Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media

2019

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Electronic Field Trips For Science Engagement: The Streaming Science Model, Jamie Loizzo, Mary J. Harner, Deborah J. Weitzenkamp, Kevin Kent Nov 2019

Electronic Field Trips For Science Engagement: The Streaming Science Model, Jamie Loizzo, Mary J. Harner, Deborah J. Weitzenkamp, Kevin Kent

Journal of Applied Communications

While institutions of higher education work to engage PK-12 youth in STEM (science, technology, engineering, and mathematics) concepts and careers via in-person programming, PK-12 teachers and students face many logistical and access constraints for physically traveling to sites off of school grounds during the school day. Throughout the years, electronic field trips (EFTs) have offered a digital way for schools to engage in meaningful ways with museums, parks, laboratories, and field research sites. In order for EFTs to be effective, they should be cost effective and created collaboratively with teachers, students, subject matter experts, and instructional design and communication professionals. …


Digital Addiction: A Conceptual Overview, Amarjit Kumar Singh, Pawan Kumar Singh Oct 2019

Digital Addiction: A Conceptual Overview, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Abstract

Digital addiction referred to an impulse control disorder that involves the obsessive use of digital devices, digital technologies, and digital platforms, i.e. internet, video game, online platforms, mobile devices, digital gadgets, and social network platform. It is an emerging domain of Cyberpsychology (Singh, Amarjit Kumar and Pawan Kumar Singh; 2019), which explore a problematic usage of digital media, device, and platforms by being obsessive and excessive. This article analyses, reviewed the current research, and established a conceptual overview on the digital addiction. The research literature on digital addiction has proliferated. However, we tried to categories the digital addiction, according …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Anticipating Widespread Augmented Reality: Insights From The 2018 Ar Visioning Workshop, Gregory F. Welch, Gerd Bruder, Peter Squire, Ryan Schubert Aug 2019

Anticipating Widespread Augmented Reality: Insights From The 2018 Ar Visioning Workshop, Gregory F. Welch, Gerd Bruder, Peter Squire, Ryan Schubert

Faculty Scholarship and Creative Works

In August of 2018 a group of academic, government, and industry experts in the field of Augmented Reality gathered for four days to consider potential technological and societal issues and opportunities that could accompany a future where AR is pervasive in location and duration of use. This report is intended to summarize some of the most novel and potentially impactful insights and opportunities identified by the group.

Our target audience includes AR researchers, government leaders, and thought leaders in general. It is our intent to share some compelling technological and societal questions that we believe are unique to AR, and …


Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth Jul 2019

Iamhappy: Towards An Iot Knowledge-Based Cross-Domain Well-Being Recommendation System For Everyday Happiness, Amelia Gyrard, Amit Sheth

Kno.e.sis Publications

Nowadays, healthy lifestyle, fitness, and diet habits have become central applications in our daily life. Positive psychology such as well-being and happiness is the ultimate dream of everyday people’s feelings (even without being aware of it). Wearable devices are being increasingly employed to support well-being and fitness. Those devices produce physiological signals that are analyzed by machines to understand emotions and physical state. The Internetof Things (IoT) technology connects (wearable) devices to the Internet to easily access and process data, even using Web technologies (aka Web of Things).

We design IAMHAPPY, an innovative IoT-based well-being recommendation system to encourage every …


The Effectiveness Of Mobile Eye-Tracking To Enhance Guided Show Cave Experiences, Jenna Michele Hammond Jul 2019

The Effectiveness Of Mobile Eye-Tracking To Enhance Guided Show Cave Experiences, Jenna Michele Hammond

Masters Theses & Specialist Projects

Karst terrains are landscapes with a distinctive hydrology and set of landforms that arise from a combination of high bedrock solubility and well-developed secondary (fracture) porosity. Karst areas are easily polluted due to the rapid transport of unfiltered percolating water through the systems. While many individuals are able to identify karst landforms such as sinkholes and caves, an understanding of the interconnectedness of the surface and subsurface in karst landscapes, as well as the vulnerability of karst areas to degradation, is often limited. Show caves, which are caves made accessible to visitation by humans through built infrastructure, can serve as …


”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran Jun 2019

”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran

Engineering and Applied Science Education Faculty Publications

Nowadays we all live in a cyber world and use the internet for emailing, banking, streaming video, shopping, reading news, or other activities. Given all the time people spend online, it is important that all students (regardless of their major) learn some basics about living in a cyber world, e.g., strategies for online safety, impact of artificial intelligence, digital forensics or ancestry.com. To facilitate students from many majors to learn about important issues related to the internet, eight faculty from a variety of disciplines at the University of New Haven integrated the theme of Cyber World into our team-taught, first-year …


What To Do When Privacy Is Gone, James Brusseau May 2019

What To Do When Privacy Is Gone, James Brusseau

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction. It considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The …


Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider May 2019

Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.


The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki May 2019

The Right To Human Intervention: Law, Ethics And Artificial Intelligence, Maria Kanellopoulou - Botti, Fereniki Panagopoulou, Maria Nikita, Anastasia Michailaki

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The paper analyses the new right of human intervention in use of information technology, automatization processes and advanced algorithms in individual decision-making activities. Art. 22 of the new General Data Protection Regulation (GDPR) provides that the data subject has the right not to be subject to a fully automated decision on matters of legal importance to her interests, hence the data subject has a right to human intervention in this kind of decisions.


Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse May 2019

Culture And Code: The Evolution Of Digital Architecture And The Formation Of Networked Publics, Geoffrey Gimse

Theses and Dissertations

Culture and Code traces the construction of the modern idea of the Internet and offers a potential glimpse of how that idea may change in the near future. Developed through a theoretical framework that links Sheila Jasanoff and Sang-Hyun Kim’s theory of the sociotechnical imaginary to broader theories on publics and counterpublics, Culture and Code offers a way to reframe the evolution of Internet technology and its culture as an enmeshed part of larger socio-political shifts within society. In traveling the history of the modern Internet as detailed in its technical documentation, legal documents, user created content, and popular media …


Advanced Statistics In Arkansas Sports Reporting, Andrew Lee Epperson May 2019

Advanced Statistics In Arkansas Sports Reporting, Andrew Lee Epperson

Graduate Theses and Dissertations

This study seeks to analyze how Arkansas’ sports journalists are adapting to the recent surge in available advanced statistics that are being used by certain national news organizations. Using in-depth qualitative research that includes in-depth interviews with a number of individuals in the print, broadcast, and athletics side of sports coverage, we discover how journalists and coaches use these next-generation analytics, what they fundamentally mean for the evolution of each respective path, and why so few Arkansas reporters and writers use them at the time of this paper’s defense. We see how budgets and deadlines restrict the use of these …


Artificial Intelligence, Real Concerns…And Cash, Singapore Management University Apr 2019

Artificial Intelligence, Real Concerns…And Cash, Singapore Management University

Perspectives@SMU

Regulating development of self-aware robots is crucial. Data privacy is key to user-app power dynamic


Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth Feb 2019

Question Answering For Suicide Risk Assessment Using Reddit, Amanuel Alambo, Usha Lokala, Ugur Kursuncu, Krishnaprasad Thirunarayan, Amelia Gyrard, Randon S. Welton, Jyotishman Pathak, Amit P. Sheth

Kno.e.sis Publications

Mental Health America designed ten questionnaires that are used to determine the risk of mental disorders. They are also commonly used by Mental Health Professionals (MHPs) to assess suicidality. Specifically, the Columbia Suicide Severity Rating Scale (C-SSRS), a widely used suicide assessment questionnaire, helps MHPs determine the severity of suicide risk and offer an appropriate treatment. A major challenge in suicide treatment is the social stigma wherein the patient feels reluctance in discussing his/her conditions with an MHP, which leads to inaccurate assessment and treatment of patients. On the other hand, the same patient is comfortable freely discussing his/her mental …


Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard Jan 2019

Examining Shared Understanding And Team Performance In Global Virtual Teams, Alva Bullard

CCE Theses and Dissertations

Modern organizations face many significant challenges because of turbulent environments and a competitive global economy. These competitive demands have forced many organizations to increase levels of flexibility and adaptability through the use of virtual environments, and global teams are prevalent in business organizations. Although significant research has been conducted on virtual teams, the development of shared understanding among the members of these teams has not been studied adequately. Time/space barriers, communication complexities, and team diversity hinder the development of shared understanding in these teams.

Based on the Media Synchronicity Theory (MST), a new theoretical model was created that used the …


A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith Jan 2019

A Comprehensive Cybersecurity Defense Framework For Large Organizations, Willarvis Smith

CCE Theses and Dissertations

There is a growing need to understand and identify overarching organizational requirements for cybersecurity defense in large organizations. Applying proper cybersecurity defense will ensure that the right capabilities are fielded at the right locations to safeguard critical assets while minimizing duplication of effort and taking advantage of efficiencies. Exercising cybersecurity defense without an understanding of comprehensive foundational requirements instills an ad hoc and in many cases conservative approach to network security. Organizations must be synchronized across federal and civil agencies to achieve adequate cybersecurity defense. Understanding what constitutes comprehensive cybersecurity defense will ensure organizations are better protected and more efficient. …


Empathi: An Ontology For Emergency Managing And Planning About Hazard Crisis, Manas Gaur, Kaeedeh Shekarpour, Amelia Gyrard, Amit P. Sheth Jan 2019

Empathi: An Ontology For Emergency Managing And Planning About Hazard Crisis, Manas Gaur, Kaeedeh Shekarpour, Amelia Gyrard, Amit P. Sheth

Kno.e.sis Publications

In the domain of emergency management during hazard crises, having sufficient situational awareness information is critical. It requires capturing and integrating information from sources such as satellite images, local sensors and social media content generated by local people.
A bold obstacle to capturing, representing and integrating such heterogeneous and diverse information is lack of a proper ontology which properly conceptualizes this domain, aggregates and unifies datasets. Thus, in this paper, we introduce empathi ontology which conceptualizes the core concepts describing the domain of emergency managing and planning of hazard crises.
Although empathi has a coarse-grained view, it considers the necessary …


Adaptive Knowledge Networks: A Time Capsule, Swati Padhee, Anurag Illendula, Amit Sheth, Krishnaprasad Thirunarayan, Valerie L. Shalin Jan 2019

Adaptive Knowledge Networks: A Time Capsule, Swati Padhee, Anurag Illendula, Amit Sheth, Krishnaprasad Thirunarayan, Valerie L. Shalin

Kno.e.sis Publications

❖ Real world events are dynamic in nature Periodic events e.g. US Presidential Election Non-periodic events e.g. Cyclone Idai

❖ Need for real-time predictive analysis, trend analysis, spatio-temporal decision making, public opinion analysis for events.

❖ Current state-of-the-art curates dynamic knowledge graph from structured text.

❖ We propose creating an Adaptive Knowledge Network from incoming real-time multimodal spatio-temporally evolving data.


Automatic Identification Of Individual Drugs In Death Certificates, Soon Jye Kho, Amit Sheth, Olivier Bodenreider Jan 2019

Automatic Identification Of Individual Drugs In Death Certificates, Soon Jye Kho, Amit Sheth, Olivier Bodenreider

Kno.e.sis Publications

Background:

Establishing trends of drug overdoses requires the identification of individual drugs in death certificates, not supported by coding with the International Classification of Diseases. However, identifying drug mentions from the literal portion of death certificates remains challenging due to the variability of drug names.

Objectives:

To automatically identify individual drugs in death certificates.

Methods:

We use RxNorm to collect variants for drug names (generic names, synonyms, brand names) and we algorithmically generate common misspellings. We use this automatically compiled list to identify drug mentions from 703,106 death certificates and compare the performance of our automated approach to that of …


Containing The Jeremiad: Understanding Paradigms Of Anxiety In Global Climate Change Experience, Brian Glaser Jan 2019

Containing The Jeremiad: Understanding Paradigms Of Anxiety In Global Climate Change Experience, Brian Glaser

English Faculty Articles and Research

This essay uses Bion’s concept of “containing” to read the psychological dynamics of jeremiads about global climate change, arguing that their structure reveals a strategy of communication that may be useful for more broadly raising awareness about this challenging state of the planet. More specifically, I argue that contemporary global climate change jeremiads have a structure that first elicits alarm and then moves to discuss solutions, and that this structure may be beneficial to those who are awakening to the reality of global climate change by rendering anxiety bearable and therefore open to purposive and creative response.


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …