Interactions, organization, and emergent behaviors are fundamental to all complex systems. These characteristics can be observed in every real-world scenario, prompting the question: how do these interactions among el...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
Interactions, organization, and emergent behaviors are fundamental to all complex systems. These characteristics can be observed in every real-world scenario, prompting the question: how do these interactions among elements serve as the foundation of complex systems? Over the years, researchers have developed various methods to answer such a question. One widely used bottom-up approach is agent-based simulation, which deduces a system's properties by examining its components. Alternatively, a system can be modeled via a top-down approach, such as hypergraphs, mathematical structures abstracting higher-order interactions. These two methods provide different perspectives on the same system, each offering unique and valuable insights. In this Ph.D. project, my primary focus is on social systems, aiming to shed light on the dynamics of group behaviors in online social media.
The pervasiveness of new information flows and integration models stemming from the platformization of social life, which has been driven by the widespread adoption of novel communication technologies and digital soci...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
The pervasiveness of new information flows and integration models stemming from the platformization of social life, which has been driven by the widespread adoption of novel communication technologies and digital social networks, has facilitated collective actions in terms of mobilization, reach, organization, and the emergence of new communication tools. Alongside the centrality of the internet in the dynamics of social life, extremist movements, which were already present in society, have gained new means to perpetuate and organize themselves. Telegram, as a digital platform with content moderation policies that are lenient compared to others, has become an open stage for the concentration of extremist users and groups. In view of this, the platform in question has also become a research object for studies on online radicalization, making it possible to monitor radical ideologies and the social consequences observed in the promotion of violence and hate speech. Seeking to identify the immaterial bases and social dynamics that compose extremist groups in Brazil, an analysis of data extracted from Telegram between May 1st, 2023, and August 30th, 2023, was conducted. For this purpose, a hybrid approach was adopted, combining big data techniques and sociological analyses. The results of this work shed light on how the opinions encouraged and expressed in radical digital communities contribute to the promotion of violence outside digital media platforms.
Lack of encyclopedic text contributors, especially on Wikipedia, makes automated text generation for low resource (LR) languages a critical problem. A step towards enabling this is to generate the structural outline o...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
Lack of encyclopedic text contributors, especially on Wikipedia, makes automated text generation for low resource (LR) languages a critical problem. A step towards enabling this is to generate the structural outline of Wikipedia pages for LR languages. Hence, in this work, we propose and study OutlineGen, the problem of generating the outline of Wikipedia pages for LR languages using minimal information in the form of entity name, language and domain. The OutlineGen task is challenging because even within a (language, domain) pair, the outlines vary a lot across entities. Further, given the diversity of Wikipedia editors and audience, the outlines are not consistent across languages. First, we create a dataset, WikiOutlines, which contains Wikipedia section outlines from similar to 166K Wikipedia pages across 8 domains and 10 languages. Then, we investigate the effectiveness of non-neural weighted finite state automata as well as Transformer-based methods for this task. We make the code and data publicly available.
Verifiable Random Functions (VRFs) are public key primitives that allow the holder of the secret key to generate pseudorandom values that are publicly verifiable. An important property of VRFs is uniqueness which guar...
详细信息
ISBN:
(纸本)9783031786785;9783031786792
Verifiable Random Functions (VRFs) are public key primitives that allow the holder of the secret key to generate pseudorandom values that are publicly verifiable. An important property of VRFs is uniqueness which guarantees a unique valid (i.e. verifiable using the public key) output for an input. X-VRF is a proposed post-quantum secure VRF that is based on XMSS, a post-quantum hash-based signature scheme that is approved by NIST. In this paper, we show a subtle discrepancy in the security proof of the uniqueness property of X-VRF that allows us to construct a concrete deterministic attack that breaks the uniqueness of X-VRF by constructing two valid outputs for an input. The attack is on the uniqueness of WOTS+ signature scheme, the one-time signature scheme used in XMSS, and directly extends to XMSS showing that XMSS is not a unique signature scheme and so X-VRF does not satisfy the uniqueness property of a secure VRF scheme. While the attack questions the proved security of X-VRF, it does not break the uniqueness of X-VRF in practice if no collision is known for the underlying hash function of WOTS+.
In this study, we propose a novel multi-criteria recommendation model that utilizes predefined, implicit, and undefined criteria. We use a semantic similarity-based sentence clustering method to identify the predefine...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
In this study, we propose a novel multi-criteria recommendation model that utilizes predefined, implicit, and undefined criteria. We use a semantic similarity-based sentence clustering method to identify the predefined and implicit criteria and a sentiment analyzer to estimate their ratings. Semantic similarity between each sentence in the review and the predefined criteria are calculated, and then the sentence is assigned to the most similar criteria. The criteria that are extracted from the review and are aligned with predefined criteria are referred to as implicit criteria. A sentence is considered as expressing opinions on an undefined criterion if the similarity score between this sentence and all the predefined criteria is lower than a predefined threshold. Ratings are computed for each extracted implicit criterion and the undefined criterion based on the review content. Finally, we use all three types of criteria and an aggregation model to make the final rating prediction for the recommendation system. Our proposed method demonstrates the superiority compared to several baselines on TripAdvisor and Beer Advocate datasets.
Digital education curricula underwent substantial changes worldwide in the last decade, emphasizing computational thinking and problem-solving skills, as introduced in Austria in 2018 for students aged 10-14. This stu...
详细信息
ISBN:
(纸本)9783031734731;9783031734748
Digital education curricula underwent substantial changes worldwide in the last decade, emphasizing computational thinking and problem-solving skills, as introduced in Austria in 2018 for students aged 10-14. This study evaluates the effectiveness of a novel learning environment in promoting these skills and facilitating the implementation of new curricula. The research utilized the BBC micro:bit device for physical computing and block-based programming, alongside an open educational resource textbook. A quasi-experimental pre- and post-test design, based on tasks from the Bebras International Challenge, assessed four units of learning activities conducted over 5-8 weeks. Results demonstrate the potential of the learning environment materials to foster confidence in computational thinking among teachers and students, suggesting a successful promotion of the Computational Thinker in middle schools through practical everyday classroom application aligned with new digital education curricula.
Providing individualized support to students during debugging is a huge challenge for teachers in K-12 computing education. In these everyday assessment situations, they often have little time to gather relevant infor...
详细信息
ISBN:
(纸本)9783031734731;9783031734748
Providing individualized support to students during debugging is a huge challenge for teachers in K-12 computing education. In these everyday assessment situations, they often have little time to gather relevant information to diagnose the student's problem and respond with an appropriate intervention. Thus, diagnostic and intervention processes in debugging are essential for teachers. Despite the importance, there is a lack of research on this topic and its possible implications for the classroom. Therefore, this paper aims to provide insights into teachers' diagnostic and intervention processes in debugging. In this qualitative study, we investigate situation-specific aspects teachers consider for diagnosing error situations and interventions they apply in a specific debugging-related situation using video vignettes. To this end, scripted video vignettes depicting a typical classroom debugging situation were presented to experienced teachers, who reported their observations in open-ended questionnaires. The data were then analyzed using qualitative content analysis. The results show a wide range of different aspects used in diagnostic processes and in proposed interventions. Furthermore, our results indicate that teachers rarely address motivational and emotional aspects of debugging in their interventions. These findings contribute to a better understanding of teachers' diagnostic and intervention processes and how they can be fostered in teacher education.
The growing influence of text-embedded images in online communication demands effective strategies for identifying hate speech. The use of hate speech in different contexts makes it necessary to study it in a particul...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
The growing influence of text-embedded images in online communication demands effective strategies for identifying hate speech. The use of hate speech in different contexts makes it necessary to study it in a particular context. Simultaneously, identifying hate speech targets is a crucial research domain as it can offer insights into propagation, impacts, and potential interventions against hate speech. In this article, we address the problem of hate speech detection and target identification in text-embedded images by presenting a comprehensive approach that combines textual and visual cues to accurately detect hate speech and targets within the context of the Russia-Ukraine Crisis. Leveraging a dataset of 4,723 text-embedded images centered around this crisis, we integrate features from the knowledge graph, ontological insights to indicate the presence of hate speech presence, TF-IDF, Named Entity Recognition (NER), and robust vision-language representations. We also provide the rationale behind using different features in our implementation. Our method surpasses existing baselines and methodologies, suggesting the importance of each feature we employ in decision-making.
With the emergence of short video-sharing platforms, engagement with social media sites devoted to opinion and knowledge dissemination has rapidly increased. Among these platforms, TikTok is one of the most popular gl...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
With the emergence of short video-sharing platforms, engagement with social media sites devoted to opinion and knowledge dissemination has rapidly increased. Among these platforms, TikTok is one of the most popular globally and has become the platform of choice for transgender and nonbinary individuals, who have formed a large community to mobilize personal experience and exchange information. The knowledge produced in online spaces can influence the ways in which people understand and experience their own gender and transitions, as they hear about others and weigh experiential and medical knowledge against their own. This paper extends current research and past interview methods on gender euphoria and gender dysphoria to analyze what and how online communities on TikTok discuss these two types of gender experiences. Our findings indicate that gender euphoria and gender dysphoria are differently described in online TikTok spaces. These findings indicate similarities in the words used to describe gender dysphoria as well as gender euphoria in both the comments of videos and content creators' hashtags. Finally, our results show that gender euphoria is described in more similar terms between transfeminine and transmasculine experiences than gender dysphoria, which appears to be more differentiated by gendering experience and transition goals. We hope this paper can provide insights for future research on understanding transgender and nonbinary individuals in online communities.
This paper presents the EMOCC online tool for the calculation of emotions, given the appraisal of events on behalf of the characters. The tool is based on a well known OCC theory, implemented as a rule-based model. Th...
详细信息
ISBN:
(纸本)9783031784491;9783031784507
This paper presents the EMOCC online tool for the calculation of emotions, given the appraisal of events on behalf of the characters. The tool is based on a well known OCC theory, implemented as a rule-based model. The user can input the appraisal of events and entities and the system calculates the emotions felt by the characters at hand. The tool has been tested in courses that address the difference between the human evaluation and the algorithmic tool.
暂无评论