Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Social and Behavioral Sciences

Microblogging For Engaged Teaching And Learning, Thomas Menkhoff, Kok Siew Benjamin Gan, Charles Jason Woodard, Yue Wah Chay Apr 2015

Microblogging For Engaged Teaching And Learning, Thomas Menkhoff, Kok Siew Benjamin Gan, Charles Jason Woodard, Yue Wah Chay

C. Jason Woodard

In this paper, we report how we put a newly developed Twitter application to work in the context of a Knowledge Management course taught at the Singapore Management University (SMU) allowing students to post and view relevant tweets in an organized manner for the benefit of collaborative class discussions and learning. Innovative elements of the ongoing project include the explorative usage of social media such as Twitter in the higher education context, student participation in providing initial evidence and qualitative feedback that tweeting is pedagogically meaningful and a newly built-in feature which can resolve tweeting challenges which occurred in class …


Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo Jun 2014

Predicting Best Answerers For New Questions: An Approach Leveraging Topic Modeling And Collaborative Voting, Yuan Tian, Pavneet Singh Kochhar, Ee Peng Lim, Feida Zhu, David Lo

David LO

Community Question Answering (CQA) sites are becoming increasingly important source of information where users can share knowledge on various topics. Although these platforms bring new opportunities for users to seek help or provide solutions, they also pose many challenges with the ever growing size of the community. The sheer number of questions posted everyday motivates the problem of routing questions to the appropriate users who can answer them. In this paper, we propose an approach to predict the best answerer for a new question on CQA site. Our approach considers both user interest and user expertise relevant to the topics …


F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos Apr 2013

F-Trail: Finding Patterns In Taxi Trajectories, Yasuko Matsubara, Evangelos Papalexakis, Lei Li, David Lo, Yasushi Sakurai, Christos Faloutsos

David LO

Given a large number of taxi trajectories, we would like to find interesting and unexpected patterns from the data. How can we summarize the major trends, and how can we spot anomalies? The analysis of trajectories has been an issue of considerable interest with many applications such as tracking trails of migrating animals and predicting the path of hurricanes. Several recent works propose methods on clustering and indexing trajectories data. However, these approaches are not especially well suited to pattern discovery with respect to the dynamics of social and economic behavior. To further analyze a huge collection of taxi trajectories, …


Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael Jan 2013

Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael

Professor Katina Michael

The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.


Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim Dec 2012

Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim

David LO

Microblogging has recently become a popular means to disseminate information among millions of people. Interestingly, software developers also use microblog to communicate with one another. Different from traditional media, microblog users tend to focus on recency and informality of content. Many tweet contents are relatively more personal and Opinionated, compared to that of traditional news report. Thus, by analyzing microblogs, one could get the up-to-date information about what people are interested in or feel toward a particular topic. In this paper, we describe our microblog observatory that aggregates more than 70,000 Twitter feeds, captures software-related tweets, and computes trends from …


Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim Dec 2012

Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim

David LO

Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Uprising: The Internet's Unintended Consequences, Marcus Breen Sep 2012

Uprising: The Internet's Unintended Consequences, Marcus Breen

Marcus Breen

The Internet has transformed the social relations that were once managed by the powers that be. As a rapidly maturing communications technology, the Internet has brought people together even while it has reinforced privatism. The desktop computer, the laptop, the cellular and mobile phone, the Global Positoning System, the pilotless drone aircraft, video games and government documents courtesy of Wikileaks, all are connected on the network of networks. Together these converged elements of a global socio-technical system offer wonderful possibilities for human emancipation, even while those ideas collide with established ideas of civility and decency. Utilizing a transdisciplinary approach, Uprising …


Work In Progress - Synthesizing Design, Engineering, And Entrepreneurship Through A Mobile Application Development Course, Mark L. Chang Jul 2012

Work In Progress - Synthesizing Design, Engineering, And Entrepreneurship Through A Mobile Application Development Course, Mark L. Chang

Mark L. Chang

In this paper, we describe our experiences in designing and delivering a course that blends together design, engineering, and entrepreneurship through the use of mobile devices. The significance of this work is in advocating for and demonstrating the motivational and educational benefits of using a mobile platform, and describing how to utilize the mobile marketplace to provide an authentic, real-world experience across these three domains.


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Editorial: "You Talkin' To Me?", Katina Michael Feb 2012

Editorial: "You Talkin' To Me?", Katina Michael

Professor Katina Michael

Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …


Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador Dec 2011

Ontologies Of The Future And Interfaces For All: Archaeological Databases For The 21st Century, Angela Labrador

Angela M Labrador

Archaeological database management systems serve the basic and important functions of ordering, archiving, and disseminating archaeological data. The increased availability of computers and data storage over the past two decades has enabled the exponential growth of archaeological databases and data models. Despite their importance and ubiquity, archaeological database systems are rarely the subject of theoretical analysis within the discipline due to their ‘‘black box’’ nature and the perceived objectivity of computerized systems. Inspired by H. Martin Wobst’s meditations on materiality and disciplinary ethics, in this paper I explore how archaeological database systems structure archaeological interpretation and disciplinary practice. In turn, …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

Professor Katina Michael

No abstract provided.


Computers And Networks, Lisa Zilinski Dec 2010

Computers And Networks, Lisa Zilinski

Lisa Zilinski

Understanding how computers work requires knowledge of the physical structures and capabilities of the hardware, as well as how these capabilities are organized and controlled through software. Effective computer management also requires the ability to understand and support users' activities while at the same time anticipating potential threats to the system. Computing and communication technologies continue to evolve, which means that the system manager must also find ways to keep up with advances that improve the capability, reliability, and accessibility of these important tools for information management.


A Framework For Computational Thinking Across The Curriculum, Ljubomir Perkovi´C, Amber Settle, Sungsoon Hwang, Joshua Jones Jun 2010

A Framework For Computational Thinking Across The Curriculum, Ljubomir Perkovi´C, Amber Settle, Sungsoon Hwang, Joshua Jones

Sungsoon Hwang

We describe a framework for implementing computational thinking in a broad variety of general education courses. The framework is designed to be used by faculty without formal training in information technology in order to understand and integrate computational thinking into their own general education courses. The framework includes examples of computational thinking in a variety of general education courses, as well as sample in-class activities, assignments, and other assessments for the courses. The examples in the different courses are related and differentiated using categories taken from Denning Great Principles of Computing, so that similar types of computational thinking appearing in …


Open & Mobile Equipment, Timothy J. Rowley Sep 2009

Open & Mobile Equipment, Timothy J. Rowley

Timothy J Rowley

This was a "Lightning Presentation" about making cutting edge technology available to university students.


Student Staff: A Village Philosophy, Lisa Caughron Sep 2009

Student Staff: A Village Philosophy, Lisa Caughron

Lisa Caughron

No abstract provided.


Bayesian Density Forecasting Of Intraday Electricity Prices Using Multivariate Skew T Distributions, Anastasios Panagiotelis, Michael Smith Dec 2007

Bayesian Density Forecasting Of Intraday Electricity Prices Using Multivariate Skew T Distributions, Anastasios Panagiotelis, Michael Smith

Michael Stanley Smith

Electricity spot prices exhibit strong time series properties, including substantial periodicity, both inter-day and intraday serial correlation, heavy tails and skewness. In this paper we capture these characteristics using a first order vector autoregressive model with exogenous effects and a skew t distributed disturbance. The vector is longitudinal, in that it comprises observations on the spot price at intervals during a day. A band two inverse scale matrix is employed for the disturbance, as well as a sparse autoregressive coefficient matrix. This corresponds to a parsimonious dependency structure that directly relates an observation to the two immediately prior, and the …


Relationships Between Computer Skills And Technostress Levels: How Does This Affect Me?, Sonya Shepherd May 2004

Relationships Between Computer Skills And Technostress Levels: How Does This Affect Me?, Sonya Shepherd

Sonya S. Gaither

No abstract provided.


Mysql & Php For Data Librarians Workshop, Christopher Hoebeke, Patrick Yott Feb 2002

Mysql & Php For Data Librarians Workshop, Christopher Hoebeke, Patrick Yott

Christopher H Hoebeke

No abstract provided.


An Fmri Study Of Bilingual Sentence Comprehension And Workload, Mihoko Hasegawa, Patricia A. Carpenter, Marcel Adam Just Dec 2001

An Fmri Study Of Bilingual Sentence Comprehension And Workload, Mihoko Hasegawa, Patricia A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


The Neural Bases Of Sentence Comprehension: A Fmri Examination Of Syntactic And Lexical Processing, Timothy A. Keller, Patricia A. Carpenter, Marcel Adam Just Dec 2000

The Neural Bases Of Sentence Comprehension: A Fmri Examination Of Syntactic And Lexical Processing, Timothy A. Keller, Patricia A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


Perl For Librarians (Workshop On The Practical Extraction And Reporting Language), Patrick Yott, Christopher Hoebeke Feb 2000

Perl For Librarians (Workshop On The Practical Extraction And Reporting Language), Patrick Yott, Christopher Hoebeke

Christopher H Hoebeke

No abstract provided.


Collaborative Activity Between Parietal And Dorso-Lateral Prefrontal Cortex In Dynamic Spatial Working Memory Revealed By Fmri, Vaibhav A. Diwadkar, Patricia A. Carpenter, Marcel Adam Just Dec 1999

Collaborative Activity Between Parietal And Dorso-Lateral Prefrontal Cortex In Dynamic Spatial Working Memory Revealed By Fmri, Vaibhav A. Diwadkar, Patricia A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


The Neural Basis Of Strategy And Skill In Sentence-Picture Verification, Erik D. Reichle, Patricia A. A. Carpenter, Marcel Adam Just Dec 1999

The Neural Basis Of Strategy And Skill In Sentence-Picture Verification, Erik D. Reichle, Patricia A. A. Carpenter, Marcel Adam Just

Marcel Adam Just

No abstract provided.


Windows 3.X Vs. Windows 95: Get Your Ring-Side Seat, Sonya Shepherd Nov 1997

Windows 3.X Vs. Windows 95: Get Your Ring-Side Seat, Sonya Shepherd

Sonya S. Gaither

No abstract provided.