Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 90

Full-Text Articles in Science and Technology Studies

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


User Taglines: Alternative Presentations Of Expertise And Interest In Social Media, Hemant Purohit, Alex Dow, Omar Alonso, Lei Duan, Kevin Haas Dec 2012

User Taglines: Alternative Presentations Of Expertise And Interest In Social Media, Hemant Purohit, Alex Dow, Omar Alonso, Lei Duan, Kevin Haas

Kno.e.sis Publications

Web applications are increasingly showing recommended users from social media along with some descriptions, an attempt to show relevancy - why they are being shown. For example, Twitter search for a topical keyword shows expert twitterers on the side for 'whom to follow'. Google+ and Facebook also recommend users to follow or add to friend circle. Popular Internet newspaper- The Huffington Post shows Twitter influencers/ experts on the side of an article for authoritative relevant tweets. The state of the art shows user profile bios as summary for Twitter experts, but it has issues with length constraint imposed by user …


Are Twitter Users Equal In Predicting Elections? A Study Of User Groups In Predicting 2012 U.S. Republican Primaries, Lu Chen, Wenbo Wang, Amit P. Sheth Dec 2012

Are Twitter Users Equal In Predicting Elections? A Study Of User Groups In Predicting 2012 U.S. Republican Primaries, Lu Chen, Wenbo Wang, Amit P. Sheth

Kno.e.sis Publications

Existing studies on predicting election results are under the assumption that all the users should be treated equally. However, recent work [14] shows that social media users from different groups (e.g., “silent majority” vs. “vocal minority”) have significant differences in the generated content and tweeting behavior. The effect of these differences on predicting election results has not been exploited yet. In this paper, we study the spectrum of Twitter users who participate in the on-line discussion of 2012 U.S. Republican Presidential Primaries, and examine the predictive power of different user groups (e.g., highly engaged users vs. lowly engaged users, right-leaning …


The Ssn Ontology Of The W3c Semantic Sensor Network Incubator Group, Michael Compton, Payam Barnaghi, Luis Bermudez, Raul Garcia-Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth, Cory Andrew Henson, Arthur Herzog, Vincent Huang, Krzysztof Janowicz, W. David Kelsey, Danh Le Phuoc, Laurent Lefort, Myriam Leggieri, Holger Neuhaus, Andriy Nikolov, Kevin Page, Alexandre Passant, Amit P. Sheth, Kerry Taylor Dec 2012

The Ssn Ontology Of The W3c Semantic Sensor Network Incubator Group, Michael Compton, Payam Barnaghi, Luis Bermudez, Raul Garcia-Castro, Oscar Corcho, Simon Cox, John Graybeal, Manfred Hauswirth, Cory Andrew Henson, Arthur Herzog, Vincent Huang, Krzysztof Janowicz, W. David Kelsey, Danh Le Phuoc, Laurent Lefort, Myriam Leggieri, Holger Neuhaus, Andriy Nikolov, Kevin Page, Alexandre Passant, Amit P. Sheth, Kerry Taylor

Kno.e.sis Publications

The W3C Semantic Sensor Network Incubator group (the SSN-XG) produced an OWL 2 ontology to describe sensors and observations — the SSN ontology, available at http://purl.oclc.org/NET/ssnx/ssn. The SSN ontology can describe sensors in terms of capabilities, measurement processes, observations and deployments. This article describes the SSN ontology. It further gives an example and describes the use of the ontology in recent research projects.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Demonstration: Dynamic Sensor Registration And Semantic Processing For Ad-Hoc Mobile Environments (Semmob), Pramod Anantharam, Gary Alan Smith, Josh Pschorr, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2012

Demonstration: Dynamic Sensor Registration And Semantic Processing For Ad-Hoc Mobile Environments (Semmob), Pramod Anantharam, Gary Alan Smith, Josh Pschorr, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

SemMOB enables dynamic registration of sensors via mobile devices, search, and near real-time inference over sensor observations in ad-hoc mobile environments (e.g., fire fighting). We demonstrate SemMOB in the context of an emergency response use case that requires automatic and dynamic registrations of sensor devices and annotation of sensor observations, decoding of latitude-longitude information in terms of human sensible names, fusion and abstraction of sensor values using background knowledge, and their visualization using mash-up.


Using Social Influence To Predict Subscriber Churn, Derek Doran, Veena Mendiratta, Chitra Phadke, Dan Kushnir, Huseyin Uzunalioglu Nov 2012

Using Social Influence To Predict Subscriber Churn, Derek Doran, Veena Mendiratta, Chitra Phadke, Dan Kushnir, Huseyin Uzunalioglu

Kno.e.sis Publications

The saturation of mobile phone markets has resulted in rising costs for operators to obtain new customers. These operators thus focus their energies on identifying users that will churn so they can be targeted for retention campaigns. Typical churn prediction algorithms identify churners based on service usage metrics, network performance indicators, and demographic information. Social and peer-influence to churn, however, is usually not considered. In this paper, we describe a new churn prediction algorithm that incorporates the influence churners spread to their social peers. Using data from a major service provider, we show that social influence improves churn prediction and …


Understanding User Triads On Facebook, Derek Doran, Alberta De La Rosa Algarin, Swapna S. Gokhale Nov 2012

Understanding User Triads On Facebook, Derek Doran, Alberta De La Rosa Algarin, Swapna S. Gokhale

Kno.e.sis Publications

Contemporary approaches that analyze user behavior on online social networks only consider interactions among dyads, which are pairs of directly connected users. A large body of sociological work, however, suggests that mutual connections among users can influence their activities, leading to differences between two- and three-way interactions. This paper explores the dynamics of triads among Facebook users based on the wall posts from the New Orleans regional network. Initially, each connection is categorized as a close friendship or an acquiantance, contingent on the number of wall posts exchanged. Subsequently, the impact of different types of connections comprising triads is examined …


How I Would Like Semantic Web To Be, For My Children., Raghava Mutharaju Nov 2012

How I Would Like Semantic Web To Be, For My Children., Raghava Mutharaju

Kno.e.sis Publications

Semantic Web, since its inception, has gone through lot of developments in its relatively nascent existence; right from people's perception, to the standards and to its adoption by the industry and more importantly by the scientific community. This impressive growth only seems to increase. In this paper, we project this growth to the next 10 years and highlight some of the facets on which Semantic Web could have a major impact on. We also present the challenges that Semantic Web and its community has to deal with in order to get there.


An Efficient Bit Vector Approach To Semantics-Based Machine Perception In Resource-Constrained Devices, Cory Andrew Henson, Krishnaprasad Thirunarayan, Amit P. Sheth Nov 2012

An Efficient Bit Vector Approach To Semantics-Based Machine Perception In Resource-Constrained Devices, Cory Andrew Henson, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

The primary challenge of machine perception is to define efficient computational methods to derive high-level knowledge from low-level sensor observation data. Emerging solutions are using ontologies for expressive representation of concepts in the domain of sensing and perception, which enable advanced integration and interpretation of heterogeneous sensor data. The computational complexity of OWL, however, seriously limits its applicability and use within resource-constrained environments, such as mobile devices. To overcome this issue, we employ OWL to formally define the inference tasks needed for machine perception – explanation and discrimination – and then provide efficient algorithms for these tasks, using bit-vector encodings …


Iexplore: Interactive Browsing And Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Jagannathan Srinivasan, Todd Minning, Thomas Rindflesch, Bastien Rance, Ramakanth Kavuluru, Himi Yalamanchili, Krishnaprasad Thirunarayan, Satya S. Sahoo, Amit P. Sheth Nov 2012

Iexplore: Interactive Browsing And Exploring Biomedical Knowledge, Vinh Nguyen, Olivier Bodenreider, Jagannathan Srinivasan, Todd Minning, Thomas Rindflesch, Bastien Rance, Ramakanth Kavuluru, Himi Yalamanchili, Krishnaprasad Thirunarayan, Satya S. Sahoo, Amit P. Sheth

Kno.e.sis Publications

We present iExplore, a Semantic Web based application that helps biomedical researchers study and explore biomedical knowledge interactively. iExplore uses the Biomedical Knowledge Repository (BKR), which integrates knowledge from various sources ranging from information extracted from biomedical literature (from PubMed) to many structured vocabularies in the Unified Medical Language System (UMLS). The current version of BKR provides a unified provenance representation for 12 million semantic predications (triples with a predicate connecting a subject and an object) derived from 87 vocabulary families in the UMLS and 14 million predications extracted from 21 million PubMed abstracts. To engage the domain experts in …


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Apps And Apple Devices: Productive Icloud Uses, Cyrus Ford Zarganj Oct 2012

Apps And Apple Devices: Productive Icloud Uses, Cyrus Ford Zarganj

Library Faculty Presentations

This program introduces useful apps for librarians who have two or more Apple devices such as an iPhone, iPad, or MacBook. You can learn how to use the iCloud, sync devices together, and about other useful apps for librarians to work on their projects from different places with different Apple devices without carrying files.


Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen Oct 2012

Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen

Kno.e.sis Publications

This paper presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.


Computing Perception From Sensor Data, Payam Barnaghi, Frieder Ganz, Cory Andrew Henson, Amit P. Sheth Oct 2012

Computing Perception From Sensor Data, Payam Barnaghi, Frieder Ganz, Cory Andrew Henson, Amit P. Sheth

Kno.e.sis Publications

This paper describes a framework for perception creation from sensor data. We propose using data abstraction techniques, in particular Symbolic Aggregate Approximation (SAX), to analyse and create patterns from sensor data. The created patterns are then linked to semantic descriptions that define thematic, spatial and temporal features, providing highly granular abstract representation of the raw sensor data. This helps to reduce the size of the data that needs to be communicated from the sensor nodes to the gateways or highlevel processing components. We then discuss a method that uses abstract patterns created by SAX method and occurrences of different observations …


Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang Sep 2012

Recent Advances In Integrating Owl And Rules, Matthias Knorr, David Carral Martinez, Pascal Hitzler, Adila A. Krisnadhi, Frederick Maier, Cong Wang

Computer Science and Engineering Faculty Publications

As part of the quest for a unifying logic for the Semantic Web Technology Stack, a central issue is finding suitable ways of integrating description logics based on the Web Ontology Language (OWL) with rule-based approaches based on logic programming. Such integration is difficult since naive approaches typically result in the violation of one or more desirable design principles. For example, while both OWL 2 DL and RIF Core (a dialect of the Rule Interchange Format RIF) are decidable, their naive union is not, unless carefully chosen syntactic restrictions are applied.

We report on recent advances and ongoing work by …


A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler Sep 2012

A Tableau Algorithm For Description Logics With Nominal Schema, Adila Krisnadhi, Pascal Hitzler

Computer Science and Engineering Faculty Publications

We present a tableau algorithm for the description logic ALCOV. This description logic is obtained by extending the description logic ALCO with the expressive nominal schema construct that enables DL-safe datalog with predicates of arbitrary arity to be covered within the description logic framework. The tableau algorithm provides a basis to implement a delayed grounding strategy which was not facilitated by earlier versions of decision procedures for satisfiability in expressive description logics with nominal schemas.


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


Reconciling Owl And Non-Monotonic Rules For The Semantic Web, Matthias Knorr, Pascal Hitzler, Frederick Maier Aug 2012

Reconciling Owl And Non-Monotonic Rules For The Semantic Web, Matthias Knorr, Pascal Hitzler, Frederick Maier

Computer Science and Engineering Faculty Publications

We propose a description logic extending SROIQ (the description logic underlying OWL 2 DL) and at the same time encompassing some of the most prominent monotonic and nonmonotonic rule languages, in particular Datalog extended with the answer set semantics. Our proposal could be considered a substantial contribution towards fulfilling the quest for a unifying logic for the Semantic Web. As a case in point, two non-monotonic extensions of description logics considered to be of distinct expressiveness until now are covered in our proposal. In contrast to earlier such proposals, our language has the 'look and feel' of a description logic …


Using Attribute Behavior Diversity To Build Accurate Decision Tree Committees For Microarray Data, Qian Han, Guozhu Dong Aug 2012

Using Attribute Behavior Diversity To Build Accurate Decision Tree Committees For Microarray Data, Qian Han, Guozhu Dong

Kno.e.sis Publications

DNA microarrays (gene chips), frequently used in biological and medical studies, measure the expressions of thousands of genes per sample. Using microarray data to build accurate classifiers for diseases is an important task. This paper introduces an algorithm, called Committee of Decision Trees by Attribute Behavior Diversity (CABD), to build highly accurate ensembles of decision trees for such data. Since a committee's accuracy is greatly influenced by the diversity among its member classifiers, CABD uses two new ideas to "optimize" that diversity, namely (1) the concept of attribute behavior–based similarity between attributes, and (2) …


Hydrologic Modeling To Examine Land Use Change Impacts (1970’S And 2005) On The Sediment Yield And Flow Regime In Cayuga Creek, Niagara County, New York, Kimly Reth Aug 2012

Hydrologic Modeling To Examine Land Use Change Impacts (1970’S And 2005) On The Sediment Yield And Flow Regime In Cayuga Creek, Niagara County, New York, Kimly Reth

Multidisciplinary Studies Theses

This research aims to assess the water quality and the land use change impacts on sediment concentration and flow regime in Cayuga Creek, Niagara County, NY for two land use periods, 1970’s and 2005. The 1970’s land use, classified by the USGS, had a significant error. Therefore, the scenario of sediment yield and discharge level to land use change is more of a “what if” since the 1970’s land use was classified incorrectly. The Soil and Water Assessment Tool (SWAT)was used to simulate flows and sediment concentrations for the two land use scenarios using the same rainfall data at the …


Twitris+: Social Media Analytics Platform For Effective Coordination, Gary Alan Smith, Amit P. Sheth, Ashutosh Sopan Jadhav, Hemant Purohit, Lu Chen, Michael Cooney, Pavan Kapanipathi, Pramod Anantharam, Pramod Koneru, Wenbo Wang Jul 2012

Twitris+: Social Media Analytics Platform For Effective Coordination, Gary Alan Smith, Amit P. Sheth, Ashutosh Sopan Jadhav, Hemant Purohit, Lu Chen, Michael Cooney, Pavan Kapanipathi, Pramod Anantharam, Pramod Koneru, Wenbo Wang

Kno.e.sis Publications

Twitris+ is a Semantic Social Media analytics platform to provide technologies for analyzing large-scale social media streams across Spatio-Temporal-Thematic (STT) and People-Content-Network (PCN) dimensions. It provides holistic situational awareness from one interface and enables organizational actors to engage in well-coordinated ways for desired tasks during emergency response.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Latent Maximum Entropy Principle, Shaojun Wang, Dale Schuurmans, Yunxin Zhao Jul 2012

The Latent Maximum Entropy Principle, Shaojun Wang, Dale Schuurmans, Yunxin Zhao

Kno.e.sis Publications

We present an extension to Jaynes’ maximum entropy principle that incorporates latent variables. The principle of latent maximum entropy we propose is different from both Jaynes’ maximum entropy principle and maximum likelihood estimation, but can yield better estimates in the presence of hidden variables and limited training data. We first show that solving for a latent maximum entropy model poses a hard nonlinear constrained optimization problem in general. However, we then show that feasible solutions to this problem can be obtained efficiently for the special case of log-linear models---which forms the basis for an efficient approximation to the latent maximum …


Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, William L. Romine, Tanvi Banerjee, William S. Barrow, William R. Folk Jul 2012

Exploring The Impact Of Knowledge And Social Environment On Influenza Prevention And Transmission In Midwestern United States High School Students, William L. Romine, Tanvi Banerjee, William S. Barrow, William R. Folk

Kno.e.sis Publications

We used data from a convenience sample of 410 Midwestern United States students from six secondary schools to develop parsimonious models for explaining and predicting precautions and illness related to influenza. Scores for knowledge and perceptions were obtained using two-parameter Item Response Theory (IRT) models. Relationships between outcome variables and predictors were verified using Pearson and Spearman correlations, and nested [student within school] fixed effects multinomial logistic regression models were specified from these using Akaike’s Information Criterion (AIC). Neural network models were then formulated as classifiers using 10-fold cross validation to predict precautions and illness. Perceived barriers against taking precautions …


What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, Hemant Purohit, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach Jul 2012

What Kind Of #Communication Is Twitter? A Psycholinguistic Perspective On Communication In Twitter For The Purpose Of Emergency Coordination, Hemant Purohit, Andrew Hampton, Valerie L. Shalin, Amit P. Sheth, John Flach

Kno.e.sis Publications

The present research aims to detect coordinated citizen response within social media traffic to assist emergency response. We use domain-independent linguistic properties as the first step in narrowing the candidate set of messages for domain-dependent and computationally intensive analysis.