Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 254

Full-Text Articles in Social and Behavioral Sciences

Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan Dec 2022

Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan

Bulletin of Chinese Academy of Sciences (Chinese Version)

The rapid development of information technology has unprecedentedly created a prosperous cyber society and greatly enhanced productivity facilitated by social interaction. At the same time, many problems emerge in the cyber society, such as telecom fraud, privacy leakage, Internet pollution, and algorithmic discrimination. The problems bring new challenges to social order and security. In order to find the way of cyber society governance and promote the modernization of national governance, this paper first presents the analyses on the new problems encountered in the cyber society in three typical scenarios, i.e., identity governance, behavior governance, and algorithm governance, as well as …


Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li Dec 2022

Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li

Bulletin of Chinese Academy of Sciences (Chinese Version)

Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …


Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander Dec 2022

Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander

School of Business: Faculty Publications and Other Works

Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …


Defining Traffic Scenarios For The Visually Impaired, Judith Jakob, Kordula Kugele, József Tick Dec 2022

Defining Traffic Scenarios For The Visually Impaired, Judith Jakob, Kordula Kugele, József Tick

The Qualitative Report

For the development of a transfer concept of camera-based object detections from Advanced Driver Assistance Systems to the assistance of the visually impaired, we define relevant traffic scenarios and vision use cases by means of problem-centered interviews with four experts and ten members of the target group. We identify the six traffic scenarios: general orientation, navigating to an address, crossing a road, obstacle avoidance, boarding a bus, and at the train station clustered into the three categories: Orientation, Pedestrian, and Public Transport. Based on the data, we describe each traffic scenario and derive a summarizing table adapted from software engineering …


Utilizing Remote Sensing Technology To Relocate Lubra Village And Visualize Flood Damages, Ronan Wallace Dec 2022

Utilizing Remote Sensing Technology To Relocate Lubra Village And Visualize Flood Damages, Ronan Wallace

Mathematics, Statistics, and Computer Science Honors Projects

As weather patterns change worldwide, isolated communities impacted by climate change go unnoticed and we need community and habitat-conscious solutions. In Himalayan Mustang, Nepal, indigenous Lubra village faces threats of increasing flash flooding. After every flood, residual concrete-like sediment hardens across the riverbed, causing the riverbed elevation to rise. As elevation increases, sediment encroaches on Lubra’s agricultural fields and homes, magnifying flood vulnerability. In the last monsoon season alone, the village witnessed floods swallowing several fields and damaging two homes. One solution considers relocating the village to a new location entirely. However, relocation poses a challenging task, as eight centuries …


Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss Dec 2022

Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss

All HCAS Student Capstones, Theses, and Dissertations

Trait-based ecology characterizes individuals’ functional attributes to better understand and predict their interactions with other species and their environments. Utilizing morphological traits to describe functional groups has helped group species with similar ecological niches that are not necessarily taxonomically related. Within the deep-pelagic fishes, the Order Stomiiformes exhibits high morphological and species diversity, and many species undertake diel vertical migration (DVM). While the morphology and behavior of stomiiform fishes have been extensively studied and described through taxonomic assessments, the connection between their form and function regarding their DVM types, morphotypes, and daytime depth distributions is not well known. Here, three …


Addressing Human Error Through Effective Cyber Policy Design, Katherine Amoresano Dec 2022

Addressing Human Error Through Effective Cyber Policy Design, Katherine Amoresano

Emergency Preparedness, Homeland Security, and Cybersecurity

Human error is a significant contributing factor to the rise in Cybersecurity attacks regardless of increased technical control implemented to safeguard Information systems. Adversaries can circumvent technical safeguards due to human errors which result from inadequate enforceable policies and training on Cybersecurity for the everyday user. Several studies and articles show that the majority of successful attacks are human enabled, proving the need for human-centric cybersecurity research and practices. This exploratory work reviews the human aspect of Cybersecurity by investigating the cybersecurity policies at SUNY Albany and other SUNY institutions. We used a survey of students and faculty members at …


Glacier Segmentation From Remote Sensing Imagery Using Deep Learning, Bibek Aryal Dec 2022

Glacier Segmentation From Remote Sensing Imagery Using Deep Learning, Bibek Aryal

Open Access Theses & Dissertations

Large-scale study of glaciers improves our understanding of global glacier change and is imperative for monitoring the ecological environment, preventing disasters, and studying the effects of global climate change. In recent years, remote sensing imagery has been preferred over riskier and resource-intensive field visits for tracking landscape level changes like glaciers. However, periodic manual labeling of glaciers over a large area is not feasible due to the considerable amount of time it requires while automatic segmentation of glaciers has its own set of challenges. Our work aims to study the challenges associated with segmentation of glaciers from remote sensing imagery …


Singlish Checker: A Tool For Understanding And Analysing An English Creole Language, Lee-Hsun Hsieh, Nam Chew Chua, Agus Trisnajaya Kwee, Pei-Chi Lo, Yang-Yin Lee, Ee-Peng Lim Dec 2022

Singlish Checker: A Tool For Understanding And Analysing An English Creole Language, Lee-Hsun Hsieh, Nam Chew Chua, Agus Trisnajaya Kwee, Pei-Chi Lo, Yang-Yin Lee, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

As English is a widely used language in many countries of different cultures, variants of English also known as English creoles have also been created. Singlish is one such English creole used by people in Singapore. Nevertheless, unlike English, Singlish is not taught in schools nor encouraged to be used in formal communications. Hence, it remains to be a low resource language with a lack of up-to-date Singlish word dictionary and computational tools to analyse the language. In this paper, we therefore propose Singlish Checker, a tool that is able to help detecting Singlish text, Singlish words and phrases. To …


Multivariate Fairness For Paper Selection, Reem Alsaffar Dec 2022

Multivariate Fairness For Paper Selection, Reem Alsaffar

Graduate Theses and Dissertations

Peer review is the process by which publishers select the best publications for inclusion in a journal or a conference. Bias in the peer review process can impact which papers are selected for inclusion in conferences and journals. Although often implicit, race, gender and other demographics can prevent members of underrepresented groups from presenting at major conferences. To try to avoid bias, many conferences use a double-blind review process to increase fairness during reviewing. However, recent studies argue that the bias has not been removed completely. Our research focuses on developing fair algorithms that correct for these biases and select …


Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge Dec 2022

Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge

Master's Theses

The research in this thesis explored the research question: Are United States (US) health systems accessible to cyber-bio terrorist attacks post-pandemic, within the context of the emerging discipline of cyberbiosecurity? Key findings of the analysis demonstrated how US health systems are more accessible to cyber-bio terrorist attacks specifically from cyber hacking groups based on the increasing sophistication of their cyber capabilities and the lack of cyber protection for biological systems. The concept of cyberbiosecurity was first introduced in 2018 by researchers exploring the converging threat landscape of the cyber and biology domains. As biology is growing more dependent upon vulnerable …


Movie Reviews Sentiment Analysis Using Bert, Gibson Nkhata Dec 2022

Movie Reviews Sentiment Analysis Using Bert, Gibson Nkhata

Graduate Theses and Dissertations

Sentiment analysis (SA) or opinion mining is analysis of emotions and opinions from texts. It is one of the active research areas in Natural Language Processing (NLP). Various approaches have been deployed in the literature to address the problem. These techniques devise complex and sophisticated frameworks in order to attain optimal accuracy with their focus on polarity classification or binary classification. In this paper, we aim to fine-tune BERT in a simple but robust approach for movie reviews sentiment analysis to provide better accuracy than state-of-the-art (SOTA) methods. We start by conducting sentiment classification for every review, followed by computing …


Accurately Grasp The New Features Of Cybersecurity Technology Development And Fully Promote The Modernization Of National Security System And Capabilities, Dengguo Feng Nov 2022

Accurately Grasp The New Features Of Cybersecurity Technology Development And Fully Promote The Modernization Of National Security System And Capabilities, Dengguo Feng

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Studies On The Development Of China’S Network And Information Security, Jiwu Jing Nov 2022

Studies On The Development Of China’S Network And Information Security, Jiwu Jing

Bulletin of Chinese Academy of Sciences (Chinese Version)

No abstract provided.


Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie Nov 2022

Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie

Social Work Department Publications

No abstract provided.


Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park Nov 2022

Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park

International Journal of Cybersecurity Intelligence & Cybercrime

Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.


Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller Nov 2022

Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller

International Journal of Cybersecurity Intelligence & Cybercrime

Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …


Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa Nov 2022

Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa

International Journal of Cybersecurity Intelligence & Cybercrime

The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …


Book Review: Digital Forensics And Cyber Investigation Nov 2022

Book Review: Digital Forensics And Cyber Investigation

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen Nov 2022

Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen

University Administration Publications

Hydrological drought forecasting is essential for effective water resource management planning. Innovations in computer science and artificial intelligence (AI) have been incorporated into Earth science research domains to improve predictive performance for water resource planning and disaster management. Forecasting of future hydrological drought can assist with mitigation strategies for various stakeholders. This study uses the transformer deep learning model to forecast hydrological drought, with a benchmark comparison with the long short-term memory (LSTM) model. These models were applied to the Apalachicola River, Florida, with two gauging stations located at Chattahoochee and Blountstown. Daily stage-height data from the period 1928–2022 were …


Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz Nov 2022

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz

Faculty Publications

Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …


The Human Element In The Era Of Digitalization And Automation Of Ports: A Case Study Of South Africa, Lucky Njabulo Sithole Oct 2022

The Human Element In The Era Of Digitalization And Automation Of Ports: A Case Study Of South Africa, Lucky Njabulo Sithole

World Maritime University Dissertations

No abstract provided.


The Eu's Capacity To Lead The Transatlantic Alliance In Ai Regulation, Varun Roy, Vignesh Sreedhar Oct 2022

The Eu's Capacity To Lead The Transatlantic Alliance In Ai Regulation, Varun Roy, Vignesh Sreedhar

Claremont-UC Undergraduate Research Conference on the European Union

In the face of Chinese advances in AI in terms of technological prowess and influence, there has been a call for collaboration between the EU and the US to create a foundation for AI governance based on shared democratic beliefs. This paper maps out the EU, US, and Chinese approaches to AI development and regulation as we analyze the capacity of the US and EU to establish international standards for AI regulation through channels such as the TTC. As the EU rolled out a proportionate and risk-based approach to ensure stricter regulation for high-risk AI technologies, it laid the foundation …


Data Sharing Through Open Access Data Repositories, Karin Bennedsen Oct 2022

Data Sharing Through Open Access Data Repositories, Karin Bennedsen

All Things Open

The National Institutes of Health has expanded their data sharing requirements for obtaining funding to now include all awards for research producing scientific data to accelerate “biomedical research discovery, in part, by enabling validation of research results, providing accessibility to high-value datasets, and promoting data reuse for future research studies.” The new policy requiring a Data Management & Sharing Plan (DMSP) for all applications goes into effect January 25th, 2023. A DMSP includes where the data will be stored. This lightning talk will review Open Access Data Repositories. Don’t let the task of trying to find data storage hold you …


Algorithmic Rationality, Rohit J. Parikh Oct 2022

Algorithmic Rationality, Rohit J. Parikh

Publications and Research

The notion of rationality is much discussed by both Economists and Philosophers. Perhaps you are rational if you accept certain axioms of rationality. If you prefer A to B and B to C then you must prefer A to C. Or you can define rationality in terms of the net results of your behavior. We examine a notion of algorithmic rationality. Even animals upwards from the humble tick carry out algorithms. Are they rational? And can we use this theory to define the IQ of animals?


Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao Oct 2022

Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao

Bulletin of Chinese Academy of Sciences (Chinese Version)

Protection of algorithm by intellectual property is a powerful way to stimulate innovation and regulate the risk of the algorithm. Algorithm that can be protected by intellectual property right is the program algorithm, which is compiled in computer language, in the form of coded instruction sequence, run by the computer and produce independent rational value results. The article is combed out that there are drawbacks to the traditional path of IP to protect program algorithms:it has conflict between program algorithm and copyright law system; the trade secret path is at odds with program algorithmic governance; and program algorithm can hardly …


Bounded Confidence: How Ai Could Exacerbate Social Media’S Homophily Problem, Dylan Weber, Scott Atran, Rich Davis Oct 2022

Bounded Confidence: How Ai Could Exacerbate Social Media’S Homophily Problem, Dylan Weber, Scott Atran, Rich Davis

New England Journal of Public Policy

The advent of the Internet was heralded as a revolutionary development in the democratization of information. It has emerged, however, that online discourse on social media tends to narrow the information landscape of its users. This dynamic is driven by the propensity of the network structure of social media to tend toward homophily; users strongly prefer to interact with content and other users that are similar to them. We review the considerable evidence for the ubiquity of homophily in social media, discuss some possible mechanisms for this phenomenon, and present some observed and hypothesized effects. We also discuss how the …


Artificial Intelligence And The Situational Rationality Of Diagnosis: Human Problem-Solving And The Artifacts Of Health And Medicine, Michael W. Raphael Oct 2022

Artificial Intelligence And The Situational Rationality Of Diagnosis: Human Problem-Solving And The Artifacts Of Health And Medicine, Michael W. Raphael

Publications and Research

What is the problem-solving capacity of artificial intelligence (AI) for health and medicine? This paper draws out the cognitive sociological context of diagnostic problem-solving for medical sociology regarding the limits of automation for decision-based medical tasks. Specifically, it presents a practical way of evaluating the artificiality of symptoms and signs in medical encounters, with an emphasis on the visualization of the problem-solving process in doctor-patient relationships. In doing so, the paper details the logical differences underlying diagnostic task performance between man and machine problem-solving: its principle of rationality, the priorities of its means of adaptation to abstraction, and the effects …


Diagnosing The Present With An Ecotopian Lexicon, Chirag Giri, Adam Liebman Oct 2022

Diagnosing The Present With An Ecotopian Lexicon, Chirag Giri, Adam Liebman

Annual Student Research Poster Session

The book An Ecotopian Lexicon (2019) presents a collection of thirty terms and concepts from speculative fiction, anthropology, and the sociology of subcultures, each explored by a different author. The lexicon intends to address our collective “poverty of imagination” when it comes to avoiding global environmental collapse and building a different world, evidenced by the increasing dominance of apocalyptic narratives in popular culture. Although the book’s primary aim is to explore diverse concepts for imagining better futures, we have analyzed the form and content of the book for what they tell us about the present.


Exploring The Impact Of Gender Bias Mitigation Approaches On A Downstream Classification Task, Nasim Sobhani, Sarah Jane Delany Oct 2022

Exploring The Impact Of Gender Bias Mitigation Approaches On A Downstream Classification Task, Nasim Sobhani, Sarah Jane Delany

Conference Papers

Natural language models and systems have been shown to reflect gender bias existing in training data. This bias can impact on the downstream task that machine learning models, built on this training data, are to accomplish. A variety of techniques have been proposed to mitigate gender bias in training data. In this paper we compare different gender bias mitigation approaches on a classification task. We consider mitigation techniques that manipulate the training data itself, including data scrubbing, gender swapping and counterfactual data augmentation approaches. We also look at using de-biased word embeddings in the representation of the training data. We …