Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Personality (4)
- Cybersecurity (3)
- Extraversion (2)
- Introversion (2)
- Password Strength (2)
-
- Personality traits (2)
- Social media (2)
- Statistics (2)
- Anti-bullying tools (1)
- Big data (1)
- Bois Madame (1)
- Child Psychology (1)
- Children (1)
- Citizen science (1)
- Community organizing (1)
- Computer science (1)
- Constitutional Law (1)
- Credibility (1)
- Crown form (1)
- Cyberbullying (1)
- Cyberbullying prevention (1)
- Cybersecurity knowledge (1)
- Democracy (1)
- Displacement (1)
- Elliptical Fourier functions (1)
- Emergency management (1)
- Emoji (1)
- Emojis (1)
- Environmental health (1)
- Environmental justice (1)
- Publication
- File Type
Articles 1 - 19 of 19
Full-Text Articles in Physical Sciences and Mathematics
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …
U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva
U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva
Computer Science: Faculty Publications and Other Works
Cyberbullying has become a prominent risk for youth and an increasing concern for parents. To help parents reduce their child's cyberbullying risk, anti-bullying apps (ABAs)—mobile applications for identifying and preventing instances of cyberbullying—have been developed in recent years. Given that ABAs are an emerging technology, limited research has been conducted to understand the factors predicting parents' intentions to use them. Drawing on three interdisciplinary theoretical frameworks, a sample of parents in the U.S. recruited through Amazon Mechanical Turk completed an online survey to assess parents' knowledge of, attitudes about, and intentions to use ABAs. Participants also rated the importance of …
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
School of Business: Faculty Publications and Other Works
Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …
Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison
Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB
Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin
Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA …
Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu
Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu
Computer Science: Faculty Publications and Other Works
Increased social media use has contributed to the greater prevalence of abusive, rude, and offensive textual comments. Machine learning models have been developed to detect toxic comments online, yet these models tend to show biases against users with marginalized or minority identities (e.g., females and African Americans). Established research in debiasing toxicity classifiers often (1) takes a static or batch approach, assuming that all information is available and then making a one-time decision; and (2) uses a generic strategy to mitigate different biases (e.g., gender and racial biases) that assumes the biases are independent of one another. However, in real …
A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall
A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall
Computer Science: Faculty Publications and Other Works
As online communication continues to become more prevalent, instances of cyberbullying have also become more common, particularly on social media sites. Previous research in this area has studied cyberbullying outcomes, predictors of cyberbullying victimization/perpetration, and computational detection models that rely on labeled datasets to identify the underlying patterns. However, there is a dearth of work examining the content of what is said when cyberbullying occurs and most of the available datasets include only basic labels (cyberbullying or not). This paper presents an annotated Instagram dataset with detailed labels about key cyberbullying properties, such as the content type, purpose, directionality, and …
Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin
Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cybersecurity experts recommend the adoption of password managers (PMs), as they generate and store strong passwords for all accounts. Prior research has shown that few people adopt PMs. Our research examined PM adoption in a sample of 221 undergraduates from psychology courses and a sample of 278 MTurk workers. We hypothesized that PM adoption could be predicted using a small set of user characteristics (i.e., gender, age, Big Five personality traits, number of devices used, frequency of using social media, and cybersecurity knowledge). The results showed that …
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).
If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.
We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.
We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …
Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin
Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of weak passwords led to major cybersecurity breaches. The present research investigated whether nudging with messages based on participants’ self-schemas could lead them to create stronger passwords. We modeled our study on prior health-related research demonstrating positive results using messages based on self-schema categories (i.e., True Colors categories -compassionate, loyal, intellectual, and adventurous). We carried out an online study, one with 256 (185 women, 66 men, 5 other) undergraduates and one with 424 (240 men, 179 women, 5 other) Amazon Mechanical Turk (MTurk) workers, in …
Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin
Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
People often create passwords for their accounts that are insecure. An insecure password is often easy to guess– thus, hackers can easily access their victims’ accounts. It is important for users to know how to create and manage secure passwords so they can better protect themselves from hackers. It is well-known that different users have different personality types, such as Big Five and True Colors. This research examines if there is any link between personality types and password security behavior. Each participant was shown either a matching or mismatching message based on their personality type, and it was measured whether …
Elliptical Fourier Analysis Of Crown Shape In Permanent Mandibular Molars From The Late Neolithic Cave Burials Of Belgium, Frank L'Engle Williams, Juliet K. Brophy, Gregory J. Matthews
Elliptical Fourier Analysis Of Crown Shape In Permanent Mandibular Molars From The Late Neolithic Cave Burials Of Belgium, Frank L'Engle Williams, Juliet K. Brophy, Gregory J. Matthews
Mathematics and Statistics: Faculty Publications and Other Works
Prehistoric remains from caves and rockshelters are known from more than 250 sites situated along the Meuse River Basin of Belgium. Most of these osteological remnants date to the Late Neolithic period beginning after 4,500 years before present (BP), and five of these cave burials have been subject to intensive study, including Hastière Caverne M and Hastière Trou Garçon C from an earlier period of the Late Neolithic (4,345 ± 60 to 4,220 ± 45 years BP), Sclaigneaux and Bois Madame from the final/late Neolithic (4,155 ± 35 to 3,910 ± 40 years BP) and Maurenne Caverne de la Cave …
Addressing Environmental Gentrification: Improving Environmental Health For Children And Youth Without Displacement, Tania Schusler, Amy Krings
Addressing Environmental Gentrification: Improving Environmental Health For Children And Youth Without Displacement, Tania Schusler, Amy Krings
Center for the Human Rights of Children
This research brief aims to consider how community members and policies might improve environmental amenities within contaminated communities without displacing existing residents. To this end, we will first introduce a concept known as environmental gentrification. We will then summarize some of the existing literature that explores the relationships between urban greening and brownfield redevelopment projects in relation to gentrification. Brownfields refer to properties where the presence or potential presence of a hazardous substance, pollutant, or contaminant may complicate the property’s expansion, redevelopment, or reuse (https://www.epa.gov/brownfields/overview-brownfields- program). Our review of literature indicates that the degree of gentrification associated with sustainable development …
Organizing Under Austerity: How Residents’ Concerns Became The Flint Water Crisis, Amy Krings, Dana Kornberg, Erin Lane
Organizing Under Austerity: How Residents’ Concerns Became The Flint Water Crisis, Amy Krings, Dana Kornberg, Erin Lane
Social Work: School of Social Work Faculty Publications and Other Works
What might it take for politically marginalized residents to challenge cuts in public spending that threaten to harm their health and wellbeing? Specifically, how did residents of Flint, Michigan contribute to the decision of an austerity regime, which was not accountable to them, to spend millions to switch to a safe water source? Relying on evidence from key interviews and newspaper accounts, we examine the influence and limitations of residents and grassroots groups during the 18-month period between April 2014 and October 2015 when the city drew its water from the Flint River. We find that citizen complaints alone were …
Constitutionalism And Democracy Dataset, Version 1.0, Todd A. Eisenstadt, Carl Levan, Tofigh Maboudi
Constitutionalism And Democracy Dataset, Version 1.0, Todd A. Eisenstadt, Carl Levan, Tofigh Maboudi
Political Science: Faculty Publications and Other Works
The main objective of the CDD is to quantify the process of constitution-making since 1974. This is the first public release of any data on the process of constitution-making. This release includes data on 144 national constitutions promulgated in 119 countries from 1974 to 2014. The unit of analysis in the data is national constitutions. The data in this release includes only “new” constitutions and does not include suspended, re-installed, amended, or interim constitutions. In this release, only countries with a population larger than 500,000 are included. The authors intend to update the data by including all countries, expanding the …
Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross
Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross
Computer Science: Faculty Publications and Other Works
This presentation discusses how to address 21st Century employment challenges by dismantling gender-specific barriers to entry. We take an interdisciplinary approach by focusing on areas such as education, public policy, culture, and media (among others).
Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron
Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron
Psychology: Faculty Publications and Other Works
What is the role of research in the field of pediatric psychology? To answer this question, it is useful to imagine what clinical practice would be like if we had no research foundation for our work. Without such a foundation, practitioners would have no basis for suggesting specific interventions or understanding why some interventions are successful and why others fail. Similarly, without a research foundation, assessments conducted with children would be based on unstandardized assessment methods, and no normative data would be available. Clearly, most of us would agree that scientific research is the foundation of pediatric psychology, including all …
A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal
A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …