Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (1)
- Communication (1)
- Composition (1)
- Computational Linguistics (1)
- Creative Writing (1)
-
- Emergency and Disaster Management (1)
- Environmental Health and Protection (1)
- Environmental Sciences (1)
- Fiction (1)
- Information Security (1)
- Linguistics (1)
- Music (1)
- Music Performance (1)
- Organizational Communication (1)
- Poetry (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Relations and Advertising (1)
- Semantics and Pragmatics (1)
- Software Engineering (1)
- Syntax (1)
- Theory and Algorithms (1)
Articles 1 - 2 of 2
Full-Text Articles in Databases and Information Systems
Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka
Lulling Waters: A Poetry Reading For Real-Time Music Generation Through Emotion Mapping, Ashley Muniz, Toshihisa Tsuruoka
Electronic Literature Organization Conference 2020
Through a poetic narrative, “Lulling Waters” tells the story of a whale overcoming the loss of his mother, who passed away from ingesting plastic, as he attempts to escape from the polluted oceanic world. The live performance of this poem utilizes a software system called Soundwriter, which was developed with the goal of enriching the oral storytelling experience through music. This video demonstrates how Soundwriter’s real-time hybrid system was able to analyze “Lulling Waters” through its lexical and auditory features. Emotionally salient words were given ratings based on arousal, valence, and dominance while the emotionally charged prosodic features of the …
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
Mind The Gap: Understanding Stakeholder Reactions To Different Types Of Data Security, Audra Diers-Lawson, Amelia Symons
International Crisis and Risk Communication Conference
Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x …