This paper reviews data altruism in the emerging academic literature by collecting and analyzing conceptually similar terms, identifying key actors, and delineating the objectives of general interest underlying this n...
ISBN:
(数字)9783031708046
ISBN:
(纸本)9783031708039;9783031708046
This paper reviews data altruism in the emerging academic literature by collecting and analyzing conceptually similar terms, identifying key actors, and delineating the objectives of general interest underlying this novel form of voluntary data sharing. Drawing from a wide array of disciplines including computerscience, social science, law, and medicine and bioethics, we discover frequent comparisons with the notions of data donation, data crowdsourcing, data philanthropy, and data solidarity. In our observations of current definitions and understandings of data altruism and these related terms, we draw attention to analyzing their salient similarities and differences. Our analysis of actors and roles illustrates a wide variety of players envisioned to participate in data altruism. Our examination of different types of data discussed in the literature suggests the data altruism value chain proposition is largely promissory, with limited empirical evidence supporting specified objectives of general interest. This review contributes to a refined understanding of data altruism as a formal 'data donation' institutionalization process in the European digital space and highlights its implications for future research.
Adaptive training (AT) is a promising avenue for training across multiple domains pertinent to warfighters, as it can adjust instruction and task difficulty based on the learner's real-time performance. Despite th...
ISBN:
(纸本)9783031606083;9783031606090
Adaptive training (AT) is a promising avenue for training across multiple domains pertinent to warfighters, as it can adjust instruction and task difficulty based on the learner's real-time performance. Despite these benefits, such adaptations may elevate learner stress, hindering performance and learning. Coping strategies may be used to mitigate learner stress, but there is limited extant research comparing adaptive and maladaptive coping strategies in an adaptive training environment. This study explores the relationship between stress and task performance in the context of an adaptive training system that dynamically adjusted task difficulty based on real-time performance. Participants completed a radio frequency signal detection task in which they had to classify and report signals quickly and accurately. Participants were also instructed on adaptive or maladaptive stress coping strategies that either focused on the task itself (problem-focused) or on their emotions (emotion-focused). Results suggest that task engagement is related to performance and changes in micro-adaptive difficulty. Distress and worry, however, did not consistently relate to task performance or micro-adaptive difficulty. Problem-focused coping helped maintain task performance regardless of whether the strategy was adaptative or maladaptive. Maladaptive, emotion-focused coping led to the worst performance outcomes. Limitations and future directions are discussed.
Web archives play a crucial role in preserving the digital history of the internet, given the inherent volatility of websites that constantly undergo modifications, content updates, and migrations, or even cease to ex...
ISBN:
(纸本)9783031724367;9783031724374
Web archives play a crucial role in preserving the digital history of the internet, given the inherent volatility of websites that constantly undergo modifications, content updates, and migrations, or even cease to exist altogether. Web archives ensure that present and historical web information will be available in the future for researchers, historians, students, corporations, and general public. Given their importance, it is essential for web archives to be equally accessible to everyone, including those with visual disabilities. In the absence of a prior in-depth investigation in this regard, this paper examines the status-quo accessibility and usability of five popular web archives for people who are blind. Specifically, we analyzed reports generated by an automated accessibility checker tool and also collected feedback from a user study with 10 blind screen reader users. The analysis of accessibility reports revealed issues that were common across the different archives, including a lack of text alternatives for images and the absence of proper aria labels. The user study showed that blind users struggled to do even basic search tasks to locate desired mementos or snapshots of websites saved in the archives. The participants also explicitly indicated that they found it strenuous to interact with web archives. Informed by these findings, we provide accessibility design suggestions for archives' web developers and assistive technology developers.
Increasingly, the public sector faces cybersecurity threats and is attacked by both criminals and hacktivists. Targets of such attacks are most often critical infrastructures. The repercussions of such attacks extend ...
ISBN:
(纸本)9783031702730;9783031702747
Increasingly, the public sector faces cybersecurity threats and is attacked by both criminals and hacktivists. Targets of such attacks are most often critical infrastructures. The repercussions of such attacks extend beyond technical systems, impacting social, organizational, and economic realms. As cyber threats proliferate and prevention becomes challenging, effectively managing the aftermath of a cyberattack, i.e. a cybercrisis, becomes more important. This article delves into a lesser-explored aspect of digital government research and investigates the impact of cyberattacks on trust relationships within the public sector. Moreover, it sheds light on the strategies employed by affected organizations to restore trust. The article uses the case of five municipalities affected by a recent large-scale cyberattack on a regional IT-provider in Germany. Drawing on a comparative case study, it investigates the complex interplay between cybercrises and trust, emphasizing the potential of trust repair tactics in mitigating the negative impacts of a trust transgression in the public sector.
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of setup, e.g. correlated randomness among the parties. While this is a ver...
ISBN:
(纸本)9783031477539;9783031477546
Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of setup, e.g. correlated randomness among the parties. While this is a very useful model, it has the downside that the setup's randomness must be programmable, otherwise security becomes provably impossible. Since programmability is more realistic for smaller setups (in terms of number of parties), it is crucial to minimize the correlation complexity (degree of correlation) of the setup's randomness. We give a tight tradeoff between the correlation complexity beta and the corruption threshold t. Our bounds are strong in that beta-wise correlation is sufficient for statistical security while beta - 1-wise correlation is insufficient even for computational security. In particular, for strong security, i.e., t < n, full n-wise correlation is necessary. However, for any constant fraction of honest parties, we provide a protocol with constant correlation complexity which tightens the gap between the theoretical model and the setup's implementation in the real world. In contrast, previous state-of-the-art protocols require full n-wise correlation regardless of t.
This work presents the MICOLL digital map, a web-based application for searching for historical routes and waypoints in the context of the ERC project "Migrating Commercial Law and Language (MICOLL). Rethinking L...
ISBN:
(纸本)9783031724398;9783031724404
This work presents the MICOLL digital map, a web-based application for searching for historical routes and waypoints in the context of the ERC project "Migrating Commercial Law and Language (MICOLL). Rethinking Lex Mercatoria". The MICOLL digital map is an ongoing project that aims to allow historians and experts to easily search and discover the historical routes, used for exchanging goods and information, that connected European cities during the 11th-17th centuries. The final goal is to show their evolution over time by linking historical information to spatial waypoints and enabling a visual and interactive consultation over a digital map.
Against the backdrop of digital humanities, artificial intelligence (AI) has been increasingly integrated with language education, particularly interpreting training. Although the academic world has reached a consensu...
ISBN:
(纸本)9789819742455;9789819742462
Against the backdrop of digital humanities, artificial intelligence (AI) has been increasingly integrated with language education, particularly interpreting training. Although the academic world has reached a consensus about the importance of constructing a shared and intelligent repository for interpreting education by collecting speech videos, few have proposed workable methods of efficiently curating these collected resources. The current study presents a comprehensive exploration of synergizing a 3D Convolutional Neural Networks (CNN) model and a knowledge graph to enhance the management and usage of the collated videos. Drawing upon widely used textbooks for interpreting training, the current study demonstrates the construction of a knowledge graph (KG) of interpreting knowledge and skills, and utilizes it to navigate the video-sorting process supported by a 3D CNN model. By infusing the video repository with AI, this endeavor may provide students with personalized learning experiences, thus stimulating their learning interests in interpreting. The implications extend to instructors and material designers, providing them with insights about the overview of interpreting education and the roadmap of organizing resources. Lastly, this study is a cross-disciplinary exploration that bridges interpreting training and AI.
This study identified the potential impacts and challenges of initiating an educational program aimed at cultivating students' creativity through computer-Supported Collaborative Learning and Integrated Practical ...
详细信息
ISBN:
(纸本)9789819744411;9789819744428
This study identified the potential impacts and challenges of initiating an educational program aimed at cultivating students' creativity through computer-Supported Collaborative Learning and Integrated Practical Activity in primary schools in rural areas of China. Based on the data, the authors found that the teacher highly valued student-centered classes with supportive teacher roles, and the program had a positive impact on students' creativity. In particular, the intervention for group work led to significant improvement for two students who were previously underperforming. However, there were also social factors that acted as barriers to the teacher's professional development in fostering children's creativity through Integrated Practical Activities.
Designing of the function interface is one of the key skills in programming. That requires feedback, which can be generated in the necessary quantity only by an intelligent tutoring system. In this paper, we propose a...
ISBN:
(纸本)9783031630279;9783031630286
Designing of the function interface is one of the key skills in programming. That requires feedback, which can be generated in the necessary quantity only by an intelligent tutoring system. In this paper, we propose a method of extracting function descriptions from inline comments in open-source code and find noun phrases that describe the data items passed to and returned from the function. We compare two popular NLP tools for parsing sentences and two different similarity measures to find the best-performing combination and develop sophisticated methods of filtering functions to increase the percentage of correctly marked functions. We achieved correctly marking more than 80% of the automatically selected functions, which significantly speeds up creating banks of learning problems for intelligent tutoring systems in programming learning.
暂无评论