Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (39)
- Old Dominion University (30)
- Chinese Academy of Sciences (16)
- Bridgewater State University (12)
- Embry-Riddle Aeronautical University (11)
-
- University of Central Florida (10)
- City University of New York (CUNY) (9)
- Walden University (7)
- University of Arkansas, Fayetteville (6)
- Florida International University (5)
- Loyola University Chicago (5)
- Nova Southeastern University (5)
- Kennesaw State University (4)
- University of Pennsylvania Carey Law School (4)
- Zayed University (4)
- New Jersey Institute of Technology (3)
- Purdue University (3)
- Rochester Institute of Technology (3)
- San Jose State University (3)
- Technological University Dublin (3)
- Aga Khan University (2)
- Bard College (2)
- Binghamton University (2)
- Chapman University (2)
- Claremont Colleges (2)
- Clemson University (2)
- Journal of Police and Legal Sciences (2)
- Minnesota State University, Mankato (2)
- Northern Illinois University (2)
- Seattle Pacific University (2)
- Keyword
-
- Machine learning (15)
- Artificial intelligence (14)
- Cybersecurity (9)
- Deep learning (7)
- Singapore (6)
-
- Twitter (6)
- AI (5)
- COVID-19 (5)
- Internet (5)
- Natural language processing (5)
- Social media (5)
- Cybercrime (4)
- Innovation (4)
- Machine Learning (4)
- Privacy (4)
- Security (4)
- Survey (4)
- Technology (4)
- Access (3)
- Blockchain (3)
- China (3)
- Cognition (3)
- Competition (3)
- Deep Learning (3)
- Digital forensics (3)
- Disinformation (3)
- Gerrymandering (3)
- Human-computer interaction (3)
- Neural networks (3)
- OpenStreetMap (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (33)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (16)
- International Journal of Cybersecurity Intelligence & Cybercrime (11)
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- Computer Science Faculty Publications (8)
-
- Human-Machine Communication (7)
- Walden Dissertations and Doctoral Studies (7)
- All Faculty Scholarship (4)
- All Works (4)
- Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics (4)
- Computer Science: Faculty Publications and Other Works (4)
- Publications and Research (4)
- Theses and Dissertations (4)
- CCE Theses and Dissertations (3)
- Cybersecurity Undergraduate Research Showcase (3)
- Dissertations (3)
- Frameless (3)
- GIS Center (3)
- Graduate Theses and Dissertations (3)
- Honors Theses (3)
- Mineta Transportation Institute (3)
- All Dissertations (2)
- Articles (2)
- Conference Papers (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electrical & Computer Engineering Faculty Publications (2)
- Electronic Theses and Dissertations (2)
- Electronic Theses and Dissertations, 2020- (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Faculty Publications (2)
- Publication Type
Articles 1 - 30 of 254
Full-Text Articles in Social and Behavioral Sciences
Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan
Challenges And Measurements For Governance Of Modern Cyber Space Society, Pinghui Wang, Hongbin Pei, Junzhou Zhao, Tao Qin, Chao Shen, Dongliang Liu, Xiaohong Guan
Bulletin of Chinese Academy of Sciences (Chinese Version)
The rapid development of information technology has unprecedentedly created a prosperous cyber society and greatly enhanced productivity facilitated by social interaction. At the same time, many problems emerge in the cyber society, such as telecom fraud, privacy leakage, Internet pollution, and algorithmic discrimination. The problems bring new challenges to social order and security. In order to find the way of cyber society governance and promote the modernization of national governance, this paper first presents the analyses on the new problems encountered in the cyber society in three typical scenarios, i.e., identity governance, behavior governance, and algorithm governance, as well as …
Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li
Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li
Bulletin of Chinese Academy of Sciences (Chinese Version)
Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
School of Business: Faculty Publications and Other Works
Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …
Defining Traffic Scenarios For The Visually Impaired, Judith Jakob, Kordula Kugele, József Tick
Defining Traffic Scenarios For The Visually Impaired, Judith Jakob, Kordula Kugele, József Tick
The Qualitative Report
For the development of a transfer concept of camera-based object detections from Advanced Driver Assistance Systems to the assistance of the visually impaired, we define relevant traffic scenarios and vision use cases by means of problem-centered interviews with four experts and ten members of the target group. We identify the six traffic scenarios: general orientation, navigating to an address, crossing a road, obstacle avoidance, boarding a bus, and at the train station clustered into the three categories: Orientation, Pedestrian, and Public Transport. Based on the data, we describe each traffic scenario and derive a summarizing table adapted from software engineering …
Utilizing Remote Sensing Technology To Relocate Lubra Village And Visualize Flood Damages, Ronan Wallace
Utilizing Remote Sensing Technology To Relocate Lubra Village And Visualize Flood Damages, Ronan Wallace
Mathematics, Statistics, and Computer Science Honors Projects
As weather patterns change worldwide, isolated communities impacted by climate change go unnoticed and we need community and habitat-conscious solutions. In Himalayan Mustang, Nepal, indigenous Lubra village faces threats of increasing flash flooding. After every flood, residual concrete-like sediment hardens across the riverbed, causing the riverbed elevation to rise. As elevation increases, sediment encroaches on Lubra’s agricultural fields and homes, magnifying flood vulnerability. In the last monsoon season alone, the village witnessed floods swallowing several fields and damaging two homes. One solution considers relocating the village to a new location entirely. However, relocation poses a challenging task, as eight centuries …
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
Examining The Relationship Between Stomiiform Fish Morphology And Their Ecological Traits, Mikayla L. Twiss
All HCAS Student Capstones, Theses, and Dissertations
Trait-based ecology characterizes individuals’ functional attributes to better understand and predict their interactions with other species and their environments. Utilizing morphological traits to describe functional groups has helped group species with similar ecological niches that are not necessarily taxonomically related. Within the deep-pelagic fishes, the Order Stomiiformes exhibits high morphological and species diversity, and many species undertake diel vertical migration (DVM). While the morphology and behavior of stomiiform fishes have been extensively studied and described through taxonomic assessments, the connection between their form and function regarding their DVM types, morphotypes, and daytime depth distributions is not well known. Here, three …
Addressing Human Error Through Effective Cyber Policy Design, Katherine Amoresano
Addressing Human Error Through Effective Cyber Policy Design, Katherine Amoresano
Emergency Preparedness, Homeland Security, and Cybersecurity
Human error is a significant contributing factor to the rise in Cybersecurity attacks regardless of increased technical control implemented to safeguard Information systems. Adversaries can circumvent technical safeguards due to human errors which result from inadequate enforceable policies and training on Cybersecurity for the everyday user. Several studies and articles show that the majority of successful attacks are human enabled, proving the need for human-centric cybersecurity research and practices. This exploratory work reviews the human aspect of Cybersecurity by investigating the cybersecurity policies at SUNY Albany and other SUNY institutions. We used a survey of students and faculty members at …
Glacier Segmentation From Remote Sensing Imagery Using Deep Learning, Bibek Aryal
Glacier Segmentation From Remote Sensing Imagery Using Deep Learning, Bibek Aryal
Open Access Theses & Dissertations
Large-scale study of glaciers improves our understanding of global glacier change and is imperative for monitoring the ecological environment, preventing disasters, and studying the effects of global climate change. In recent years, remote sensing imagery has been preferred over riskier and resource-intensive field visits for tracking landscape level changes like glaciers. However, periodic manual labeling of glaciers over a large area is not feasible due to the considerable amount of time it requires while automatic segmentation of glaciers has its own set of challenges. Our work aims to study the challenges associated with segmentation of glaciers from remote sensing imagery …
Singlish Checker: A Tool For Understanding And Analysing An English Creole Language, Lee-Hsun Hsieh, Nam Chew Chua, Agus Trisnajaya Kwee, Pei-Chi Lo, Yang-Yin Lee, Ee-Peng Lim
Singlish Checker: A Tool For Understanding And Analysing An English Creole Language, Lee-Hsun Hsieh, Nam Chew Chua, Agus Trisnajaya Kwee, Pei-Chi Lo, Yang-Yin Lee, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
As English is a widely used language in many countries of different cultures, variants of English also known as English creoles have also been created. Singlish is one such English creole used by people in Singapore. Nevertheless, unlike English, Singlish is not taught in schools nor encouraged to be used in formal communications. Hence, it remains to be a low resource language with a lack of up-to-date Singlish word dictionary and computational tools to analyse the language. In this paper, we therefore propose Singlish Checker, a tool that is able to help detecting Singlish text, Singlish words and phrases. To …
Multivariate Fairness For Paper Selection, Reem Alsaffar
Multivariate Fairness For Paper Selection, Reem Alsaffar
Graduate Theses and Dissertations
Peer review is the process by which publishers select the best publications for inclusion in a journal or a conference. Bias in the peer review process can impact which papers are selected for inclusion in conferences and journals. Although often implicit, race, gender and other demographics can prevent members of underrepresented groups from presenting at major conferences. To try to avoid bias, many conferences use a double-blind review process to increase fairness during reviewing. However, recent studies argue that the bias has not been removed completely. Our research focuses on developing fair algorithms that correct for these biases and select …
Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge
Post Pandemic Cyberbiosecurity Threats From Terrorist Groups, Haley D. Dodge
Master's Theses
The research in this thesis explored the research question: Are United States (US) health systems accessible to cyber-bio terrorist attacks post-pandemic, within the context of the emerging discipline of cyberbiosecurity? Key findings of the analysis demonstrated how US health systems are more accessible to cyber-bio terrorist attacks specifically from cyber hacking groups based on the increasing sophistication of their cyber capabilities and the lack of cyber protection for biological systems. The concept of cyberbiosecurity was first introduced in 2018 by researchers exploring the converging threat landscape of the cyber and biology domains. As biology is growing more dependent upon vulnerable …
Movie Reviews Sentiment Analysis Using Bert, Gibson Nkhata
Movie Reviews Sentiment Analysis Using Bert, Gibson Nkhata
Graduate Theses and Dissertations
Sentiment analysis (SA) or opinion mining is analysis of emotions and opinions from texts. It is one of the active research areas in Natural Language Processing (NLP). Various approaches have been deployed in the literature to address the problem. These techniques devise complex and sophisticated frameworks in order to attain optimal accuracy with their focus on polarity classification or binary classification. In this paper, we aim to fine-tune BERT in a simple but robust approach for movie reviews sentiment analysis to provide better accuracy than state-of-the-art (SOTA) methods. We start by conducting sentiment classification for every review, followed by computing …
Accurately Grasp The New Features Of Cybersecurity Technology Development And Fully Promote The Modernization Of National Security System And Capabilities, Dengguo Feng
Bulletin of Chinese Academy of Sciences (Chinese Version)
No abstract provided.
Studies On The Development Of China’S Network And Information Security, Jiwu Jing
Studies On The Development Of China’S Network And Information Security, Jiwu Jing
Bulletin of Chinese Academy of Sciences (Chinese Version)
No abstract provided.
Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie
Rural America Is Still Technologically Behind: Why It Matters Now More Than Ever, Paul Force-Emery Mackie
Social Work Department Publications
No abstract provided.
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
Understanding Deviance And Victimization In Cyber Space Among Diverse Populations, Insun Park
International Journal of Cybersecurity Intelligence & Cybercrime
Recent years have witnessed a growing academic interest in deviance and victimization in the cyber space. The current issue of the International Journal of Cybersecurity Intelligence and Cybercrime features three empirical research articles on online behavior of traditionally under-researched populations and a review of much waited book on digital forensics and investigation. This paper was prepared to introduce these important scholarly works in the context of newly emerging scholarship that focuses on the experiences of diverse subgroups in cyberspace.
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
Aggressive Reality Docuseries And Cyberbullying: A Partial Test Of Glaser’S Differential Identification Theory, J. Ra’Chel Fowler, Darren R. Beneby, Kenethia L. Fuller
International Journal of Cybersecurity Intelligence & Cybercrime
Reality docuseries have dominated primetime airwaves for the greater part of three decades. However, little is known about how viewers who are enamored with the genre’s most aggressive characters are influenced. Using Glaser’s (1956) theory of differential identification, this study employs survey data from 210 college students at a historically Black college and university to explore whether identification with characters from aggressive reality docuseries (ARDs) and the frequency of viewing ARD are positively associated with cyberbullying. Results of multivariate analyses revealed that men were more likely than women to publicly shame others and air other’s dirty laundry online. Additionally, the …
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
Emerging Trends In Cybercrime Awareness In Nigeria, Ogochukwu Favour Nzeakor, Bonaventure N. Nwokeoma, Ibrahim Hassan, Benjamin Okorie Ajah, John T. Okpa
International Journal of Cybersecurity Intelligence & Cybercrime
The study examined the current trend in cybercrime awareness and the relationship such trend has with cybercrime vulnerability or victimization. Selecting a sample of 1104 Internet users from Umuahia, Abia State, Nigeria, We found that: 1) awareness of information security was high in that about 2 in every 3 (68%) participants demonstrated a favorable awareness of information security and cybercrime. It was, however, revealed that such a high level of awareness could be partial and weak. 2) most Internet users demonstrated the awareness of fraud-related cybercrime categories (39%), e-theft (15%), hacking (12%), and ATM theft (10%). However, they were rarely …
Book Review: Digital Forensics And Cyber Investigation
Book Review: Digital Forensics And Cyber Investigation
International Journal of Cybersecurity Intelligence & Cybercrime
No abstract provided.
Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen
Hydrological Drought Forecasting Using A Deep Transformer Model, Amobichukwu C. Amanambu, Joann Mossa, Yin-Hsuen Chen
University Administration Publications
Hydrological drought forecasting is essential for effective water resource management planning. Innovations in computer science and artificial intelligence (AI) have been incorporated into Earth science research domains to improve predictive performance for water resource planning and disaster management. Forecasting of future hydrological drought can assist with mitigation strategies for various stakeholders. This study uses the transformer deep learning model to forecast hydrological drought, with a benchmark comparison with the long short-term memory (LSTM) model. These models were applied to the Apalachicola River, Florida, with two gauging stations located at Chattahoochee and Blountstown. Daily stage-height data from the period 1928–2022 were …
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Faculty Publications
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …
The Human Element In The Era Of Digitalization And Automation Of Ports: A Case Study Of South Africa, Lucky Njabulo Sithole
The Human Element In The Era Of Digitalization And Automation Of Ports: A Case Study Of South Africa, Lucky Njabulo Sithole
World Maritime University Dissertations
No abstract provided.
The Eu's Capacity To Lead The Transatlantic Alliance In Ai Regulation, Varun Roy, Vignesh Sreedhar
The Eu's Capacity To Lead The Transatlantic Alliance In Ai Regulation, Varun Roy, Vignesh Sreedhar
Claremont-UC Undergraduate Research Conference on the European Union
In the face of Chinese advances in AI in terms of technological prowess and influence, there has been a call for collaboration between the EU and the US to create a foundation for AI governance based on shared democratic beliefs. This paper maps out the EU, US, and Chinese approaches to AI development and regulation as we analyze the capacity of the US and EU to establish international standards for AI regulation through channels such as the TTC. As the EU rolled out a proportionate and risk-based approach to ensure stricter regulation for high-risk AI technologies, it laid the foundation …
Data Sharing Through Open Access Data Repositories, Karin Bennedsen
Data Sharing Through Open Access Data Repositories, Karin Bennedsen
All Things Open
The National Institutes of Health has expanded their data sharing requirements for obtaining funding to now include all awards for research producing scientific data to accelerate “biomedical research discovery, in part, by enabling validation of research results, providing accessibility to high-value datasets, and promoting data reuse for future research studies.” The new policy requiring a Data Management & Sharing Plan (DMSP) for all applications goes into effect January 25th, 2023. A DMSP includes where the data will be stored. This lightning talk will review Open Access Data Repositories. Don’t let the task of trying to find data storage hold you …
Algorithmic Rationality, Rohit J. Parikh
Algorithmic Rationality, Rohit J. Parikh
Publications and Research
The notion of rationality is much discussed by both Economists and Philosophers. Perhaps you are rational if you accept certain axioms of rationality. If you prefer A to B and B to C then you must prefer A to C. Or you can define rationality in terms of the net results of your behavior. We examine a notion of algorithmic rationality. Even animals upwards from the humble tick carry out algorithms. Are they rational? And can we use this theory to define the IQ of animals?
Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao
Path Choice Of Algorithm Intellectual Property Protection, Yulu Jin, Youdan Xiao
Bulletin of Chinese Academy of Sciences (Chinese Version)
Protection of algorithm by intellectual property is a powerful way to stimulate innovation and regulate the risk of the algorithm. Algorithm that can be protected by intellectual property right is the program algorithm, which is compiled in computer language, in the form of coded instruction sequence, run by the computer and produce independent rational value results. The article is combed out that there are drawbacks to the traditional path of IP to protect program algorithms:it has conflict between program algorithm and copyright law system; the trade secret path is at odds with program algorithmic governance; and program algorithm can hardly …
Bounded Confidence: How Ai Could Exacerbate Social Media’S Homophily Problem, Dylan Weber, Scott Atran, Rich Davis
Bounded Confidence: How Ai Could Exacerbate Social Media’S Homophily Problem, Dylan Weber, Scott Atran, Rich Davis
New England Journal of Public Policy
The advent of the Internet was heralded as a revolutionary development in the democratization of information. It has emerged, however, that online discourse on social media tends to narrow the information landscape of its users. This dynamic is driven by the propensity of the network structure of social media to tend toward homophily; users strongly prefer to interact with content and other users that are similar to them. We review the considerable evidence for the ubiquity of homophily in social media, discuss some possible mechanisms for this phenomenon, and present some observed and hypothesized effects. We also discuss how the …
Artificial Intelligence And The Situational Rationality Of Diagnosis: Human Problem-Solving And The Artifacts Of Health And Medicine, Michael W. Raphael
Artificial Intelligence And The Situational Rationality Of Diagnosis: Human Problem-Solving And The Artifacts Of Health And Medicine, Michael W. Raphael
Publications and Research
What is the problem-solving capacity of artificial intelligence (AI) for health and medicine? This paper draws out the cognitive sociological context of diagnostic problem-solving for medical sociology regarding the limits of automation for decision-based medical tasks. Specifically, it presents a practical way of evaluating the artificiality of symptoms and signs in medical encounters, with an emphasis on the visualization of the problem-solving process in doctor-patient relationships. In doing so, the paper details the logical differences underlying diagnostic task performance between man and machine problem-solving: its principle of rationality, the priorities of its means of adaptation to abstraction, and the effects …
Diagnosing The Present With An Ecotopian Lexicon, Chirag Giri, Adam Liebman
Diagnosing The Present With An Ecotopian Lexicon, Chirag Giri, Adam Liebman
Annual Student Research Poster Session
The book An Ecotopian Lexicon (2019) presents a collection of thirty terms and concepts from speculative fiction, anthropology, and the sociology of subcultures, each explored by a different author. The lexicon intends to address our collective “poverty of imagination” when it comes to avoiding global environmental collapse and building a different world, evidenced by the increasing dominance of apocalyptic narratives in popular culture. Although the book’s primary aim is to explore diverse concepts for imagining better futures, we have analyzed the form and content of the book for what they tell us about the present.
Exploring The Impact Of Gender Bias Mitigation Approaches On A Downstream Classification Task, Nasim Sobhani, Sarah Jane Delany
Exploring The Impact Of Gender Bias Mitigation Approaches On A Downstream Classification Task, Nasim Sobhani, Sarah Jane Delany
Conference Papers
Natural language models and systems have been shown to reflect gender bias existing in training data. This bias can impact on the downstream task that machine learning models, built on this training data, are to accomplish. A variety of techniques have been proposed to mitigate gender bias in training data. In this paper we compare different gender bias mitigation approaches on a classification task. We consider mitigation techniques that manipulate the training data itself, including data scrubbing, gender swapping and counterfactual data augmentation approaches. We also look at using de-biased word embeddings in the representation of the training data. We …