Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Conversational Agents to Facilitate Deliberation on Harmful Content in WhatsApp Groups
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW2Article No.: 491, Pages 1–32https://doi.org/10.1145/3687030WhatsApp groups have become a hotbed for the propagation of harmful content including misinformation, hate speech, polarizing content, and rumors, especially in Global South countries. Given the platform's end-to-end encryption, moderation ...
- extended-abstractOctober 2024
AltRecSys: A Workshop on Alternative, Unexpected, and Critical Ideas in Recommendation
RecSys '24: Proceedings of the 18th ACM Conference on Recommender SystemsPages 1216–1218https://doi.org/10.1145/3640457.3687104The AltRecsys workshop, held in conjunction with the 18th edition of the ACM Conference on Recommender Systems (RecSys) in Bari, Italy, provides a platform for highlighting “alternative” work in recommender systems. Modeled after alt.chi and the CRAFT ...
- posterJune 2024
From Interactive Idea Development to Solution Planning: An AI-assisted Discussion Facilitation Timeline for Collaborative Planning
dg.o '24: Proceedings of the 25th Annual International Conference on Digital Government ResearchPages 1026–1029https://doi.org/10.1145/3657054.3659120The recent advancements in AI technology have shown the potential for chatbots to facilitate discussions. However, current chatbots mainly focus on discussion development and do not effectively synthesize idea development into solution planning. This is ...
- short-paperJanuary 2023
ASTOR: An Approach to Identify Security Code Reviews
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 191, Pages 1–3https://doi.org/10.1145/3551349.3559509During code reviews, software developers often raise security concerns if they find any. Ignoring such concerns can bring a severe impact on the performance of a software product. This risk can be reduced if we can automatically identify such code ...
- research-articleOctober 2022
Read it on Reddit: Homogeneity and Ideological Segregation in the Age of Social News
Social Science Computer Review (SSCR), Volume 40, Issue 5Pages 1186–1202https://doi.org/10.1177/08944393211001053This article empirically revisits the idea of ideological segregation and homogeneity in social networks with an exhaustive analysis of the website . Using a computer-assisted analysis on a corpus of multiple billion comments, it studies the ...
-
- research-articleJanuary 2022
MIA: Motivational Interviewing Agent for Improving Conversational Skills in Remote Group Discussions
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Issue GROUPArticle No.: 45, Pages 1–24https://doi.org/10.1145/3492864Since online discussion platforms can limit the perception of social cues, effective collaboration over videochat requires additional attention to conversational skills. However, self-affirmation and defensive bias theories indicate that feedback may ...
- research-articleJanuary 2022
Designing for Engaging with News using Moral Framing towards Bridging Ideological Divides
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Issue GROUPArticle No.: 42, Pages 1–23https://doi.org/10.1145/3492861Society is showing signs of strong ideological polarization. When pushed to seek perspectives different from their own, people often reject diverse ideas or find them unfathomable. Work has shown that framing controversial issues using the values of the ...
- research-articleJanuary 2022
Computer Network Security Technology and Prevention Strategy Analysis
Procedia Computer Science (PROCS), Volume 208, Issue CPages 570–576https://doi.org/10.1016/j.procs.2022.10.079AbstractThe use of computers has brought convenience to people's work and life, but also caused network security problems. How to identify network security risks and ensure users' personal privacy has become very important. With the continuous development ...
- research-articleApril 2020
No Hidden Catch, No Strings Attached: Twelve Steps to Cross-Disciplinary Conversations about Technology
CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–11https://doi.org/10.1145/3334480.3381816While the Human-Computer Interaction (HCI) field widely recognises the need for interdisciplinarity, academic traditions from older fields still limit the scope of cross-disciplinary discourse. As HCI scholars come from a variety of backgrounds, ...
- research-articleApril 2020
Bot in the Bunch: Facilitating Group Chat Discussion by Improving Efficiency and Participation with a Chatbot
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–13https://doi.org/10.1145/3313831.3376785Although group chat discussions are prevalent in daily life, they have a number of limitations. When discussing in a group chat, reaching a consensus often takes time, members contribute unevenly to the discussion, and messages are unorganized. Hence, we ...
- research-articleMay 2019
Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPaper No.: 343, Pages 1–13https://doi.org/10.1145/3290605.3300573Older adults are rapidly increasing their use of online services such as banking, social media, and email - services that come with subtle and serious security and privacy risks. Older adults with mild cognitive impairment (MCI) are particularly ...
- research-articleFebruary 2019
Smart City Bus Application with Quick Response (QR) Code Payment
ICSCA '19: Proceedings of the 2019 8th International Conference on Software and Computer ApplicationsPages 248–252https://doi.org/10.1145/3316615.3316718Mobile application that is available in Android operating system can do many functions such as access to the internet wirelessly, take digital photos, or even locate itself using Global Positioning System. Smart City Bus Application is an application ...
- research-articleJuly 2018
Teaching the societal consequences of computer science: new ideas for increasing student involvement
ITiCSE 2018: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science EducationPages 242–247https://doi.org/10.1145/3197091.3197146Almost every university has an upper year course in which students read, discuss and write about the implications for society of advances in computer science. This paper describes our experience updating Waterloo University's version over three ...
- research-articleJanuary 2018
Study on the application of particle swarm optimization in the virtual reality of the modified wood furniture
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 35, Issue 3Pages 2741–2747https://doi.org/10.3233/JIFS-169626Wood modification is a processing method to change the physical and chemical properties of wood, and it can improve its corrosion resistance, flame retardancy and other properties. With the rapid development of the furniture industry, the application of ...
- abstractMay 2017
Storytelling Tools in Support of User Experience Design
CHI EA '17: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing SystemsPages 316–319https://doi.org/10.1145/3027063.3027121Storytelling has been proposed as an intuitive way to support communication in user experience design. With story-based thinking, designers can gain a better understanding of the potential user experience, developing and discussing design ideas within an ...
- posterFebruary 2017
Automatic Extraction of Discussion based on Sentence Type Estimation
CSCW '17 Companion: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social ComputingPages 203–206https://doi.org/10.1145/3022198.3026336Automatic analysis of conversational data in computer-supported communication is useful to support us to understand a network of people. We propose a method that detects discussion from conversations automatically. The proposed method estimates types of ...
- research-articleApril 2016
Towards triggering higher-order thinking behaviors in MOOCs
LAK '16: Proceedings of the Sixth International Conference on Learning Analytics & KnowledgePages 398–407https://doi.org/10.1145/2883851.2883964With the aim of better scaffolding discussion to improve learning in a MOOC context, this work investigates what kinds of discussion behaviors contribute to learning. We explored whether engaging in higher-order thinking behaviors results in more ...
- demonstrationApril 2016
Demonstration of the Unizin sentiment visualizer
LAK '16: Proceedings of the Sixth International Conference on Learning Analytics & KnowledgePages 552–553https://doi.org/10.1145/2883851.2883903While much promise has been demonstrated in the learning analytics field with sentiment analysis, the analyses are typically post hoc. The Unizin Sentiment Visualizer demonstrates that the application of sentiment analysis in real-time provides a ...
- abstractFebruary 2016
TickTockRun: Towards Enhancing Communication in Runner Families
CSCW '16 Companion: Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing CompanionPages 309–312https://doi.org/10.1145/2818052.2869114Past studies have shown that advanced amateur runners often find it hard to communicate the difficulties of training frequently to their friends and family. Given that orchestra-tion is required to effectively include running in everyday routines, tools ...
- ArticleSeptember 2015
Do we need application profiles? reflections and suggestions from work in DCMI and ISO/IEC
DCMI'15: Proceedings of the 2015 International Conference on Dublin Core and Metadata ApplicationsPages 76–86In this paper, the authors question the role and naming of 'application profiles' (APs). It is not a research paper but aims to foster a discussion that the authors think is pertinent. Both have been involved in the development and use of application ...