I Give Permission for Public Access to My Thesis and for Any Copying to Be Done at the Discretion of the Archives Librarian And/Or the College Librarian
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
On the Road to Hades–Helpful Automatic Development Email Summarization
On The Road to Hades–Helpful Automatic Development Email Summarization Alberto Bacchelli, Michele Lanza, Ebrisa Savina Mastrodicasa REVEAL @ Faculty of Informatics - University of Lugano, Switzerland Abstract—During the development of software systems, pro- Considered the numerous reasons why a programmer might grammers often discuss issues such as structural decisions, start an email conversation with a single colleague or the defects, time management, etc. Especially in distributed devel- entire rest of the team, and that a software project might opment, where most of the discussions among developers take place via email, developers receive daily dozens, if not hundreds, be carried out for several months or years, it is easy to of messages, either personally sent to them or broadcasted by picture the vast amount of produced emails. For example, on mailing lists they are subscribed to. Dealing with these emails the Apache developer mailing list, there were about 4,996 requires developers to spend long time reading voluminous messages in the year 2004 and 2,340 in 2005, and for gcc, amounts of text. these numbers were 19,173 and 15,082 [3]. To maintain A way to solve this problem is summarization: Producing a summary of a text means reducing it to a version based only team coordination and perform work on a software system, on fundamental elements, by removing the parts unnecessary software developers must keep track, read, and understand a for the comprehension. Since researchers presented techniques voluminous amount of electronic communication. This is a for automatically summarizing natural language documents challenge, not only because of the large number of emails– or source code, we are interested in investigating whether it which require time and effort to be read–popping up day after would be possible to also summarize development emails, so that developers could consult small summaries instead of long day in a developer’s mailbox, but also because retrieving threads. -
Sample Iis Publication Page
https://doi.org/10.48009/1_iis_2012_133-143 Issues in Information Systems Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC Stan Pendergrass, Robert Morris University, [email protected] ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and e- banking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited. -
Why Do People Seek Anonymity on the Internet?
Why Do People Seek Anonymity on the Internet? Informing Policy and Design Ruogu Kang1, Stephanie Brown2, Sara Kiesler1 Human Computer Interaction Institute1 Department of Psychology2 Carnegie Mellon University 5000 Forbes Ave., Pittsburgh, PA 15213 [email protected], [email protected], [email protected] ABSTRACT literature that exists mainly derives from studies of one or a In this research we set out to discover why and how people few online communities or activities (e.g., the study of seek anonymity in their online interactions. Our goal is to 4chan in [5]). We lack a full understanding of the real life inform policy and the design of future Internet architecture circumstances surrounding people’s experiences of seeking and applications. We interviewed 44 people from America, anonymity and their feelings about the tradeoffs between Asia, Europe, and Africa who had sought anonymity and anonymity and identifiability. A main purpose of the asked them about their experiences. A key finding of our research reported here was to learn more about how people research is the very large variation in interviewees’ past think about online anonymity and why they seek it. More experiences and life situations leading them to seek specifically, we wanted to capture a broad slice of user anonymity, and how they tried to achieve it. Our results activities and experiences from people who have actually suggest implications for the design of online communities, sought anonymity, to investigate their experiences, and to challenges for policy, and ways to improve anonymity tools understand their attitudes about anonymous and identified and educate users about the different routes and threats to communication. -
The Influence of Anonymity on Participation in Online Communities
Thèse de doctorat de l’UTT Malte PASKUDA The Influence of Anonymity on Participation in Online Communities Spécialité : Ingénierie Sociotechnique des Connaissances, des Réseaux et du Développement Durable 2016TROY0033 Année 2016 THESE pour l’obtention du grade de DOCTEUR de l’UNIVERSITE DE TECHNOLOGIE DE TROYES Spécialité : INGENIERIE SOCIOTECHNIQUE DES CONNAISSANCES, DES RESEAUX ET DU DEVELOPPEMENT DURABLE présentée et soutenue par Malte PASKUDA le 24 octobre 2016 The Influence of Anonymity on Participation in Online Communities JURY M. M. BAKER DIRECTEUR DE RECHERCHE CNRS Président (Rapporteur) Mme N. GAUDUCHEAU MAITRE DE CONFERENCES Examinateur Mme M. LEWKOWICZ PROFESSEUR DES UNIVERSITES Directeur de thèse M. M. PRILLA PROFESSOR Rapporteur M. M. ROHDE DOKTOR Examinateur Acknowledgements Myriam Lewkowicz Michael Baker Michael Prilla Nadia Gauducheau Markus Rohde Michel Marcoccia Valentin Berthou Matthieu Tixier Hassan Atifi Ines Di Loreto Karine Lan Lorraine Tosi Aurlien Bruel Khuloud Abou Amsha Josslyn Beltran Madrigal Les membres de lquipe Tech-CICO et les membres du projet TOPIC trouvent ici mes remerciements les plus sincres. Abstract This work presents my PhD thesis about the influence of anonymity on par- ticipation in online environments. The starting point of this research was the observation of the design process of an online platform for informal caregivers. I realized that there is no knowledge about the practical effects that an anony- mous identity system would have. This thesis contains the subsequent literature review, which has been synthesized into a model that shows which participation factors might be influenced by anonymity. Three studies on existing online en- vironments have been conducted: One on Youtube, where there was a change in the comment system forbidding anonymous comments; one on Quora, where users can choose to answer questions anonymously; and one on Hacker News, where users choose how many identity factors they want to present and which name they use. -
Police Interactions with the Community on Facebook: an Examination of the Content Of
Police interactions with the community on Facebook: An examination of the content of the message police communicate with citizens on Facebook, community response, and factors associated with different communication patterns. A dissertation submitted to the Graduate School of the University of Cincinnati in partial fulfillment of the requirements for the degree of Doctorate of Philosophy (Ph.D) in the School of Criminal Justice of the College of Education, Criminal Justice, and Human Services by Bradley Buckmeier 2019 B.A. University of Cincinnati, 2008 M.S. University of Cincinnati, 2009 Dissertation Committee: James Frank, PhD (Chair) Lawrence Travis, PhD Edward Latessa, PhD Charles Klahm, PhD Abstract The nature of interactions between the police and the public has been an important topic in policing research. Social media are a relatively new platform that the police can use to interact with the community. Facebook is a social media website which allows the police to communicate directly with the community and, at the same time, allows the community to respond. Limited research exists about the nature of the interactions the police are having with the community on Facebook. This dissertation will examine police department interactions with the community using Facebook as the means of communication. Specifically, it will examine the nature and content of their messages when communicating with citizens on Facebook, the factors that may be associated with different online communication patterns of the police (i.e., community factors, year of adoption of Facebook) and how the community responds. ii Copyright Notice © Bradley Buckmeier iii Acknowledgments This dissertation marks the end of a long journey in my life that I could not have done alone. -
Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. -
Don't Feed the Trolls: a Cautionary Tale
Don’t Feed the Trolls: others (Linux, of course). In fact, the phrase originated as a reference to the A Cautionary Tale comic book the Fantastic Four, as one of the characters could turn himself DANA SAMUEL into a Human Torch. Chat participants would use the HTML‐styled, bracketed annotation to insult other participants online. In Eddo Stern’s Best. Flame War. Ever. we are presented with an online argu‐ <flame on> You’re pretty stupid for ment over seemingly insignificant not knowing what MMPORPG means. game‐playing topics that grows quickly Go look it up on Wiki. </flame off> out of proportion and out of the realm of online experience. Two collaged When the internet opened to the animated masks – each an amalgam of commercial world, and more people heraldry, knighthood, pixilated joined these groups, more language warriors, fantasy species, castles, and jargon was developed to describe shields and symbols – animate a flame the goings‐on in these communities. A war that actually took place online “troll” is one who writes nasty flames over the role‐playing game Everquest, just to make others angry and to be an MMPORPG. annoying. “Meat‐puppets” and “sock‐ Did I just make you feel like a total puppets” are those who are deceptive “newb”? about their identities or their true Online games, discussion boards and allegiances on a discussion board. communities have developed their How all very “D&D.” own language since these online It’s said, by several theorists, that worlds were first populated in people can be more uninhibited online, research and academia, and then, later they can change their personality, role‐ (post‐cold war, after the military had play and morph into who they no need for such a specialized perceive themselves to be. -
CS 508 102 NOTE Definition of Flaming, Which Asserts Both a Behavioral and Reproductions Supplied by EDRS Are the Best That
DOCUMENT RESUME ED 355 572 CS 508 102 AUTHOR Thompsen, Philip A. TITLE A Social Influence Model of Flaming in Computer-Mediated Communication. PUB DATE Feb 93 NOTE 9p.; Paper presented at the Annual Meeting of the Western States Communication Association (64th, Albuquerque, NM, February 12-16, 1993). PUB TYPE Speeches/Conference Papers (150) -- Viewpoints (Opinion/Position Papers, Essays, etc.) (120) EDRS PRICE MFO1 /PCO1 Plus Postage. DESCRIPTORS Communication Research; Definitions; *Electronic Mail; Higher Education; Interpersonal Communication; Models; *Social Influences IDENTIFIERS *Communication Behavior; Computer Mediated Communication; *Flaming (Computei Mediated Communication) ABSTRACT This paper explores the phenomenon of "flaming," which has been typically cited as an antisocial effect of computer-mediated communication. The paper discusses the diverse range of conceptual and operational definitions of flaming found in the literature. The paper offers a four-point critique of previous theoretical explanations of flaming, and suggests an alternative definition of flaming, which asserts both a behavioral and interpretive dimension to flaming. Drawing from the work of J. Fulk, J. Schmitz, and C. W. Steinfield, the paper then develops a social influence model of flaming that provides.a more flexible and powerful approach than previous theories, while yielding potentially useful insights to guide future research. A figure representing the model is included. (Contains 56 references.)(RS) *********************************************************************** -
Literature Review.Docx
HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS by Adam Bartek Submitted in partial fulfillment of the requirements for Departmental Honors in the Department of Information Systems and Supply Chain Management Texas Christian University Fort Worth, Texas May 2, 2014 ii HOW COMPUTER-MEDIATED COMMUNICATION CAN CONFUSE EMOTIONS IN DIVERSE TEAMS Project Approved: Supervising Professor: Beata Jones, Ph.D. Department of Information Systems and Supply Chain Management Charles Greer, Ph.D. Department of Management, Entrepreneurship, and Leadership David Preston, Ph.D. Department of Information Systems and Supply Chain Management iii ABSTRACT This study focused on how various forms of CMC (Computer-mediated communication) were perceived and analyzed in a team setting by different genders and members of different generational groups. Specifically, the aspects of flaming, emoticons, and conflict resolution were examined in detail. Hypotheses concerning flaming were mixed as while all participants disliked flaming, baby boomer-age respondents were more tolerant of it. However, all hypotheses concerning emoticon usage were not supported. Neither gender specifically supported emoticon usage. Also, younger generations were not as supportive of emoticon usage in a team setting as expected. Finally, mixed results were found for hypotheses concerning conflict resolution. While male respondents were more comfortable with conflict over CMC, there was no significantly higher level of comfort concerning conflict and CMC for younger generations. Implications and possible avenues for future research are also discussed. iv ACKNOWLEDGEMENTS This paper would not exist without the assistance and help of numerous professors, advisors, family, and friends. In particular, the guidance of the thesis committee was greatly appreciated. -
Deciphering L33tspeak
Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ............................................................................................................................... -
Forming Innovative Learning Environments Through Technology. Conversations in Excellence. INSTITUTION National Catholic Educational Association, Washington, DC
DOCUMENT RESUME ED 455 828 IR 020 851 AUTHOR Cimino, Carol, Ed.; Haney, Regina M., Ed.; O'Keefe, Joseph M., Ed.; Zukowski, Angela Ann, Ed. TITLE Forming Innovative Learning Environments through Technology. Conversations in Excellence. INSTITUTION National Catholic Educational Association, Washington, DC. ISBN ISBN-1-55833-253-7 PUB DATE 2000-00-00 NOTE 162p. AVAILABLE FROM National Catholic Educational Association, 1077 30th St., NW, Suite 100, Washington, DC 20007-3852 (NCEA members, $17; non-members, $22) .Web site: http://www.ncea.org. PUB TYPE Books (010) Collected Works General (020) EDRS PRICE MF01/PC07 Plus Postage. DESCRIPTORS *Catholic Educators; *Catholic Schools; Computer Assisted Instruction; *Computer Uses in Education; Educational Development; Educational Environment; Educational Practices; *Educational Technology; Elementary Secondary Education; Instructional Innovation IDENTIFIERS Technology Integration ABSTRACT Selected Programs for Improving Catholic Education (SPICE) was initiated in 1996. This venture of the National Catholic Educational Association, in partnership with the Jesuit Institute at Boston College, identifies exemplary Catholic educational programs from around the counLry, and invites the schools and dioceses named to share their ideas and practices in a 3-day gathering called Conversations in Excellence at Boston College. The focus area of SPICE 1999 was "Forming Innovative Learning Environments through Technology." Specifically, the SPICE committee was looking for programs that seamlessly weave the use -
Simon Young from the Slants
11/23/2010 Slant Eye For The Round Eye: Intervie… Can you have two Asian American Top Chef winners i... We’ve had some mixed responses to our ethnic theme, though for the Xu Yong: Sadly, we never got to most part it has been positive. We’ve had a lot of fans tell us that its know you refreshing to find an Asian artist playing dance rock, that they kind of sing certain songs like “Sakura, Sakura” as an anthem (“We sing for Celtics and Cavs: Game 4 tactics the Japanese and the Chinese and all of the dirty knees…”). It’s an Film: The Warlords amazing feeling to be playing these songs and watching kids sing along First Gas, Then Rice, Now Beer? to every word. M. Night Shyamalan's "The Happening" We had one review recently that took some jabs at us for being Asian; Kiyomi saying that we had self-confidence issues and because of our Asian More on Asian Eyelid Surgery themes. Rather than reviewing our music at all, the entire article Fusion Stories: 10 books for young focused on this – which resulted in a substantial amount of hate mail readers for APA... sent to the publication for their “racist” remarks. Billboard.com Review: Lyrics Born and Everywhere A... Last question. Five things you really miss when you're touring on the road. Kristine Sa: My Last Goodbye Film: Once Upon A Time In Corea 1. Seeing my friends in my hometown or having any semblance of a Google and Supporting disaster “normal” relationship. relief in Myanmar 2.