Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterMarch 2023
Societal Factors that Impact Retention and Graduation of Underrepresented Computer Science Undergraduates
- Oluwafemi Osho,
- Bart P. Knijnenburg,
- Eileen Kraemer,
- Cazembe Kennedy,
- Gloria Washington,
- Stacey Sexton,
- John Porter,
- Kinnis Gosha
SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2Page 1399https://doi.org/10.1145/3545947.3576343Lack of diversity and high dropout rates among underrepresented students plague the CS discipline. We developed, administered, and validated survey scales measuring social factors that impact the retention and graduation of under-represented CS ...
- abstractMarch 2021
Determining Social Factors Predictive of Success in Computer Science Students
SIGCSE '21: Proceedings of the 52nd ACM Technical Symposium on Computer Science EducationPage 1383https://doi.org/10.1145/3408877.3439694In this study, an instrument was designed to measure social factors which might predict student success (n=95). The instrument was administered to computer science undergraduates at a public research university in the Northeast USA. The instrument was a ...
- research-articleJanuary 2021
What Makes People Join Conspiracy Communities?: Role of Social Factors in Conspiracy Engagement
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 4, Issue CSCW3Article No.: 223, Pages 1–30https://doi.org/10.1145/3432922Widespread conspiracy theories, like those motivating anti-vaccination attitudes or climate change denial, propel collective action, and bear society-wide consequences. Yet, empirical research has largely studied conspiracy theory adoption as an ...
- research-articleJanuary 2021
Using the personal computer utilisation model to predict students' technology user behaviour in universities in Botswana
International Journal of Learning Technology (IJLT), Volume 16, Issue 3Pages 225–245https://doi.org/10.1504/ijlt.2021.119467Technological advances have reduced learning and teaching limits based on time and distance making education more accessible to students. Accordingly this study sought to establish whether the personal computer utilisation model (PCUM) could be used to ...
- research-articleOctober 2020
Social Factors in Closed-Network Content Consumption
CIKM '20: Proceedings of the 29th ACM International Conference on Information & Knowledge ManagementPages 595–604https://doi.org/10.1145/3340531.3411935How do users on social platforms consume content shared by their friends? Is this consumption socially motivated, and can we predict it? Considerable prior work has focused on inferring and learning user preferences with respect to broadcasted, or open-...
-
- research-articleOctober 2019
Social dimensions in the acceptance of and access to technology: a usability study in a collaborative security application
IHC '19: Proceedings of the 18th Brazilian Symposium on Human Factors in Computing SystemsArticle No.: 46, Pages 1–11https://doi.org/10.1145/3357155.3358431Technological ubiquity and advances in the use of networked devices, such as smartphones, have become a fundamental element in the dynamics of information in the social environment. Social problems can be discussed in these networks, receiving the aid ...
- research-articleJanuary 2020
Opt out of privacy or "go home": understanding reluctant privacy behaviours through the FoMO-centric design paradigm
NSPW '19: Proceedings of the New Security Paradigms WorkshopPages 57–67https://doi.org/10.1145/3368860.3368865This paper explores how the design of online technology influences social factors and manipulates users' online privacy behaviours. In short, users reveal information and participate in online activities even when reluctant due to the influence of dark ...
- research-articleAugust 2021
Position paper: knowledge sharing and distances in collaborative modeling
MODELS '19 Companion: Proceedings of the 22nd International Conference on Model Driven Engineering Languages and Systems CompanionPages 415–416https://doi.org/10.1109/MODELS-C.2019.00065To develop systems effectively, a shared system understanding is required. Collaborative modeling is one way to capture this shared understanding. Increasingly, in large systems engineering projects different distances lead to social barriers between ...
- posterSeptember 2019
iSNoW: user perceptions of an interactive social novelty wearable
UbiComp/ISWC '19 Adjunct: Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable ComputersPages 268–271https://doi.org/10.1145/3341162.3343760We developed a highly-visible head-mounted novelty wearable to be used in social settings. We tested our Interactive Social Novelty Wearable (iSNoW) prototype in a partner-based user study to see if perceptions of the experience would change if the ...
- research-articleJune 2018
The Relationship Between Web Content and Web Accessibility at Universities
Social Science Computer Review (SSCR), Volume 36, Issue 3Pages 311–330https://doi.org/10.1177/0894439317710435This research assesses whether universities from varied cultures rank significantly different with respect to the quality of their web contents and with regard to their web accessibility WA level. Moreover, this article tests whether universities, which ...
- research-articleMay 2018
A Fair Share of the Work?: The Evolving Ecosystem of Crowd Workers
WebSci '18: Proceedings of the 10th ACM Conference on Web SciencePages 145–152https://doi.org/10.1145/3201064.3201074Crowdsourcing's ability to forge new digital, and thus not location-bound, job opportunities spurred many visions of crowdsourcing's social impact as an answer to failing economies and recessions, especially in developing countries. Yet, did the digital ...
- research-articleApril 2017
Global Variation in Attack Encounters and Hosting
HoTSoS: Proceedings of the Hot Topics in Science of Security: Symposium and BootcampPages 62–73https://doi.org/10.1145/3055305.3055306Countries vary greatly in the extent to which their computers encounter and host attacks. Empirically identifying factors behind such variation can provide a sound basis for policies to reduce attacks worldwide. However, the main current approach to ...
- research-articleJuly 2016
Crowd-sourcing thermal (dis)comfort
HCI '16: Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion VolumeArticle No.: 28, Pages 1–2This paper details our work towards designing a system for crowd-sourcing responses on thermal comfort in naturally ventilated office buildings. We provide preliminary qualitative findings on the deployment of this system. Specifically, we explore the ...
- research-articleMay 2016Honorable Mention
Going Dark: Social Factors in Collective Action Against Platform Operators in the Reddit Blackout
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsPages 1138–1151https://doi.org/10.1145/2858036.2858391This paper describes how people who lead communities on online platforms join together in mass collective action to influence platform operators. I investigate this by analyzing a protest against the social news platform reddit by moderators of 2,278 ...
- short-paperSeptember 2015
Could social factors influence the effort software estimation?
SSE 2015: Proceedings of the 7th International Workshop on Social Software EngineeringPages 21–24https://doi.org/10.1145/2804381.2804385Effort estimation is often influenced by several factors, including social. This study aims at understanding the interactions between social factors and effort during effort estimation. I want to analyze the dynamics that occur when a developer ...
- research-articleMay 2015
Appraisal and Evaluation of Interurban ITS: A European Survey
IEEE Transactions on Intelligent Transportation Systems (TITS), Volume 16, Issue 3Pages 1070–1087https://doi.org/10.1109/TITS.2014.2351253Intelligent transport systems (ITS) have at their core technological systems that work together to improve transportation performance. However, this performance becomes uncertain when the technologies themselves are scrutinized alongside the benefit they ...
- research-articleApril 2015
An empirical study of global malware encounters
HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of SecurityArticle No.: 8, Pages 1–11https://doi.org/10.1145/2746194.2746202The number of trojans, worms, and viruses that computers encounter varies greatly across countries. Empirically identifying factors behind such variation can provide a scientific empirical basis to policy actions to reduce malware encounters in the most ...
- research-articleOctober 2014
An investigation into affecting factors on acceptance of e-government service counters as a service delivery channel: a case of developing country
ICEGOV '14: Proceedings of the 8th International Conference on Theory and Practice of Electronic GovernancePages 11–19https://doi.org/10.1145/2691195.2691244The acceptance of e-government and utilizing it, are among the consequential issues that are dealt with in putting new technologies to use. This subject is of special importance because as long as e-government services are not utilized by citizens, new ...
- research-articleFebruary 2014
Social influences on secure development tool adoption: why security tools spread
CSCW '14: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computingPages 1095–1106https://doi.org/10.1145/2531602.2531722Security tools can help developers build more secure software systems by helping developers detect or fix security vulnerabilities in source code. However, developers do not always use these tools. In this paper, we investigate a number of social ...
- research-articleFebruary 2014
Giving is caring: understanding donation behavior through email
CSCW '14: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computingPages 1297–1307https://doi.org/10.1145/2531602.2531611Every day, thousands of people make donations to humanitarian, political, environmental, and other causes, a large amount of which occur on the Internet. The solicitations for support, the acknowledgment of a donation and the discussion of corresponding ...