarah Weaver

Journal of Network Music and Arts

No abstract provided.


Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike Jun 2024

Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike

BAU Journal - Science and Technology

A new approach to user authentication using mental profiling saw light, which is a technique that involves measuring an individual's cognitive abilities and psychological traits to create a unique profile, using Artificial Intelligence techniques. These profiles can then be used to identify users securely and efficiently, even in the presence of sophisticated attacks, by harnessing AI-driven systems for mental profile creation and user authentication.

After reviewing the existing literature on authentication and mental profiling, it presents a new mental profiling test that is specifically designed for authentication purposes. The test was evaluated on a sample of 100 users, and results …


Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays Jun 2024

Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays

Human-Machine Communication

Considering possible impediments to authentic interactions with machines, this study explores contributors to robophobia from the potential dual influence of technological features and individual traits. Through a 2 x 2 x 3 online experiment, a robot’s physical human-likeness, gender, and status were manipulated and individual differences in robot beliefs and personality traits were measured. The effects of robot traits on phobia were non-significant. Overall, subjective beliefs about what robots are, cultivated by media portrayals, whether they threaten human identity, are moral, and have agency were the strongest predictors of robophobia. Those with higher internal locus of control and neuroticism, and …


What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence Jun 2024

What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence

Human-Machine Communication

Artificial intelligence (AI) is fundamentally a communication field. Thus, the study of how AI interacts with us is likely to be heavily driven by communication. The current study examined two things that may impact people’s perceptions of socialness of a social actor: one nonverbal (ontological frame) and one verbal (providing a name) with a 2 (human vs. robot) x 2 (named or not) experiment. Participants saw one of four videos of a study “host” crossing these conditions and responded to various perceptual measures about the socialness and task ability of that host. Overall, data were consistent with hypotheses that whether …


Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad Jun 2024

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad

An-Najah University Journal for Research - B (Humanities)

Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …


Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu May 2024

Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu

Journal of Demography

This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


Artificial Sociality, Simone Natale, Iliana Depounti Apr 2024

Artificial Sociality, Simone Natale, Iliana Depounti

Human-Machine Communication

This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …


Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen Apr 2024

Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen

Human-Machine Communication

As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb Mar 2024

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom Mar 2024

Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …


Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen Jan 2024

Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen

ASEAN Journal on Science and Technology for Development

This research endeavors to discern the determinants influencing the adoption of information technology in the management practices of small and medium-sized enterprises (SMEs) situ-ated within the Mekong Delta region of Vietnam. Leveraging the Unified Theory of Ac-ceptance and Use of Technology (UTAUT), PLS-SEM, and ANN models, this study ranks the pivotal factors that impact the decision to integrate information technology into SME management. The identified factors, in order of significance, encompass (1) Support from State Agencies, (2) Managerial Qualifications, (3) Competitive Landscape, (4) Enterprise Scale, and (5) Employee Qualifications. The investigation encompasses 496 SMEs across the Mekong Delta and evaluates …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian Jan 2024

Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Constitution, which came into force on January 26, 1950, guarantees various fundamental rights, such as the freedom of speech and expression, freedom of religion, rights to form association, as well as rights to privacy. Yet, since the adoption of the Constitution, the Indian citizen has been subject to varying degrees of media censorship and surveillance. This paper seeks to delve into the historical evolution of media and Internet censorship and surveillance in India. It shows how media censorship of varying types have existed since the British colonists introduced restrictive laws in order to expand and control the native …