Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

Twitter Activity Of Urban And Rural Colleges: A Sentiment Analysis Using The Dialogic Loop, Eugene H. Pons Nov 2019

Twitter Activity Of Urban And Rural Colleges: A Sentiment Analysis Using The Dialogic Loop, Eugene H. Pons

FIU Electronic Theses and Dissertations

The purpose of the present study is to ascertain if colleges are achieving their ultimate communication goals of maintaining and attracting students through their microblogging activity, which according to Dialogic Loop Theory, is directly correlated to the use of positive and negative sentiment. The study focused on a cross-section of urban and rural community colleges within the United States to identify the sentiment score of their microblogging activity. The study included a content analysis on the Twitter activity of these colleges. A data-mining process was employed to collect a census of the tweets associated with these colleges. Further processing was …


Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua Jun 2019

Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua

FIU Electronic Theses and Dissertations

Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers -- with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone Attacks (ICA) and Reconnaissance Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target's resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for …


Love From The Machine: Technosexualities And The Desire For Machinic Bodies, Ann-Renee Clark Jun 2019

Love From The Machine: Technosexualities And The Desire For Machinic Bodies, Ann-Renee Clark

FIU Electronic Theses and Dissertations

This dissertation explores the dimensions and practices of "technosexualities" - human desires for machinic bodies. For the purposes of this project, technosexualities are defined as sexual and/or other intimate desires for technologically enhanced or constructed humanoid bodies ("machinic bodies") or the desire to be such a machinic body. A machinic body may be mechanical (robotic) and/or digital, techno-biological (as per biological computing and/or a laboratory-“grown” or built body), or “cyborg” (cybernetic organism, a partially technologically-modified, partially biological body.) Rather than interpreting technosexuals as troubled or disturbed “fetishists” who are attracted to the unnatural, or imposing suppositions of feelings of impotence …


Security Starts At Your Door: Social Media, Racial Inequality, And The Rise Of Video Sousveillance In Urban Environments, Bridgett Zayas Apr 2019

Security Starts At Your Door: Social Media, Racial Inequality, And The Rise Of Video Sousveillance In Urban Environments, Bridgett Zayas

Undergraduate Research at FIU (URFIU) Conference

The rise of consumer-level surveillance cameras and home security systems in suburban neighborhoods have given rise to new forms of sousveillance (the inverse of surveillance, describing a bottom-up approach to watching) technology like Amazon’s Ring and its corresponding social platform application, Neighbors. The app is meant to facilitate collaboration and safety, as Ring owners upload videos taken from their camera and communicate with users in the same or neighboring communities and law enforcement. Although there are millions of active users, as well as an increase in interest from law enforcement, there is little research examining this new form of sousveillance …