Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin Feb 2024

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …


U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva Sep 2023

U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva

Computer Science: Faculty Publications and Other Works

Cyberbullying has become a prominent risk for youth and an increasing concern for parents. To help parents reduce their child's cyberbullying risk, anti-bullying apps (ABAs)—mobile applications for identifying and preventing instances of cyberbullying—have been developed in recent years. Given that ABAs are an emerging technology, limited research has been conducted to understand the factors predicting parents' intentions to use them. Drawing on three interdisciplinary theoretical frameworks, a sample of parents in the U.S. recruited through Amazon Mechanical Turk completed an online survey to assess parents' knowledge of, attitudes about, and intentions to use ABAs. Participants also rated the importance of …


Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison Jun 2022

Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB


Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin Feb 2022

Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA …


Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu Jan 2022

Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu

Computer Science: Faculty Publications and Other Works

Increased social media use has contributed to the greater prevalence of abusive, rude, and offensive textual comments. Machine learning models have been developed to detect toxic comments online, yet these models tend to show biases against users with marginalized or minority identities (e.g., females and African Americans). Established research in debiasing toxicity classifiers often (1) takes a static or batch approach, assuming that all information is available and then making a one-time decision; and (2) uses a generic strategy to mitigate different biases (e.g., gender and racial biases) that assumes the biases are independent of one another. However, in real …


A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall Jan 2022

A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall

Computer Science: Faculty Publications and Other Works

As online communication continues to become more prevalent, instances of cyberbullying have also become more common, particularly on social media sites. Previous research in this area has studied cyberbullying outcomes, predictors of cyberbullying victimization/perpetration, and computational detection models that rely on labeled datasets to identify the underlying patterns. However, there is a dearth of work examining the content of what is said when cyberbullying occurs and most of the available datasets include only basic labels (cyberbullying or not). This paper presents an annotated Instagram dataset with detailed labels about key cyberbullying properties, such as the content type, purpose, directionality, and …


Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin Nov 2021

Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cybersecurity experts recommend the adoption of password managers (PMs), as they generate and store strong passwords for all accounts. Prior research has shown that few people adopt PMs. Our research examined PM adoption in a sample of 221 undergraduates from psychology courses and a sample of 278 MTurk workers. We hypothesized that PM adoption could be predicted using a small set of user characteristics (i.e., gender, age, Big Five personality traits, number of devices used, frequency of using social media, and cybersecurity knowledge). The results showed that …


Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin Aug 2021

Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of weak passwords led to major cybersecurity breaches. The present research investigated whether nudging with messages based on participants’ self-schemas could lead them to create stronger passwords. We modeled our study on prior health-related research demonstrating positive results using messages based on self-schema categories (i.e., True Colors categories -compassionate, loyal, intellectual, and adventurous). We carried out an online study, one with 256 (185 women, 66 men, 5 other) undergraduates and one with 424 (240 men, 179 women, 5 other) Amazon Mechanical Turk (MTurk) workers, in …


Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin Jun 2021

Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People often create passwords for their accounts that are insecure. An insecure password is often easy to guess– thus, hackers can easily access their victims’ accounts. It is important for users to know how to create and manage secure passwords so they can better protect themselves from hackers. It is well-known that different users have different personality types, such as Big Five and True Colors. This research examines if there is any link between personality types and password security behavior. Each participant was shown either a matching or mismatching message based on their personality type, and it was measured whether …


Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross Apr 2013

Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross

Computer Science: Faculty Publications and Other Works

This presentation discusses how to address 21st Century employment challenges by dismantling gender-specific barriers to entry. We take an interdisciplinary approach by focusing on areas such as education, public policy, culture, and media (among others).


A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal Jan 2003

A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …