Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (63)
- University of New Haven (10)
- Wright State University (7)
- Edith Cowan University (6)
- City University of New York (CUNY) (4)
-
- Technological University Dublin (4)
- University of Nebraska - Lincoln (4)
- University of Nebraska at Omaha (3)
- University of Texas Rio Grande Valley (3)
- Montclair State University (2)
- Olivet Nazarene University (2)
- University of Pittsburgh School of Law (2)
- Ursinus College (2)
- Virginia Commonwealth University (2)
- Ateneo de Manila University (1)
- Boise State University (1)
- Bryant University (1)
- COBRA (1)
- Cedarville University (1)
- Chapman University (1)
- Eastern Kentucky University (1)
- Georgia State University (1)
- Illinois State University (1)
- Linfield University (1)
- Longwood University (1)
- Smith College (1)
- Syracuse University (1)
- University of Dayton (1)
- University of Pennsylvania Carey Law School (1)
- Western Michigan University (1)
- Keyword
-
- Twitter (12)
- Digital forensics (5)
- Singapore (5)
- Higher education (4)
- Security (4)
-
- Singapore Management University (4)
- Social media (4)
- GIS (3)
- Optimization (3)
- Survey (3)
- Technology (3)
- Algorithm (2)
- Bioinformatics (2)
- Classification (2)
- Commons (2)
- Competencies (2)
- Computer science (2)
- Computer sciences (2)
- Cyber forensics (2)
- Cyberbullying (2)
- Data (2)
- Data mining (2)
- Detection (2)
- Ease of use (2)
- Familiarity (2)
- Feature extraction (2)
- Governance (2)
- Information Fusion (2)
- Information fusion (2)
- Information systems (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (57)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Kno.e.sis Publications (7)
- Australian Information Security Management Conference (4)
- Asian Management Insights (3)
-
- Publications and Research (3)
- SMU Press Releases (3)
- Australian Digital Forensics Conference (2)
- Book Chapters (2)
- Computer Science Summer Fellows (2)
- Conference papers (2)
- Information Systems Faculty Publications and Presentations (2)
- Sprague Library Scholarship and Creative Works (2)
- All Faculty Scholarship (1)
- Books/Book chapters (1)
- COBRA Preprint Series (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Graduate Projects and Theses (1)
- Computer Science: Faculty Publications (1)
- Conference Papers (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Department of Information Systems & Computer Science Faculty Publications (1)
- EBCS Articles (1)
- EKU Faculty and Staff Scholarship (1)
- Eileen Hebets Publications (1)
- Faculty & Staff Publications (1)
- Faculty Scholarship – Library Science (1)
- Faculty and Staff Publications – Milner Library (1)
- Honors Projects in Mathematics (1)
- Incite: The Journal of Undergraduate Scholarship (1)
- File Type
Articles 1 - 30 of 132
Full-Text Articles in Social and Behavioral Sciences
Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford
Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford
Student Scholarship – Computer Science
With the current movement to increase the number of women in STEM-related careers, modified IT hiring practices may be considered debatably unethical. Studies cited in this work have asserted that female representation in STEM fields is integral not only to encouraging continued progression toward gender equality in the workplace but also to creating more inclusive products. In turn, some argue that when faced with reasonably comparable female and male candidates, a hiring manager should select the female candidate in order to increase the female representation in the company and provide a female perspective. However, it is simultaneously debatably unethical and …
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Kno.e.sis Publications
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …
Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran
Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran
Research Collection School Of Computing and Information Systems
Effective management of land-side transportation provides the competitive advantage to port terminal operators in improving services and efficient use of limited space in an urban port. We present a hybrid simulation model that combines traffic-flow modeling and discrete-event simulation for land-side port planning and evaluation of traffic conditions for a number of what-if scenarios. We design our model based on a real-world case of a bulk cargo port. The problem is interesting due to complexity of heterogeneous closed-looped internal vehicles and external vehicles traveling in spaces with very limited traffic regulation (no traffic lights, no traffic wardens) and the traffic …
Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen
Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen
Research Collection School Of Computing and Information Systems
Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …
‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap
‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap
Research Collection School Of Computing and Information Systems
This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
Research Collection School Of Computing and Information Systems
With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …
Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan
Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan
Research Collection School Of Computing and Information Systems
Today, more and more Internet users are willing to share their feeling, activities, and even their intention about what they plan to do on online social media. We can easily see posts like "I plan to buy an apartment this year", or "We are looking for a tour for 3 people to Nha Trang" on online forums or social networks. Recognizing those user intents on online social media is really useful for targeted advertising. However fully understanding user intents is a complicated and challenging process which includes three major stages: user intent filtering, intent domain identification, and intent parsing and …
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Research Collection School Of Computing and Information Systems
Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …
Towards A Computational Model Of Frame Of Reference Alignment In Swedish Dialogue, Simon Dobnik, Christine Howes, Kim Demaret, John D. Kelleher
Towards A Computational Model Of Frame Of Reference Alignment In Swedish Dialogue, Simon Dobnik, Christine Howes, Kim Demaret, John D. Kelleher
Conference papers
In this paper we examine how people negotiate, interpret and repair the frame of reference (FoR) in online text based dialogues discussing spatial scenes in Swedish. We describe work-in-progress in which participants are given different perspectives of the same scene and asked to locate several objects that are only shown on one of their pictures. This task requires participants to coordinate on FoR in order to identify the missing objects. This study has implications for situated dialogue systems.
Executive Summary: Western Libraries Beta Website Usability, Rebecca M. Marrall, Nora K. Burmeister, Jon Dillon
Executive Summary: Western Libraries Beta Website Usability, Rebecca M. Marrall, Nora K. Burmeister, Jon Dillon
Usability & Design Working Group Documents
This brief report provides an overview of the Fall Quarter 2016 usability sessions on the Western Libraries beta website. The purpose of this report is to inform Libraries and Learning Commons personnel of our next steps with the beta website. There were 36 participants over the course of five two hour sessions.
Landmark Reranking For Smart Travel Guide Systems By Combining And Analyzing Diverse Media, Junge Shen, Jialie Shen, Tao Mei, Xinbo Gao
Landmark Reranking For Smart Travel Guide Systems By Combining And Analyzing Diverse Media, Junge Shen, Jialie Shen, Tao Mei, Xinbo Gao
Research Collection School Of Computing and Information Systems
Advanced networking technologies and massive online social media have stimulated a booming growth of travel heterogeneous information in recent years. By employing such information, smart travel guide systems, such as landmark ranking systems, have been proposed to offer diverse online travel services. It is essential for a landmark ranking system to structure, analyze, and search the travel heterogeneous information to produce human-expected results. Therefore, currently the most fundamental yet challenging problems can be concluded: 1) how to fuse heterogeneous tourism information and 2) how to model landmark ranking. In this paper, a novel landmark search system is introduced based on …
Media Reinvented, Geoff Tan
Media Reinvented, Geoff Tan
Asian Management Insights
The brave new world of digital media.
Asean's Digital Economy, Naveen Menon
Asean's Digital Economy, Naveen Menon
Asian Management Insights
Transforming industries, enriching lives and propelling progress.
Connecting India, Sam Pitroda
Connecting India, Sam Pitroda
Asian Management Insights
Great inventions will not be born in the absence of the will and intent to embrace change and solve wideranging societal problems.
On Profiling Bots In Social Media, Richard J. Oentaryo, Arinto Murdopo, Philips K. Prasetyo, Ee Peng Lim
On Profiling Bots In Social Media, Richard J. Oentaryo, Arinto Murdopo, Philips K. Prasetyo, Ee Peng Lim
Research Collection School Of Computing and Information Systems
The popularity of social media platforms such as Twitter has led to the proliferation of automated bots, creating both opportunities and challenges in information dissemination, user engagements, and quality of services. Past works on profiling bots had been focused largely on malicious bots, with the assumption that these bots should be removed. In this work, however, we find many bots that are benign, and propose a new, broader categorization of bots based on their behaviors. This includes broadcast, consumption, and spam bots. To facilitate comprehensive analyses of bots and how they compare to human accounts, we develop a systematic profiling …
Spiteful, One-Off, And Kind: Predicting Customer Feedback Behavior On Twitter, Agus Sulistya, Abhishek Sharma, David Lo
Spiteful, One-Off, And Kind: Predicting Customer Feedback Behavior On Twitter, Agus Sulistya, Abhishek Sharma, David Lo
Research Collection School Of Computing and Information Systems
Social media provides a convenient way for customers to express their feedback to companies. Identifying different types of customers based on their feedback behavior can help companies to maintain their customers. In this paper, we use a machine learning approach to predict a customer’s feedback behavior based on her first feedback tweet. First, we identify a few categories of customers based on their feedback frequency and the sentiment of the feedback. We identify three main categories: spiteful, one-off, and kind. Next, we build a model to predict the category of a customer given her first feedback. We use profile and …
Grab Taxi: Navigating New Frontiers, Mei Lin, Christopher Dula
Grab Taxi: Navigating New Frontiers, Mei Lin, Christopher Dula
Research Collection School Of Computing and Information Systems
In mid-2016, Anthony Tan, the CEO of Grab, an on-demand transportation-app company serving Southeast Asia, was locked in a high stakes struggle to win the hearts and minds of drivers, passengers and regulators alike. Valued at an estimated US$1.5 billion, Grab (known among consumers as ‘GrabTaxi’) had become one of Asia’s most successful start-ups.
Github: An Introduction, Craig A. Boman
Github: An Introduction, Craig A. Boman
Roesch Library Staff Presentations
Tech startups have been using version control software to maximize their collaborative technology projects since their inception, but what more can librarians do to leverage this suite of tools? In this presentation, we will briefly describe how version control apps like Github may drastically improve technology collaborations in your library, specifically ILS web refreshes. After the Github introduction, those who participated in the pre-conference "hackathon" session will discuss their projects and talk about the successes and challenges they encountered.
A Pilot Study Of Comparison Gesture Analysis In Motion Driven Video Games, Fabrizio Valerio Covone, Brian Vaughan, Charlie Cullen
A Pilot Study Of Comparison Gesture Analysis In Motion Driven Video Games, Fabrizio Valerio Covone, Brian Vaughan, Charlie Cullen
Conference Papers
This study investigates whether there are significant differences in the gestures made by gamers and non-gamers whilst playing commercial games that employ gesture inputs. Specifically, the study focuses on testing a prototype of multimodal capture tool that we used to obtain real-time audio, video and skeletal gesture data. Additionally, we developed an experimental design framework for the acquisition of spatio-temporal gesture data and analysed the vector magnitude of a gesture to compare the relative displacement of each participant whilst playing a game.
Smu Enhances Curriculum And Expands Offering To Prepare Undergraduates For The Digital Age, Singapore Management University
Smu Enhances Curriculum And Expands Offering To Prepare Undergraduates For The Digital Age, Singapore Management University
SMU Press Releases
Demand for infocomm professionals in Singapore is outpacing supply with 30,000 new infocomm jobs expected by 2020. The Infocomm Media 2025 masterplan has identified salient trends that are significant for the next decade, these include Big Data & Analytics, Internet of Things and Cybersecurity. The masterplan also highlighted future key infocomm job areas: Software Development, Cybersecurity, Data Analytics, and Network Infrastructure. In response to these industry trends and demand, SMU has strengthened its undergraduate curriculum in three schools to contribute to the 'future-proofing' of Singapore. The School of Information Systems (SIS) has revised its undergraduate curriculum in response to changes …
Achieving Economic And Environmental Sustainabilities In Urban Consolidation Center With Bicriteria Auction, Stephanus Daniel Handoko, Hoong Chuin Lau, Shih-Fen Cheng
Achieving Economic And Environmental Sustainabilities In Urban Consolidation Center With Bicriteria Auction, Stephanus Daniel Handoko, Hoong Chuin Lau, Shih-Fen Cheng
Research Collection School Of Computing and Information Systems
Consolidation lies at the heart of the last-mile logistics problem. Urban consolidation centers (UCCs) have been set up to facilitate such consolidation all over the world. To the best of our knowledge, most-if not all-of the UCCs operate on volume-based fixed-rate charges. To achieve environmental sustainability while ensuring economic sustainability in urban logistics, we propose, in this paper, a bicriteria auction mechanism for the automated assignment of last-mile delivery orders to transport resources. We formulate and solve the winner determination problem of the auction as a biobjective programming model. We then present a systematic way to generate the Pareto frontier …
Tracking Virality And Susceptibility In Social Media, Tuan Anh Hoang, Ee-Peng Lim
Tracking Virality And Susceptibility In Social Media, Tuan Anh Hoang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
In social media, the magnitude of information propagation hinges on the virality and susceptibility of users spreading and receiving the information respectively, as well as the virality of information items. These users' and items' behavioral factors evolve dynamically at the same time interacting with one another. Previous works however measure the factors statically and independently in a restricted case: each user has only a single adoption on each item, and/or users' exposure to items are observable. In this work, we investigate the inter-relationship among the factors and users' multiple adoptions on items to propose both new static and temporal models …
Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan
Managing A Large Scale Project: Using Strengthsfinder In The Website Redesign, Laura Edwards, Cristina Tofan
EKU Faculty and Staff Scholarship
After doing a library-wide StrengthsFinder assessment that highlighted the strengths of its individuals, EKU Libraries decided to put this strategy into practice by applying it to one of the most complex projects in the life of an academic library: the website redesign. This decentralized approach allowed project managers to align strengths-based teams with phases of the redesign that would most benefit from that team’s unique strengths.
Data Visualizations And Infographics, Darren Sweeper
Data Visualizations And Infographics, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Open Materials Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Valerie L. Bartelt, Murad Moqbel
Open Materials Discourse: Consumer Acceptance Of Personal Cloud: Integrating Trust And Risk With The Technology Acceptance Model, Valerie L. Bartelt, Murad Moqbel
Information Systems Faculty Publications and Presentations
This paper provides the materials used to collect survey data for the conceptual replication of Pavlou (2003) by Moqbel and Bartelt (2015). This replication paper used trust and perceived risk, in addition to the technology acceptance model (TAM) factors of perceived usefulness and perceived ease of use, to determine how consumer’s behavioral intentions affect online transactions (Moqbel & Bartelt, 2015). Two hundred forty participants took part in the 15-minute survey, with the option of choosing either online or paper format. This paper provides additional materials and details on how the survey was conducted. Step-by-step explanations are provided for the design, …
When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi Lan, Mengqi Zhang, Feida Zhu, Jing Jiang, Ee-Peng Lim
When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi Lan, Mengqi Zhang, Feida Zhu, Jing Jiang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Microblogging services such as Twitter and Sina Weibo have been an important, if not indespensible, platform for people around the world to connect to one another. The rich content and user interactions on these platforms reveal insightful information about each user that are valuable for various real-life applications. In particular, user offline relationships, especially those intimate ones such as family members and couples, offer distinctive value for many business and social settings. In this study, we focus on using Sina Weibo to discover intimate offline relationships among users. The problem is uniquely interesting and challenging due to the difficulty in …
High Correlation Of Middle East Respiratory Syndrome Spread With Google Search And Twitter Trends In Korea, Soo-Yong Shin, Dong-Woo Seo, Jisun An, Haewoon Kwak, Sung-Han Kim, Jin Gwack, Min-Woo Jo
High Correlation Of Middle East Respiratory Syndrome Spread With Google Search And Twitter Trends In Korea, Soo-Yong Shin, Dong-Woo Seo, Jisun An, Haewoon Kwak, Sung-Han Kim, Jin Gwack, Min-Woo Jo
Research Collection School Of Computing and Information Systems
The Middle East respiratory syndrome coronavirus (MERS-CoV) was exported to Korea in 2015, resulting in a threat to neighboring nations. We evaluated the possibility of using a digital surveillance system based on web searches and social media data to monitor this MERS outbreak. We collected the number of daily laboratory-confirmed MERS cases and quarantined cases from May 11, 2015 to June 26, 2015 using the Korean government MERS portal. The daily trends observed via Google search and Twitter during the same time period were also ascertained using Google Trends and Topsy. Correlations among the data were then examined using Spearman …
Hackathons For Libraries And Librarians, Robin Camille Davis
Hackathons For Libraries And Librarians, Robin Camille Davis
Publications and Research
Hackathons can be ideal opportunities for libraries and librarians to promote new services and tools. In these social events, attendees form teams and work on a project together within a given time limit. This article explains hackathons, provides a brief history, and details how libraries and librarians can get involved. Similar event structures, like hack days and edit-a-thons, are also considered.
Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang
Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang
Research Collection School Of Computing and Information Systems
Community detection plays an important role in a wide range of research topics for social networks including personalized recommendation services and information dissemination. The highly dynamic nature of social platforms, and accordingly the constant updates to the underlying network, all present a serious challenge for efficient maintenance of the identified communities. How to avoid computing from scratch the whole community detection result in face of every update, which constitutes small changes more often than not. To solve this problem, we propose a novel and efficient algorithm to maintain the communities in dynamic social networks by identifying and updating only those …