We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computers and Society

New submissions

[ total of 27 entries: 1-27 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Thu, 18 Apr 24

[1]  arXiv:2404.10988 [pdf, other]
Title: From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Comments: Published in ACM ITiCSE 2024 conference proceedings, see this https URL
Subjects: Computers and Society (cs.CY); Cryptography and Security (cs.CR)

For undergraduate students of computing, learning to solve complex practical problems in a team is an essential skill for their future careers. This skill is needed in various fields, such as in cybersecurity and IT governance. Tabletop exercises are an innovative teaching method used in practice for training teams in incident response and evaluation of contingency plans. However, tabletop exercises are not yet widely established in university education. This paper presents data and teaching experience from a cybersecurity course that introduces tabletop exercises in classrooms using a novel technology: INJECT Exercise Platform (IXP), a web-based learning environment for delivering and evaluating the exercises. This technology substantially improves the prior practice, since tabletop exercises worldwide have usually been conducted using pen and paper. Unlike in traditional tabletop exercises, which are difficult to evaluate manually, IXP provides insights into students' behavior and learning based on automated analysis of interaction data. We demonstrate IXP's capabilities and evolution by comparing exercise sessions hosted throughout three years at different stages of the platform's readiness. The analysis of student data is supplemented by the discussion of the lessons learned from employing IXP in computing education contexts. The data analytics enabled a detailed comparison of the teams' performance and behavior. Instructors who consider innovating their classes with tabletop exercises may use IXP and benefit from the insights in this paper.

[2]  arXiv:2404.10990 [pdf, other]
Title: Automating Personalized Parsons Problems with Customized Contexts and Concepts
Comments: Accepted to ITiCSE 2024
Subjects: Computers and Society (cs.CY)

Parsons problems provide useful scaffolding for introductory programming students learning to write code. However, generating large numbers of high-quality Parsons problems that appeal to the diverse range of interests in a typical introductory course is a significant challenge for educators. Large language models (LLMs) may offer a solution, by allowing students to produce on-demand Parsons problems for topics covering the breadth of the introductory programming curriculum, and targeting thematic contexts that align with their personal interests. In this paper, we introduce PuzzleMakerPy, an educational tool that uses an LLM to generate unlimited contextualized drag-and-drop programming exercises in the form of Parsons Problems, which introductory programmers can use as a supplemental learning resource. We evaluated PuzzleMakerPy by deploying it in a large introductory programming course, and found that the ability to personalize the contextual framing used in problem descriptions was highly engaging for students, and being able to customize the programming topics was reported as being useful for their learning.

[3]  arXiv:2404.11029 [pdf, ps, other]
Title: Student self-management, academic achievement: Exploring the mediating role of self-efficacy and the moderating influence of gender insights from a survey conducted in 3 universities in America
Journal-ref: Journal of Integrated Social Sciences and Humanities (2023): 1-12
Subjects: Computers and Society (cs.CY)

Excellent students are not only those who master more effective and efficient learning techniques to acquire and apply information. Even in the absence of correct learning, they are able to self-motivate, evaluate, and adjust their behavior. This study aims to explore the relationship between student self-management and academic achievement, with a focus on investigating the mediating role of self-efficacy and the moderating influence of gender in this relationship. A total of 289 students from three universities in the United States participated in this research. The results of the study indicate that students' level of self-management is positively correlated with their academic achievement, with self-efficacy playing a mediating role in this relationship and gender exerting a certain moderating effect. This study provides important insights into understanding the relationship between student self-management and academic achievement and supports the crucial role of educational leaders in educational practice.

[4]  arXiv:2404.11034 [pdf, ps, other]
Title: Exploring the Path of Transformation and Development for Study Abroad Consultancy Firms in China
Subjects: Computers and Society (cs.CY)

In recent years, with the changing landscape of international education and the growing demand from Chinese students, study abroad consultancy firms in China need to adopt transformational development strategies to address challenges and maintain competitiveness. This study investigated the relationships between key performance indicators and several factors through a questionnaire survey of 158 consultancy firms. The factors examined included service diversification, technology adoption, talent management, and regulatory compliance. Descriptive statistical analysis was employed to analyze the data. The results showed that service scope diversification was positively correlated with firm performance. Technology adoption was positively correlated with operational efficiency. Talent management was positively correlated with service quality. Regulatory compliance was positively correlated with firm reputation. Consultancy firms that took progressive approaches in diversifying services, adopting new technologies, cultivating talent, and ensuring compliance demonstrated superior performance, efficiency, quality, and reputation compared to their less innovative counterparts. This research provides empirical evidence to support the transformation of Chinese study abroad consultancy firms. It also highlights the need for future studies to consider causality and contextual variations to gain deeper insights into this issue.

[5]  arXiv:2404.11514 [pdf, ps, other]
Title: Frameworking for a Community-led Feminist Ethics
Subjects: Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)

This paper introduces a relational perspective on ethics within the context of Feminist Digital Civics and community-led design. Ethics work in HCI has primarily focused on prescriptive machine ethics and bioethics principles rather than people. In response, we advocate for a community-led, processual approach to ethics, acknowledging power dynamics and local contexts. We thus propose a multidimensional adaptive model for ethics in HCI design, integrating an intersectional feminist ethical lens. This framework embraces feminist epistemologies, methods, and methodologies, fostering a reflexive practice. By weaving together situated knowledges, standpoint theory, intersectionality, participatory methods, and care ethics, our approach offers a holistic foundation for ethics in HCI, aiming to advance community-led practices and enrich the discourse surrounding ethics within this field.

Cross-lists for Thu, 18 Apr 24

[6]  arXiv:2404.10780 (cross-list from cs.CR) [pdf, ps, other]
Title: Phishing Website Detection Using a Combined Model of ANN and LSTM
Comments: Pages 9, Figures 5
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)

In this digital era, our lives highly depend on the internet and worldwide technology. Wide usage of technology and platforms of communication makes our lives better and easier. But on the other side it carries out some security issues and cruel activities, phishing is one activity of these cruel activities. It is a type of cybercrime, which has the purpose of stealing the personal information of the computer user, and enterprises, which carry out fake websites that are the copy of the original websites. The attackers used personal information like account IDs, passwords, and usernames for the purpose of some fraudulent activities against the user of the computer. To overcome this problem researchers focused on the machine learning and deep learning approaches. In our study, we are going to use machine learning and deep learning models to identify the fake web pages on the secondary dataset.

[7]  arXiv:2404.10795 (cross-list from cs.SI) [pdf, ps, other]
Title: Intelligent Message Behavioral Identification System
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Information Retrieval (cs.IR)

On social media platforms, the act of predicting reposting is seen as a challenging issue related to Short Message Services (SMS). This study examines the issue of predicting picture reposting in SMS and forecasts users' behavior in sharing photographs on Twitter. Several research vary. The paper introduces a network called Image Retweet Modeling (IRM) that models heterogeneous image retransmission. It considers the user's previous reposting of the image tweet, the next contact in the SMS, and the preferences of the reposted person. Three aspects connected to content. A text-guided multimodal neural network is developed to create a novel multi-faceted attention ranking network methodology. This allows for learning the joint image Twitter representation and user preference representation in the prediction job. Multiple experiments conducted on extensive data sets demonstrate that our approach outperforms current methods on Social Network platforms.

[8]  arXiv:2404.10942 (cross-list from cs.LG) [pdf, other]
Title: What Hides behind Unfairness? Exploring Dynamics Fairness in Reinforcement Learning
Comments: 13 pages, 9 figures, accepted by IJCAI 2024
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Methodology (stat.ME)

In sequential decision-making problems involving sensitive attributes like race and gender, reinforcement learning (RL) agents must carefully consider long-term fairness while maximizing returns. Recent works have proposed many different types of fairness notions, but how unfairness arises in RL problems remains unclear. In this paper, we address this gap in the literature by investigating the sources of inequality through a causal lens. We first analyse the causal relationships governing the data generation process and decompose the effect of sensitive attributes on long-term well-being into distinct components. We then introduce a novel notion called dynamics fairness, which explicitly captures the inequality stemming from environmental dynamics, distinguishing it from those induced by decision-making or inherited from the past. This notion requires evaluating the expected changes in the next state and the reward induced by changing the value of the sensitive attribute while holding everything else constant. To quantitatively evaluate this counterfactual concept, we derive identification formulas that allow us to obtain reliable estimations from data. Extensive experiments demonstrate the effectiveness of the proposed techniques in explaining, detecting, and reducing inequality in reinforcement learning.

[9]  arXiv:2404.10964 (cross-list from cs.DS) [pdf, other]
Title: Drawing Competitive Districts in Redistricting
Comments: To be published in FORC 2024
Subjects: Data Structures and Algorithms (cs.DS); Computers and Society (cs.CY)

In the process of redistricting, one important metric is the number of competitive districts, that is, districts where both parties have a reasonable chance of winning a majority of votes. Competitive districts are important for achieving proportionality, responsiveness, and other desirable qualities; some states even directly list competitiveness in their legally-codified districting requirements. In this work, we discuss the problem of drawing plans with at least a fixed number of competitive districts. In addition to the standard, ``vote-band'' measure of competitivenesss (i.e., how close was the last election?), we propose a measure that explicitly considers ``swing voters'' - the segment of the population that may choose to vote either way, or not vote at all, in a given election. We present two main, contrasting results. First, from a computational complexity perspective, we show that the task of drawing plans with competitive districts is NP-hard, even on very natural instances where the districting task itself is easy (e.g., small rectangular grids of population-balanced cells). Second, however, we show that a simple hill-climbing procedure can in practice find districtings on real states in which all the districts are competitive. We present the results of the latter on the precinct-level graphs of the U.S. states of North Carolina and Arizona, and discuss trade-offs between competitiveness and other desirable qualities.

[10]  arXiv:2404.11370 (cross-list from cs.HC) [pdf, other]
Title: Characterizing and modeling harms from interactions with design patterns in AI interfaces
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)

The proliferation of applications using artificial intelligence (AI) systems has led to a growing number of users interacting with these systems through sophisticated interfaces. Human-computer interaction research has long shown that interfaces shape both user behavior and user perception of technical capabilities and risks. Yet, practitioners and researchers evaluating the social and ethical risks of AI systems tend to overlook the impact of anthropomorphic, deceptive, and immersive interfaces on human-AI interactions. Here, we argue that design features of interfaces with adaptive AI systems can have cascading impacts, driven by feedback loops, which extend beyond those previously considered. We first conduct a scoping review of AI interface designs and their negative impact to extract salient themes of potentially harmful design patterns in AI interfaces. Then, we propose Design-Enhanced Control of AI systems (DECAI), a conceptual model to structure and facilitate impact assessments of AI interface designs. DECAI draws on principles from control systems theory -- a theory for the analysis and design of dynamic physical systems -- to dissect the role of the interface in human-AI systems. Through two case studies on recommendation systems and conversational language model systems, we show how DECAI can be used to evaluate AI interface designs.

[11]  arXiv:2404.11446 (cross-list from cs.CL) [pdf, other]
Title: Open-Ended Wargames with Large Language Models
Comments: 15 pages, 2 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Computers and Society (cs.CY)

Wargames are a powerful tool for understanding and rehearsing real-world decision making. Automated play of wargames using artificial intelligence (AI) enables possibilities beyond those of human-conducted games, such as playing the game many times over to see a range of possible outcomes. There are two categories of wargames: quantitative games, with discrete types of moves, and qualitative games, which revolve around open-ended responses. Historically, automation efforts have focused on quantitative games, but large language models (LLMs) make it possible to automate qualitative wargames. We introduce "Snow Globe," an LLM-powered multi-agent system for playing qualitative wargames. With Snow Globe, every stage of a text-based qualitative wargame from scenario preparation to post-game analysis can be optionally carried out by AI, humans, or a combination thereof. We describe its software architecture conceptually and release an open-source implementation alongside this publication. As case studies, we simulate a tabletop exercise about an AI incident response and a political wargame about a geopolitical crisis. We discuss potential applications of the approach and how it fits into the broader wargaming ecosystem.

[12]  arXiv:2404.11473 (cross-list from cs.CR) [pdf, ps, other]
Title: Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY)

This article assesses the effectiveness of current cybersecurity regulations and policies in the United States amidst the escalating frequency and sophistication of cyber threats. The focus is on the comprehensive framework established by the U.S. government, with a spotlight on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and key regulations such as HIPAA, GLBA, FISMA, CISA, CCPA, and the DOD Cybersecurity Maturity Model Certification. The study evaluates the impact of these regulations on different sectors and analyzes trends in cybercrime data from 2000 to 2022. The findings highlight the challenges, successes, and the need for continuous adaptation in the face of evolving cyber threats

[13]  arXiv:2404.11476 (cross-list from cs.AI) [pdf, other]
Title: Taxonomy to Regulation: A (Geo)Political Taxonomy for AI Risks and Regulatory Measures in the EU AI Act
Authors: Sinan Arda
Subjects: Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)

Technological innovations have shown remarkable capabilities to benefit and harm society alike. AI constitutes a democratized sophisticated technology accessible to large parts of society, including malicious actors. This work proposes a taxonomy focusing on on (geo)political risks associated with AI. It identifies 12 risks in total divided into four categories: (1) Geopolitical Pressures, (2) Malicious Usage, (3) Environmental, Social, and Ethical Risks, and (4) Privacy and Trust Violations. Incorporating a regulatory side, this paper conducts a policy assessment of the EU AI Act. Adopted in March 2023, the landmark regulation has the potential to have a positive top-down impact concerning AI risk reduction but needs regulatory adjustments to mitigate risks more comprehensively. Regulatory exceptions for open-source models, excessively high parameters for the classification of GPAI models as a systemic risk, and the exclusion of systems designed exclusively for military purposes from the regulation's obligations leave room for future action.

[14]  arXiv:2404.11515 (cross-list from cs.AI) [pdf, ps, other]
Title: Embedding Privacy in Computational Social Science and Artificial Intelligence Research
Comments: 2024
Subjects: Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Emerging Technologies (cs.ET); Human-Computer Interaction (cs.HC)

Privacy is a human right. It ensures that individuals are free to engage in discussions, participate in groups, and form relationships online or offline without fear of their data being inappropriately harvested, analyzed, or otherwise used to harm them. Preserving privacy has emerged as a critical factor in research, particularly in the computational social science (CSS), artificial intelligence (AI) and data science domains, given their reliance on individuals' data for novel insights. The increasing use of advanced computational models stands to exacerbate privacy concerns because, if inappropriately used, they can quickly infringe privacy rights and lead to adverse effects for individuals - especially vulnerable groups - and society. We have already witnessed a host of privacy issues emerge with the advent of large language models (LLMs), such as ChatGPT, which further demonstrate the importance of embedding privacy from the start. This article contributes to the field by discussing the role of privacy and the primary issues that researchers working in CSS, AI, data science and related domains are likely to face. It then presents several key considerations for researchers to ensure participant privacy is best preserved in their research design, data collection and use, analysis, and dissemination of research results.

[15]  arXiv:2404.11596 (cross-list from physics.soc-ph) [pdf, other]
Title: Urban highways are barriers to social ties
Comments: Main text: 8 pages, 4 figures, 1 table. Supplementary Information: 11 pages, 11 figures, 5 tables
Subjects: Physics and Society (physics.soc-ph); Computers and Society (cs.CY)

Urban highways are common, especially in the US, making cities more car-centric. They promise the annihilation of distance but obstruct pedestrian mobility, thus playing a key role in limiting social interactions locally. Although this limiting role is widely acknowledged in urban studies, the quantitative relationship between urban highways and social ties is barely tested. Here we define a Barrier Score that relates massive, geolocated online social network data to highways in the 50 largest US cities. At the unprecedented granularity of individual social ties, we show that urban highways are associated with decreased social connectivity. This barrier effect is especially strong for short distances and consistent with historical cases of highways that were built to purposefully disrupt or isolate Black neighborhoods. By combining spatial infrastructure with social tie data, our method adds a new dimension to demographic studies of social segregation. Our study can inform reparative planning for an evidence-based reduction of spatial inequality, and more generally, support a better integration of the social fabric in urban planning.

Replacements for Thu, 18 Apr 24

[16]  arXiv:1905.08772 (replaced) [pdf, other]
Title: A Text Classification Framework for Simple and Effective Early Depression Detection Over Social Media Streams
Comments: Highlights: (*) A novel text classifier having the ability to visually explain its rationale; (*) Domain-independent classification that does not require feature engineering; (*) Support for incremental learning and text classification over streams; (*) Efficient framework for addressing early risk detection problems; (*) State-of-the-art performance on early depression detection task
Journal-ref: 18 May 2019, Volume 133, Expert Systems With Applications, Elsevier
Subjects: Computers and Society (cs.CY); Computation and Language (cs.CL); Information Retrieval (cs.IR); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[17]  arXiv:2303.07529 (replaced) [pdf, ps, other]
Title: Thinking Upstream: Ethics and Policy Opportunities in AI Supply Chains
Subjects: Computers and Society (cs.CY)
[18]  arXiv:2401.13138 (replaced) [pdf, other]
Title: Visibility into AI Agents
Comments: Accepted to ACM Conference on Fairness, Accountability, and Transparency (ACM FAccT 2024)
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI)
[19]  arXiv:2402.11444 (replaced) [pdf, ps, other]
Title: Gauging Public Acceptance of Conditionally Automated Vehicles in the United States
Authors: Antonios Saravanos (1), Eleftheria K. Pissadaki (1), Wayne S. Singh (1), Donatella Delfino (1) ((1) New York University)
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI)
[20]  arXiv:2404.03048 (replaced) [pdf, other]
Title: Decentralised Moderation for Interoperable Social Networks: A Conversation-based Approach for Pleroma and the Fediverse
Comments: Accepted at International AAAI Conference on Web and Social Media (ICWSM) 2024. Please cite accordingly!
Subjects: Computers and Society (cs.CY); Computation and Language (cs.CL)
[21]  arXiv:2404.08519 (replaced) [pdf, ps, other]
Title: Non-discrimination law in Europe: a primer for non-lawyers
Comments: 10 pages
Subjects: Computers and Society (cs.CY)
[22]  arXiv:2404.10636 (replaced) [pdf, other]
Title: What are human values, and how do we align AI to them?
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[23]  arXiv:2303.02580 (replaced) [pdf, other]
Title: Estimating Racial Disparities When Race is Not Observed
Comments: 28 pages, 9 figures, plus references and appendices
Subjects: Applications (stat.AP); Computers and Society (cs.CY)
[24]  arXiv:2305.13293 (replaced) [pdf, other]
Title: Time Fairness in Online Knapsack Problems
Comments: Accepted to ICLR 2024. 26 pages, 5 figures
Subjects: Machine Learning (cs.LG); Computers and Society (cs.CY); Data Structures and Algorithms (cs.DS)
[25]  arXiv:2310.03031 (replaced) [pdf, other]
Title: How Prevalent is Gender Bias in ChatGPT? -- Exploring German and English ChatGPT Responses
Comments: Accepted @ "1st Workshop on Biased Data in Conversational Agents" (co-located with ECML PKDD 2023). This is the author's version of the work. The definite version of record will be published in the proceedings
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Machine Learning (cs.LG)
[26]  arXiv:2401.08202 (replaced) [pdf, other]
Title: IsamasRed: A Public Dataset Tracking Reddit Discussions on Israel-Hamas Conflict
Subjects: Social and Information Networks (cs.SI); Computers and Society (cs.CY); Digital Libraries (cs.DL)
[27]  arXiv:2402.19226 (replaced) [pdf, other]
Title: Investigating Gender Fairness in Machine Learning-driven Personalized Care for Chronic Pain
Subjects: Machine Learning (cs.LG); Computers and Society (cs.CY)
[ total of 27 entries: 1-27 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2404, contact, help  (Access key information)