Interactive Digital Narrative researchers have used a variety of methodologies to assess players' experiences with IDN processes, systems and artifacts. Interviewing and surveying have been the most prevalent meth...
ISBN:
(纸本)9783031784521;9783031784538
Interactive Digital Narrative researchers have used a variety of methodologies to assess players' experiences with IDN processes, systems and artifacts. Interviewing and surveying have been the most prevalent methodology and, less frequently, recording in-process activities. Given the importance of interactivity and immersion, this paper considers how IDN research methods reveal player experience, player engagement, and/or player analysis. Drawing on related principles of IDN theory, sociocultural psychology and neuropsychological research, we present analyses of two phases of research in a real-time online IDN design learning workshop to compare contributions of in-process measures and interview measures of participant engagement. Analyses of data from each method reveal very different participant orientations in-process during an IDN design learning workshop and with an interview after the workshop. The analysis shows that in-process data align with neuropsychological definitions of flow: presence, relation, emotion, and conversational interaction. In contrast, the interview data align with definitions of metacognition: distance (past tense, individual focus), evaluation, analysis, and reflexive cognition. Based on those findings, we discuss howresearch methods affect definitions of fundamental concepts in IDNs, including interactivity and immersion. Implications include the need to clarify methodological labels and align chosen measures precisely with research questions and focal concepts, like interactivity. We also discuss how the complexity of IDN and the technologies embedded in digital systems allow integrating in-process and interview research protocols more centrally into IDN theory.
This paper presents a qualitative case study of Interactive Digital Narratives (IDNs) in journalism, focusing on three examples produced by news media outlets. The first is the BBC's Syrian Journey, which depicts ...
ISBN:
(纸本)9783031784521;9783031784538
This paper presents a qualitative case study of Interactive Digital Narratives (IDNs) in journalism, focusing on three examples produced by news media outlets. The first is the BBC's Syrian Journey, which depicts the pathways and struggles of Syrian refugees migrating to Europe. The second is the Guardian's Refugee Challenge, an interactive experience that immerses users in the difficult choices Syrian refugees might face. The third is ProPublica's Waiting Game, which illustrates the long and uncertain wait for asylum seekers in the U.S. These works were selected to explore the complex societal issue of refugees, reflecting current scholarship that identifies IDN as a powerful tool for addressing such complexity. This paper seeks to contribute to the understanding of how IDN can be applied in journalistic narratives, how journalistic IDN can be defined, and how the selected cases fit within existing IDN literature.
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on cryptographic puzzles (A full version of this work is available at https://***/2022/477). Puzzles are difficult proble...
ISBN:
(纸本)9783031786754;9783031786761
In this work, we study and formalize security notions for algorithm substitution attacks (ASAs) on cryptographic puzzles (A full version of this work is available at https://***/2022/477). Puzzles are difficult problems that require an investment of computation, memory, or some other related resource. They are heavily used as a building block for the consensus networks used by cryptocurrencies. These include primitives such as proof-of-work, proof-of-space, and verifiable delay functions (VDFs). Due to economies of scale, these networks increasingly rely on a small number of companies to construct opaque hardware or software (e.g., GPU or FPGA images): this dependency raises concerns about cryptographic subversion. We first explore the threat model for these systems and then propose concrete attacks that (1) selectively reduce a victim's solving capability (e.g., hashrate) and (2) exfiltrate puzzle solutions to an attacker. Our findings reveal that these devices could be subverted today, and detecting some attack variants is extremely hard and costly. We then suggest defenses, several of which can be applied to existing cryptocurrency hardware with minimal changes. We also discover that mining devices for many major proof-of-work cryptocurrencies already demonstrate errors exactly how a potentially subverted device would. Given that these attacks are relevant to all proof-of-work cryptocurrencies that have a combined market capitalization of around a few hundred billion dollars (2023), we recommend that all vulnerable mining protocols consider making the suggested adaptations today.
This study investigates Amazon's book recommendation system, uncovering cohesive communities of semantically similar books. The confinement within communities is extremely high, a user following Amazon's recom...
ISBN:
(纸本)9783031785375;9783031785382
This study investigates Amazon's book recommendation system, uncovering cohesive communities of semantically similar books. The confinement within communities is extremely high, a user following Amazon's recommendations needs tens of successive clicks to navigate away. We identify a large community of recommended books endorsing climate denialism, COVID-19 conspiracy theories, and advocating conservative views on social and gender issues. Performing a collaborative filtering analysis, relying on Amazon users reviews, reveals that books reviewed by the same users tend to be co-recommended by Amazon. This study not only contributes to addressing a gap in the literature by examining Amazon's recommender systems, but also highlights that even non-personalized recommender systems may pose systemic risks by suggesting content with foreseeable negative effects on public health and civic discourse.
The rapid spread of COVID-19 misinformation on social media poses challenges in detection and analysis. There has been extensive discussion about the roles of online and offline campaigns in spreading misinformation. ...
ISBN:
(纸本)9783031785375;9783031785382
The rapid spread of COVID-19 misinformation on social media poses challenges in detection and analysis. There has been extensive discussion about the roles of online and offline campaigns in spreading misinformation. Recognizing the analytical gap between online and offline behaviors during the COVID-19 pandemic, we propose a systematic and multidisciplinary approach. This approach utilizes agent-based modeling to interpret the spread of misinformation and the actions of users/communities on social media networks. Our model was tested on a Twitter network concerning a demonstration against COVID-19 lockdowns in Michigan in May 2020. We implemented the one-median problem to categorize and simplify the Twitter network, measured the response time to the spread of misinformation, employed a cybernetic organizational method to manage the process of mitigating misinformation spread in the network, and optimized the allocation of agents to reduce the response time to misinformation spread. The study demonstrates the effectiveness of our proposed approach in delaying information diffusion, thereby mitigating the spread of COVID-19 misinformation on social media.
Various risk-limiting audit (RLA) methods have been developed for instant-runoff voting (IRV) elections. A recent method, AWAIRE, is the first efficient approach that can take advantage of, but does not require, cast ...
ISBN:
(纸本)9783031692307;9783031692314
Various risk-limiting audit (RLA) methods have been developed for instant-runoff voting (IRV) elections. A recent method, AWAIRE, is the first efficient approach that can take advantage of, but does not require, cast vote records (CVRs). AWAIRE involves adaptively weighted averages of test statistics, essentially "learning" an effective set of hypotheses to test. However, the initial paper on AWAIRE only examined a few weighting schemes and parameter settings. We explore schemes and settings more extensively, to identify and recommend efficient choices for practice. We focus on the case where CVRs are not available, assessing performance using simulations based on real election data. The most effective schemes are often those that place most or all of the weight on the apparent "best" hypotheses based on already seen data. Conversely, the optimal tuning parameters tended to vary based on the election margin. Nonetheless, we quantify the performance trade-offs for different choices across varying election margins, aiding in selecting the most desirable trade-off if a default option is needed. A limitation of the current AWAIRE implementation is its restriction to a small number of candidates-up to six in previous implementations. One path to a more computationally efficient implementation would be to use lazy evaluation and avoid considering all possible hypotheses. Our findings suggest that such an approach could be done without substantially compromising statistical performance.
Community detection is the problem of finding naturally forming clusters in networks. It is an important problem in mining and analyzing social and other complex networks. Community detection can be used to analyze co...
ISBN:
(纸本)9783031785405;9783031785412
Community detection is the problem of finding naturally forming clusters in networks. It is an important problem in mining and analyzing social and other complex networks. Community detection can be used to analyze complex systems in the real world and has applications in many areas, including network science, data mining, and computational biology. Label propagation is a community detection method that is simpler and faster than other methods such as Louvain, InfoMap, and spectral-based approaches. Some real-world networks can be very large and have billions of nodes and edges. Sequential algorithms might not be suitable for dealing with such large networks. This paper presents distributed-memory and hybrid parallel community detection algorithms based on the label propagation method. We incorporated novel optimizations and communication schemes, leading to very efficient and scalable algorithms. We also discuss various load-balancing schemes and present their comparative performances. These algorithms have been implemented and evaluated using large high-performance computing systems. Our hybrid algorithm is scalable to thousands of processors and has the capability to process massive networks. This algorithm was able to detect communities in the Metaclust50 network, a massive network with 282 million nodes and 42 billion edges, in 654 s using 4096 processors.
In 2001, Hirt proposed a receipt-free voting scheme, which prevents malicious voters from proving to anybody how they voted, under the assumption of the availability of a helping server that is trusted for receipt-fre...
ISBN:
(纸本)9783031722431;9783031722448
In 2001, Hirt proposed a receipt-free voting scheme, which prevents malicious voters from proving to anybody how they voted, under the assumption of the availability of a helping server that is trusted for receipt-freeness, and only for that property. This appealing design led to a number of subsequent works that made this approach non-interactive and more efficient. Still, in all of these works, receipt-freeness depends on the honesty of one single server. In order to remove this single point of failure, we design a new model in which multiple helping servers are available and propose a new security definition called threshold receipt-freeness. Our definition requires that receipt-freeness should be guaranteed even if some of the helping servers happen to be fully malicious and ensures that voters can express their votes even if the corrupted servers choose the content of their local view of the ballots. Eventually, we propose a generic construction of a single-pass verifiable voting system achieving threshold receipt freenes with a mixnet-based tallying process. Our ballot submission process relies on the recently designed traceable receipt-free encryption primitive.
The incentive-compatibility properties of blockchain transaction fee mechanisms have been investigated with passive block producers that are motivated purely by the net rewards earned at the consensus layer. This work...
ISBN:
(纸本)9783031692307;9783031692314
The incentive-compatibility properties of blockchain transaction fee mechanisms have been investigated with passive block producers that are motivated purely by the net rewards earned at the consensus layer. This work introduces a model of active block producers that have their own private valuations for blocks (representing, for example, additional value derived from the application layer). The block producer surplus in our model can be interpreted as one of the more common colloquial meanings of the term "MEV." The main results of this work show that transaction fee mechanism design is fundamentally more difficult with active block producers than with passive ones: with active block producers, no non-trivial or approximately welfare-maximizing transaction fee mechanism can be incentive-compatible for both users and block producers. These results can be interpreted as a mathematical justification for the current interest in augmenting transaction fee mechanisms with additional components such as order flow auctions, block producer competition, trusted hardware, or cryptographic techniques.
In applications involving zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK), there often exists a requirement for the proof system to be combined with encryption. As a typical example, a user m...
ISBN:
(纸本)9783031786785;9783031786792
In applications involving zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK), there often exists a requirement for the proof system to be combined with encryption. As a typical example, a user may want to encrypt his identity, while proving that his identity satisfies a given authorized function (e.g. credit checks). However, depending on the functionalities and message types, including encryption constraints inside the SNARK input may lead to impractically large proving time and CRS sizes. In this paper, we propose a SNARK-compatible verifiable encryption or in short SAVER, which is a novel encrypt-and-prove approach to modularize the encryption apart from SNARK circuits. The SAVER holds many useful properties. It is SNARK-compatible: the encryption scheme is combined with an existing SNARK, in a way that the encryptor can prove pre-defined properties while encrypting the message apart from SNARKs. It is additively-homomorphic: the ciphertext holds a homomorphic property by following an ElGamal-like design. It is a verifiable encryption: one can verify arbitrary properties of encrypted messages by using the combined SNARK. It provides a verifiable decryption: the public can verify that the plaintext claimed by decryptor is equal to the original decryption of ciphertext. It also provides rerandomization: the proof and the ciphertext can be rerandomized as independent objects so that even the encryptor (or prover) herself cannot identify the origin.
暂无评论