Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Artificial Intelligence (2)
- Artificial intelligence (2)
- Communicative AI (2)
- Cybersecurity (2)
- Human-machine communication (2)
-
- :Mobile edge computing- (MEC) (1)
- ARIMA. (1)
- Agency (1)
- Artificial intelligence applications (1)
- Artificial intelligence challenges (1)
- Attraction (1)
- Authentication (1)
- Biomanufacturing (1)
- Business model innovation (1)
- Cell Therapy (1)
- Censorship laws (1)
- Charitable giving (1)
- ChatGPT (1)
- Chinese Commercial Enablers (1)
- Climate changes (1)
- Cognitive biometrics. (1)
- Collegiate education (1)
- Colonial laws (1)
- Companion chatbots (1)
- Constitution of India (1)
- Crowd management (1)
- Crowds (1)
- Cyber Intelligence (1)
- Cyberattacks (1)
- Data (1)
Articles 1 - 27 of 27
Full-Text Articles in Social and Behavioral Sciences
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din
Journal of Police and Legal Sciences
Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …
The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson
The Essential Guide To Playing And Creating Music Online Together, Rebekah Wilson
Journal of Network Music and Arts
No abstract provided.
Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang
Telematic Performance In Electronic Dance Music (Edm), Yongsi Wang
Journal of Network Music and Arts
This paper aims to discuss to what extent telematic performances within the framework of the “Beyond Time and Space - London Tokyo Online 2023” initiative serve as a comparative paradigm to physical live performances, particularly in the domains of technical exigencies, artistic expression, and audience engagement.
Central to this study is the “Beyond Time and Space - London Tokyo Online 2023” event, a simultaneous, interactive electronic live music performance connecting physical venues in London and Tokyo. Through JackTrip and Open Broadcaster Software (OBS), this event aspired to explore the applicability and limitations of telematic technology in live electronic music performance …
Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller
Kompost*Klang*Küche*: Telematic Worlding With Glitch, Hannah Vyborg Walter, Robert Torche, Cedric Spindler, Eric Larrieux, Patrick Muller
Journal of Network Music and Arts
This paper explores concepts and practices of telematic performances, particularly through the lens of the project kompost*klang*küche*. It emphasizes spatial discontinuity within networked artistic collaborations, as opposed to immersive continuity.
Telematic performance formats utilize network technologies to facilitate low latency artistic endeavors across geographical divides, creating a complex interplay between local, remote, and intermediary spaces. In this context, we interpret spatial configurations from a phenomenological point of view as telematic SPACE in which technical components are in place in three spaces (local, remote and intermediary space) while practiced, embodied and inhabited in an anthropological space, where the overlay and dynamics …
How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock
How To Be In Two Places At Once: A Search For The Immersive Experience In Renaissance Music And Visual Arts., Andrew Hallock
Journal of Network Music and Arts
Immersion is a hot topic, but it is often invoked in a vague or shallow way. This essay aims to arrive at a more nuanced consideration of the immersive experience by presenting some perhaps surprising arguments from the past—from Renaissance music and visual arts—drawing parallels with our own time, and positing that the Network Arts can take inspiration from this history to enhance its own immersive endeavours. Four interrelated topics serve as the basis for this investigation: miniature devotionalia, polyphonic canons, anamorphic puzzles, and early cosmology. By using perspective to disclose hidden meanings, ideas, and realities, these varied practices draw …
Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti
Connectivity, Presence, And Time: A Pedagogical Experience With Telematic Music, Cássia Carrascoza Bomfim, Alexandre Ficarelli, Danilo Rossetti
Journal of Network Music and Arts
This article aims to discuss the notions of connectivity, presence, and time in the specific context of telematic music. To do so, we describe the work of the Telematic Ensemble LaFlauta, formed by students and professors from the University of São Paulo, Ribeirão Preto campus, for performance at the NowNet Arts Conference 2023.4 This work involved rehearsals and performances of three compositions dedicated to the group: Virtual Studies (2023) by Paulo C. Chagas, Modules 2 - My Words (2023) by Cássia Carrascoza, and Textural Studies (2023) by Danilo Rossetti. We conclude that the positive results of telematic music in a …
Editorial, Sarah Weaver
Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike
Artificial Intelligence For Authentication Through Mental Profiling Technique, Nawaf Mazloum, Christine Abou-Saleh, Hassan Mazloum, Charles Anosike
BAU Journal - Science and Technology
A new approach to user authentication using mental profiling saw light, which is a technique that involves measuring an individual's cognitive abilities and psychological traits to create a unique profile, using Artificial Intelligence techniques. These profiles can then be used to identify users securely and efficiently, even in the presence of sophisticated attacks, by harnessing AI-driven systems for mental profile creation and user authentication.
After reviewing the existing literature on authentication and mental profiling, it presents a new mental profiling test that is specifically designed for authentication purposes. The test was evaluated on a sample of 100 users, and results …
Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays
Authentic Impediments: The Influence Of Identity Threat, Cultivated Perceptions, And Personality On Robophobia, Kate K. Mays
Human-Machine Communication
Considering possible impediments to authentic interactions with machines, this study explores contributors to robophobia from the potential dual influence of technological features and individual traits. Through a 2 x 2 x 3 online experiment, a robot’s physical human-likeness, gender, and status were manipulated and individual differences in robot beliefs and personality traits were measured. The effects of robot traits on phobia were non-significant. Overall, subjective beliefs about what robots are, cultivated by media portrayals, whether they threaten human identity, are moral, and have agency were the strongest predictors of robophobia. Those with higher internal locus of control and neuroticism, and …
What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence
What’S In A Name And/Or A Frame? Ontological Framing And Naming Of Social Actors And Social Responses, David Westerman, Michael Vosburg, Xinyue Liu, Patric R. Spence
Human-Machine Communication
Artificial intelligence (AI) is fundamentally a communication field. Thus, the study of how AI interacts with us is likely to be heavily driven by communication. The current study examined two things that may impact people’s perceptions of socialness of a social actor: one nonverbal (ontological frame) and one verbal (providing a name) with a 2 (human vs. robot) x 2 (named or not) experiment. Participants saw one of four videos of a study “host” crossing these conditions and responded to various perceptual measures about the socialness and task ability of that host. Overall, data were consistent with hypotheses that whether …
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad
An-Najah University Journal for Research - B (Humanities)
Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu
Journal of Demography
This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization
Human-Machine Communication
This is the complete volume of HMC Volume 7. Special Issue on Mediatization
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen
Human-Machine Communication
As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.
The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …
Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen
Factors Affecting The Adoption Of Information Technology In Medium And Small Enterprises: A Case Study In Mekong Delta, Vietnam, Thy-Lieu Nguyen-Thi, Duy-Dong Le, Kieu-Chinh Nguyen-Ly, Trung-Tien Nguyen, Mohamed Saleem Haja Nazmudeen
ASEAN Journal on Science and Technology for Development
This research endeavors to discern the determinants influencing the adoption of information technology in the management practices of small and medium-sized enterprises (SMEs) situ-ated within the Mekong Delta region of Vietnam. Leveraging the Unified Theory of Ac-ceptance and Use of Technology (UTAUT), PLS-SEM, and ANN models, this study ranks the pivotal factors that impact the decision to integrate information technology into SME management. The identified factors, in order of significance, encompass (1) Support from State Agencies, (2) Managerial Qualifications, (3) Competitive Landscape, (4) Enterprise Scale, and (5) Employee Qualifications. The investigation encompasses 496 SMEs across the Mekong Delta and evaluates …
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco
Journal of International Technology and Information Management
Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin
Journal of International Technology and Information Management
Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström
Journal of International Technology and Information Management
This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian
Journal of International Technology and Information Management
The Indian Constitution, which came into force on January 26, 1950, guarantees various fundamental rights, such as the freedom of speech and expression, freedom of religion, rights to form association, as well as rights to privacy. Yet, since the adoption of the Constitution, the Indian citizen has been subject to varying degrees of media censorship and surveillance. This paper seeks to delve into the historical evolution of media and Internet censorship and surveillance in India. It shows how media censorship of varying types have existed since the British colonists introduced restrictive laws in order to expand and control the native …