Data storytelling is an emerging, multidisciplinary field that employs data to change pre-conceived notions of audiences using pieces of information and data visualization. Traditionally considered a technical skill f...
详细信息
ISBN:
(纸本)9783031784491;9783031784507
Data storytelling is an emerging, multidisciplinary field that employs data to change pre-conceived notions of audiences using pieces of information and data visualization. Traditionally considered a technical skill for engineering, it has proven beneficial for disciplines in Humanities and Social sciences. This work-in-progress is based on the experiences gathered from two classrooms of a new course titled "Computational Thinking for Communications", taught in a Peruvian university. The 16-week course involved one theoretical and two practical hours weekly. Semi-structured interviews were conducted with the 50 enrolled students who were creating data storytelling projects using open data sources. The students' experiences, motivations, and challenges were explored, such as a perceived disconnection between theory and practice. Future evaluations aim to refine the curriculum, addressing these challenges to enhance the integration of data storytelling in Communication education.
Online social networks (OSNs), such as Twitter and Facebook, enable users to create, share, and interact with diverse content, thereby producing intricate pathways for information propagation. This flow, which can be ...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
Online social networks (OSNs), such as Twitter and Facebook, enable users to create, share, and interact with diverse content, thereby producing intricate pathways for information propagation. This flow, which can be modeled through graphs that capture Follower/Following relationships and various interactions such as retweets and mentions, can offer valuable insights into the dynamics of online social behavior and information sharing. While the Follower/Following networks are important for modeling user characteristics and behaviors, their construction can prove expensive in terms of both time and resources. More importantly, in some OSNs, partial or full restrictions have been posed on the access to users' Follower/Following information, effectively rendering the regular construction process of Following graphs intractable. In this paper, we explore the viability of extracting users' Following connections from their Retweet/Mention networks through predictive models. Taking Twitter as a case study, we train and contrast the performance of five different models, including classical Machine Learning (ML) methods as well as a recently developed Deep Learning (DL) approach, on two different datasets. The difference in prediction results across the models and datasets is traced and analyzed. Lastly, we round up the contributions by providing a carefully curated Twitter dataset compiled from over 9,000 individuals' timelines, encapsulating their retweets, followers, and following networks. Taken together, the results and findings featured herein can aid in paving the way for improved understanding and modeling of online social networks.
In today's digital landscape, social networks crucially shape perceptions and preferences but often facilitate echo chambers, limiting diverse thought and increasing polarization. This research addresses echo cham...
详细信息
ISBN:
(纸本)9783031785535;9783031785542
In today's digital landscape, social networks crucially shape perceptions and preferences but often facilitate echo chambers, limiting diverse thought and increasing polarization. This research addresses echo chambers on social networks, specifically Facebook, by developing diverse recommender systems using the MovieLens 100k dataset. We implement collaborative filtering, content-based filtering, and hybrid approaches to increase content diversity and reduce echo chamber effects. Our analysis confirms the presence of echo chambers and evaluates various recommendation algorithms' effectiveness in mitigating these effects. We propose enhancements for recommendation algorithms, including incorporating serendipity and novelty, diversifying data sources, and integrating user feedback to promote diverse viewpoints. Our experiment shows that the clustering distance-based method performs best for both movie and social network datasets with diversity values of 0.84 and 0.56 respectively. This study enriches the literature on online echo chambers and suggests strategies for more inclusive recommendation systems to encourage open dialogue and understanding.
A notable problem faced by developers of smart contracts running on an extended UTxO (EUTxO) ledger is double satisfaction: interacting contracts that make payouts may validate with insufficient payments made to some ...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
A notable problem faced by developers of smart contracts running on an extended UTxO (EUTxO) ledger is double satisfaction: interacting contracts that make payouts may validate with insufficient payments made to some recipients. In this work, we formalize the notion of a stateful contract constraint being vulnerable to double satisfaction. Next, we formalize interaction among scripts and stateful contracts via message-passing, consisting of a specification and an implementation of a stateful distributed message-passing contract, together with a proof of the integrity of its implementation. Messages specify sender and receiver outputs, as well as the data and assets being communicated, which are recorded on the ledger in the form of special NFT tokens distributed across UTxO entries that also contain the sent assets. We give two applications of our design by considering a message: (1) as a record of a successful script computation, akin to memoization, and (2) as a mechanism for asynchronous structured contracts communication that enables a principled separation of contract communication from its computation. Building on this application of message-passing, we present a result stating that making payouts from stateful contracts using message-passing is not vulnerable to double satisfaction.
The proliferation of AI systems has brought increased attention to the process of creating Interactive Digital Narratives (IDNs). There is still no formal IDN design model, as previous efforts were focused on understa...
详细信息
ISBN:
(纸本)9783031784491;9783031784507
The proliferation of AI systems has brought increased attention to the process of creating Interactive Digital Narratives (IDNs). There is still no formal IDN design model, as previous efforts were focused on understanding finished artefacts. This paper addresses the theoretical gap in terms of the interactive digital narrative design process by considering the role of AI and proposing a novel IDN design model that includes the possibility of collaborative interaction between AI and designers in the context of creating IDNs, thereby facilitating the systematization of knowledge. This model is an extension of the existing SPP model introduced by Koenitz, reinterpreted through a design-driven approach. This broader perspective distinguishes the creative design process, the authoring process and the data pipeline, providing a more fine-grained understanding in contrast to a unified authoring process as described in current IDN literature.
The identification of important nodes in a network is a pervasive task in a variety of disciplines from sociology and bibliometry to geography and chemistry, and an ever growing number of centrality indices is propose...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
The identification of important nodes in a network is a pervasive task in a variety of disciplines from sociology and bibliometry to geography and chemistry, and an ever growing number of centrality indices is proposed for this purpose. While such indices are often adhoc, preservation of the vicinal preorder has been identified as the core axiom shared by centrality rankings on undirected graphs. We extend this idea to directed graphs by defining vertex preorders based on directed neighborhood-inclusion criteria. While, for the undirected case, the vicinal preorder is total on threshold graphs and preserves all standard centrality indices, we show that our generalized preorders are total on certain subclasses of threshold digraphs. We thus provide a consistent formalization of the hitherto rather conceptual notions of radial, medial, and hierarchical centralities.
This paper discusses the role of the game designer as a steward of player's agency by examining the design of Rainy Day, a digital narrative game created to explore feelings of apathy and anxiety. The objective of...
详细信息
ISBN:
(纸本)9783031784521;9783031784538
This paper discusses the role of the game designer as a steward of player's agency by examining the design of Rainy Day, a digital narrative game created to explore feelings of apathy and anxiety. The objective of the game was not only to capture the creator's state of mind, but also to evoke similar feelings in the player. The game features numerous ambiguous choices with unclear outcomes, sought to capture the cyclical nature of apathy and the difficulty of making choices in such a state. Through such decisions, many game design guidelines were purposely broken, and player's agency was reduced. These decisions, however, created the intended effect without diminishing player interest.
In this paper, we investigate unexplored aspects of scheduler contention: We systematically study the leakage of all scheduler queues on AMD Zen 3 and show that all queues leak. We mount the first scheduler contention...
ISBN:
(纸本)9783031786754;9783031786761
In this paper, we investigate unexplored aspects of scheduler contention: We systematically study the leakage of all scheduler queues on AMD Zen 3 and show that all queues leak. We mount the first scheduler contention attacks on Zen 4, with a novel measurement method evoking an out-of-order race condition, more precise than the state of the art. We demonstrate the first inter-keystroke timing attacks based on scheduler contention, with an F-1 score of >= 99.5 % and a standard deviation below 4 ms from the ground truth. Our end-to-end JavaScript attack transmits across Firefox instances, bypassing cross-origin policies and site isolation, with 891.9 bit/s (Zen 3) and 940.7 bit/s (Zen 4).
Coercion resistance is a strong security property of electronic voting that prevents adversaries from forcing voters to vote in a specific way by using threats or rewards. There exist clever techniques aimed at preven...
详细信息
ISBN:
(纸本)9783031722431;9783031722448
Coercion resistance is a strong security property of electronic voting that prevents adversaries from forcing voters to vote in a specific way by using threats or rewards. There exist clever techniques aimed at preventing voter coercion based on fake credentials, but they are either inefficient or cannot support features such as revoting without leaking more information than necessary to coercers. One of the reasons is that invalid ballots cast due to revoting or coercion need to be removed before the tallying. In this paper, we propose a coercion-resistant Internet voting scheme that does not require the removal of invalid ballots, hence avoids the leakage of information, but still supports revoting. The scheme is very efficient and achieves linear tallying.
So far, in the Netherlands there has been no compulsory education in digital literacy or informatics in primary or secondary education. In 2022, the Dutch Ministry of Education, Culture and science tasked the Netherla...
详细信息
ISBN:
(纸本)9783031734731;9783031734748
So far, in the Netherlands there has been no compulsory education in digital literacy or informatics in primary or secondary education. In 2022, the Dutch Ministry of Education, Culture and science tasked the Netherlands Institute for Curriculum Development (SLO) to develop the curriculum (i.e., the core objectives) for digital literacy for primary and lower secondary education. SLO formed a team including elementary and lower secondary education teachers, education specialists and teacher educators, and SLO curriculum specialists. Over a course of fifteen months, this team organized several meetings. They reviewed Dutch and international curricula and frameworks on digital literacy, informatics, etc., and consulted more than twenty experts. Following the standardized curriculum development procedure, the team formulated their vision on digital literacy in the context of Dutch situation yielding a document called characteristic, and then the core objectives constituting the curriculum were formulated. During this iterative development process, the team consulted the internal SLO monitoring team and the external advisory board consisting of representatives of stakeholder organizations involved or invested in digital literacy education. In March 2024, the digital literacy curriculum was finalized. It consists of nine core objectives grouped in three domains: (A) Practical knowledge and skills, (B) Designing and making, and (C) Interaction between digital, technology, digital, media, people and the society. This paper describes the curriculum development process and presents the resulting core objectives. The question leading this paper is: which aspects of the curriculum development process were beneficial for carrying out the necessary steps leading to the results?
暂无评论