Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin Feb 2024

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …


U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva Sep 2023

U.S. Parents' Intentions To Use Anti-Bullying Apps: Insights From A Comprehensive Model, Brittany Wheeler, Katie Baumel, Deborah Hall, Yasin Silva

Computer Science: Faculty Publications and Other Works

Cyberbullying has become a prominent risk for youth and an increasing concern for parents. To help parents reduce their child's cyberbullying risk, anti-bullying apps (ABAs)—mobile applications for identifying and preventing instances of cyberbullying—have been developed in recent years. Given that ABAs are an emerging technology, limited research has been conducted to understand the factors predicting parents' intentions to use them. Drawing on three interdisciplinary theoretical frameworks, a sample of parents in the U.S. recruited through Amazon Mechanical Turk completed an online survey to assess parents' knowledge of, attitudes about, and intentions to use ABAs. Participants also rated the importance of …


Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander Dec 2022

Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander

School of Business: Faculty Publications and Other Works

Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …


Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison Jun 2022

Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB


Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin Feb 2022

Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA …


Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu Jan 2022

Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu

Computer Science: Faculty Publications and Other Works

Increased social media use has contributed to the greater prevalence of abusive, rude, and offensive textual comments. Machine learning models have been developed to detect toxic comments online, yet these models tend to show biases against users with marginalized or minority identities (e.g., females and African Americans). Established research in debiasing toxicity classifiers often (1) takes a static or batch approach, assuming that all information is available and then making a one-time decision; and (2) uses a generic strategy to mitigate different biases (e.g., gender and racial biases) that assumes the biases are independent of one another. However, in real …


A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall Jan 2022

A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall

Computer Science: Faculty Publications and Other Works

As online communication continues to become more prevalent, instances of cyberbullying have also become more common, particularly on social media sites. Previous research in this area has studied cyberbullying outcomes, predictors of cyberbullying victimization/perpetration, and computational detection models that rely on labeled datasets to identify the underlying patterns. However, there is a dearth of work examining the content of what is said when cyberbullying occurs and most of the available datasets include only basic labels (cyberbullying or not). This paper presents an annotated Instagram dataset with detailed labels about key cyberbullying properties, such as the content type, purpose, directionality, and …


Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin Nov 2021

Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cybersecurity experts recommend the adoption of password managers (PMs), as they generate and store strong passwords for all accounts. Prior research has shown that few people adopt PMs. Our research examined PM adoption in a sample of 221 undergraduates from psychology courses and a sample of 278 MTurk workers. We hypothesized that PM adoption could be predicted using a small set of user characteristics (i.e., gender, age, Big Five personality traits, number of devices used, frequency of using social media, and cybersecurity knowledge). The results showed that …


Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison Nov 2021

Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).

If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …


Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin Nov 2021

Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.

We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.

We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …


Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin Aug 2021

Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of weak passwords led to major cybersecurity breaches. The present research investigated whether nudging with messages based on participants’ self-schemas could lead them to create stronger passwords. We modeled our study on prior health-related research demonstrating positive results using messages based on self-schema categories (i.e., True Colors categories -compassionate, loyal, intellectual, and adventurous). We carried out an online study, one with 256 (185 women, 66 men, 5 other) undergraduates and one with 424 (240 men, 179 women, 5 other) Amazon Mechanical Turk (MTurk) workers, in …


Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin Jun 2021

Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People often create passwords for their accounts that are insecure. An insecure password is often easy to guess– thus, hackers can easily access their victims’ accounts. It is important for users to know how to create and manage secure passwords so they can better protect themselves from hackers. It is well-known that different users have different personality types, such as Big Five and True Colors. This research examines if there is any link between personality types and password security behavior. Each participant was shown either a matching or mismatching message based on their personality type, and it was measured whether …


Elliptical Fourier Analysis Of Crown Shape In Permanent Mandibular Molars From The Late Neolithic Cave Burials Of Belgium, Frank L'Engle Williams, Juliet K. Brophy, Gregory J. Matthews Jan 2021

Elliptical Fourier Analysis Of Crown Shape In Permanent Mandibular Molars From The Late Neolithic Cave Burials Of Belgium, Frank L'Engle Williams, Juliet K. Brophy, Gregory J. Matthews

Mathematics and Statistics: Faculty Publications and Other Works

Prehistoric remains from caves and rockshelters are known from more than 250 sites situated along the Meuse River Basin of Belgium. Most of these osteological remnants date to the Late Neolithic period beginning after 4,500 years before present (BP), and five of these cave burials have been subject to intensive study, including Hastière Caverne M and Hastière Trou Garçon C from an earlier period of the Late Neolithic (4,345 ± 60 to 4,220 ± 45 years BP), Sclaigneaux and Bois Madame from the final/late Neolithic (4,155 ± 35 to 3,910 ± 40 years BP) and Maurenne Caverne de la Cave …


Addressing Environmental Gentrification: Improving Environmental Health For Children And Youth Without Displacement, Tania Schusler, Amy Krings Nov 2018

Addressing Environmental Gentrification: Improving Environmental Health For Children And Youth Without Displacement, Tania Schusler, Amy Krings

Center for the Human Rights of Children

This research brief aims to consider how community members and policies might improve environmental amenities within contaminated communities without displacing existing residents. To this end, we will first introduce a concept known as environmental gentrification. We will then summarize some of the existing literature that explores the relationships between urban greening and brownfield redevelopment projects in relation to gentrification. Brownfields refer to properties where the presence or potential presence of a hazardous substance, pollutant, or contaminant may complicate the property’s expansion, redevelopment, or reuse (https://www.epa.gov/brownfields/overview-brownfields- program). Our review of literature indicates that the degree of gentrification associated with sustainable development …


Organizing Under Austerity: How Residents’ Concerns Became The Flint Water Crisis, Amy Krings, Dana Kornberg, Erin Lane Mar 2018

Organizing Under Austerity: How Residents’ Concerns Became The Flint Water Crisis, Amy Krings, Dana Kornberg, Erin Lane

Social Work: School of Social Work Faculty Publications and Other Works

What might it take for politically marginalized residents to challenge cuts in public spending that threaten to harm their health and wellbeing? Specifically, how did residents of Flint, Michigan contribute to the decision of an austerity regime, which was not accountable to them, to spend millions to switch to a safe water source? Relying on evidence from key interviews and newspaper accounts, we examine the influence and limitations of residents and grassroots groups during the 18-month period between April 2014 and October 2015 when the city drew its water from the Flint River. We find that citizen complaints alone were …


Constitutionalism And Democracy Dataset, Version 1.0, Todd A. Eisenstadt, Carl Levan, Tofigh Maboudi May 2017

Constitutionalism And Democracy Dataset, Version 1.0, Todd A. Eisenstadt, Carl Levan, Tofigh Maboudi

Political Science: Faculty Publications and Other Works

The main objective of the CDD is to quantify the process of constitution-making since 1974. This is the first public release of any data on the process of constitution-making. This release includes data on 144 national constitutions promulgated in 119 countries from 1974 to 2014. The unit of analysis in the data is national constitutions. The data in this release includes only “new” constitutions and does not include suspended, re-installed, amended, or interim constitutions. In this release, only countries with a population larger than 500,000 are included. The authors intend to update the data by including all countries, expanding the …


Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross Apr 2013

Gendered Jobs And The New Gender Gap, George K. Thiruvathukal, Jon Ross

Computer Science: Faculty Publications and Other Works

This presentation discusses how to address 21st Century employment challenges by dismantling gender-specific barriers to entry. We take an interdisciplinary approach by focusing on areas such as education, public policy, culture, and media (among others).


Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron Jan 2009

Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron

Psychology: Faculty Publications and Other Works

What is the role of research in the field of pediatric psychology? To answer this question, it is useful to imagine what clinical practice would be like if we had no research foundation for our work. Without such a foundation, practitioners would have no basis for suggesting specific interventions or understanding why some interventions are successful and why others fail. Similarly, without a research foundation, assessments conducted with children would be based on unstandardized assessment methods, and no normative data would be available. Clearly, most of us would agree that scientific research is the foundation of pediatric psychology, including all …


A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal Jan 2003

A Multi-Platform Application Suite For Enhancing South Asian Language Pedagogy, Tao Bai, Christopher K. Chung, Konstantin Läufer, Daisy Rockwell, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This interdisciplinary project explores the potential for handheld/wireless (H/W) technology in the context of language education within and beyond the classroom. Specifically, we have designed and implemented a suite of multi-platform (desktop/laptop, handheld, and browser) applications to enhance the teaching of South Asian languages such as Hindi-Urdu. Such languages are very difficult to learn, let alone write, and H/W devices (with their handwriting/drawing capabilities) can play a significant role in overcoming the learning curve. The initial application suite includes a character/word tracer, a word splitter/joiner, a smart flashcard with audio, contextual augmented stories for reading comprehension, and a poetic metronome. …