Paulius Jurcys, Mark Fenwick
This papers explores the question of human authorship when works are created with generative AI tools.
Menampilkan 20 dari ~80408 hasil · dari CrossRef, DOAJ, arXiv
Paulius Jurcys, Mark Fenwick
This papers explores the question of human authorship when works are created with generative AI tools.
Christopher Augustine
The research assessed the role of social media in the unfolding of the EndSARS demonstrations in Nigeria. The study was necessary given the persistent call by governments for the strict regulation of social medium platforms. This is given governments' claim that social media is being misused. The study, however, reveals that social media use is determined by users' social experiences, including those caused by governments.
Adib Mohammed Syed
The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual academic research.
Nelini Jayathilake, Darshana Sedera
With the expansion of internet-based platforms, social media and sharing economy, most individuals are tempted to review products or services that they consume.
Maggie Delano
Modern engineering education tends to focus on mathematics and fundamentals, eschewing critical reflections on technology and the field of engineering. In this paper, I present an elective engineering course and a 3-lecture module in an introductory course that emphasize engaging with the social impacts of technology.
Yi Su, Jason CS Leung, Timothy CY Kwok
Daniel Schwabe, Carlos Laufer
This paper presents the KG Usage framework, which allows the introduction of KG features to support Trust, Privacy and Transparency concerns regarding the use of its contents by applications. A real-world example is presented and used to illustrate how the framework can be used.
Shivram Tabibu
Wearable devices are transforming computing and the human-computer interaction and they are a primary means for motion recognition of reflexive systems. We review basic wearable deployments and their open wireless communications. An algorithm that uses accelerometer data to provide a control and communication signal is described. Challenges in the further deployment of wearable device in the field of body area network and biometric verification are discussed.
Fred Phillips
The entrepreneurial scene suffers from a sick venture capital industry, a number of imponderable illogics, and, maybe, misplaced adulation from students and the public. The paper details these problems, finds root causes, and prescribes action for higher education professionals and institutions.
Virgilio A. F. Almeida, Danilo Doneda, Carolina Rossini
App stores challenge the culture of openness and resistance to central authorities cultivated by the pioneers of the Internet. Could multistakeholder governance bodies bring more inclusivity into the global cyberspace governance ecosystem?
Borja Moya-Gómez, Juan Carlos García-Palomares
This paper uses traditional maps in animations to show traffic congestion effects in London
Frada Burstein, Helana Scheepers, Gaye Deegan
These proceedings include full papers and research-in-progress papers presented at the ACIS 2015 Conference in Adelaide, Australia from November 30th to December 4th, 2015.
Vassilis Giannakopoulos, George Giannakopoulos
The purpose of this document is to provide a brief overview of open consultation approaches in the current, international setting and propose a role for Information Technologies (IT) as a disruptive force in this setting.
John Prpic, Piper Jackson, Thai Nguyen
In this work, we present a high-level computational model of IT-mediated crowds for collective intelligence. We introduce the Crowd Capital perspective as an organizational-level model of collective intelligence generation from IT-mediated crowds, and specify a computational system including agents, forms of IT, and organizational knowledge.
Sumit Katiyar, R. K. Jain, N. K. Agrawal
Erroneous submission in violation of copyright removed by arXiv admin.
Zbigniew Mrozek
A quality assurance system (QA) should ensure that student needs are met. It also respects accreditation requirements and student perceptions, supports training and development of teaching staff, controls costs and improves efficiency of e-learning system.
Alessandro Frigeri, Gisella Speranza
This article describes similarities of the scientific method and the free open source software development, and how reproducibility is the key of an healthy scientific production.
CY Hu, CS Wu, HF Tsai et al.
Milk fat globule-EGF factor 8 (MFG-E8) is a molecule implicated in phagocytic clearance of apoptotic cells by bridging between macrophages and apoptotic cells. Defects in MFG-E8 cause lupus-like disease in murine models. The aim of our study is to determine whether genetic variation in MFG-E8 predisposes human to systemic lupus erythematosus (SLE). A case-control study of MFG-E8 genetic polymorphism was performed on 147 SLE patients and 146 non-lupus control subjects. Single nucleotide polymorphisms (SNPs) in the coding sequence of human MFG-E8 gene were investigated. SNPs on MFG-E8 residues 3 (3Arg or Ser) and 76 (76Leu or Met) did not show genetic linkage. Genetic polymorphism on MFG-E8 residue 76 correlated significantly to SLE. The MFG-E8-76Met allele predisposed subjects to SLE in a recessive mode (odds ratio: 2.1, P = 0.020), while carriage of MFG-E8-76Leu were negatively associated with SLE. The MFG-E8 genotypic combinations with 3Ser and 76Leu showed the most pronounced protective effect on SLE when compared to the most predisposing genotype 3Arg/Arg-76Met/Met (OR: 0.29, P = 0.007). According to our result, MFG-E8 is associated with SLE predisposition in Taiwanese. Our study implicates that the impairment of phagocytic clearance of apoptotic cells through phosphotidylserine-dependent MFG-E8 system may lead to the development of human SLE.
Raymond J. Butler
This brief paper outlines how spreadsheets were used as one of the vehicles for John Rusnak's fraud and the revenue control lessons this case gives us.
Halaman 2 dari 4021