首页 > 最新文献

Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research最新文献

英文 中文
Keynote: Organizational Design 主题演讲:组织设计
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890628
Scott A. Bernard
Dr. Scott Bernard will speak on the topic of organizational design and his experiences with and approach to integrating strategic, business, and technology planning for large/complex organizations using a holistic enterprise architecture framework.
Scott Bernard博士将讲述组织设计的主题,以及他使用整体企业架构框架为大型/复杂组织集成战略、业务和技术规划的经验和方法。
{"title":"Keynote: Organizational Design","authors":"Scott A. Bernard","doi":"10.1145/2890602.2890628","DOIUrl":"https://doi.org/10.1145/2890602.2890628","url":null,"abstract":"Dr. Scott Bernard will speak on the topic of organizational design and his experiences with and approach to integrating strategic, business, and technology planning for large/complex organizations using a holistic enterprise architecture framework.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126934357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
College-Based Career Experiences as Determinants of IT Labor Market Entry: A Survival Analysis Model 基于大学的职业经历作为IT劳动力市场进入的决定因素:一个生存分析模型
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890607
T. Setor, D. Joseph
Novice IT professionals are not well-endowed with experience and professional knowledge-attributes gained in the course of IT work-which could facilitate labor market outcomes such as entering the IT workforce immediately after completing college education. However, college-based career experiences such as job shadowing, mentorship, internships and cooperative education are valuable sources of human capital which can engender good future performance and productivity; and, thus, can often decide the employment fate of novice IT professionals. The current study draws on human capital theory and develop a set of hypotheses relating college-based career experiences to the likelihood of securing IT jobs. We test our hypotheses using data from the National Longitudinal Survey of Youth 1997 cohort. We find that hands-on forms of college-based career experiences such internships and cooperative education increase the likelihood of securing IT jobs immediately after completing college. We do not find support for vicarious forms of college-based career experiences i.e. mentorship and job shadowing. We discuss the implications of our results on research and practice.
新入职的IT专业人士缺乏在IT工作过程中获得的经验和专业知识,而这些经验和专业知识可能不利于劳动力市场的结果,例如在完成大学教育后立即进入IT行业。然而,以大学为基础的职业经历,如工作见习、导师指导、实习和合作教育,是人力资本的宝贵来源,可以产生良好的未来绩效和生产力;因此,往往可以决定新手IT专业人员的就业命运。目前的研究借鉴了人力资本理论,并提出了一套关于大学职业经历与获得IT工作可能性的假设。我们使用1997年全国青年纵向调查队列的数据来检验我们的假设。我们发现,以大学为基础的实践形式的职业经历,如实习和合作教育,增加了毕业后立即获得IT工作的可能性。我们没有发现支持替代形式的基于大学的职业经验,如指导和工作见习。我们讨论了我们的结果对研究和实践的影响。
{"title":"College-Based Career Experiences as Determinants of IT Labor Market Entry: A Survival Analysis Model","authors":"T. Setor, D. Joseph","doi":"10.1145/2890602.2890607","DOIUrl":"https://doi.org/10.1145/2890602.2890607","url":null,"abstract":"Novice IT professionals are not well-endowed with experience and professional knowledge-attributes gained in the course of IT work-which could facilitate labor market outcomes such as entering the IT workforce immediately after completing college education. However, college-based career experiences such as job shadowing, mentorship, internships and cooperative education are valuable sources of human capital which can engender good future performance and productivity; and, thus, can often decide the employment fate of novice IT professionals. The current study draws on human capital theory and develop a set of hypotheses relating college-based career experiences to the likelihood of securing IT jobs. We test our hypotheses using data from the National Longitudinal Survey of Youth 1997 cohort. We find that hands-on forms of college-based career experiences such internships and cooperative education increase the likelihood of securing IT jobs immediately after completing college. We do not find support for vicarious forms of college-based career experiences i.e. mentorship and job shadowing. We discuss the implications of our results on research and practice.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Is It All About Awareness?: People, Smart Cities 3.0, and Evolving Spaces for IT 这一切都与意识有关吗?:人、智慧城市3.0和不断发展的IT空间
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890612
H. McKenna
The purpose of this paper is to explore contemporary understandings of the smart city movement in relation to information technology (IT) transformations, specifically emerging aware technologies and the use of social media in urban spaces. Faced with rapid urban growth, cities are responding by innovating themselves to address the associated and unprecedented challenges and opportunities. This paper is significant in that it reaches across interdisciplinary domains, to shed light on awareness and the smart cities phenomena. The theoretical perspective for this work draws on material-discursive practices, practice theory, and a performative perspective in relation to IT transformations, smart cities, and awareness. The research design for this study employs an exploratory case study approach, a minimally viable social media space, and multiple methods of qualitative and quantitative data collection and analysis. This paper focuses on two levels of analysis, the individual and the social, in contemporary urban environments. Anecdotal evidence from informal conversations conducted in parallel with this study supports further data analysis, comparison, and triangulation. Key findings are discussed in terms of awareness in relation to experiences of contemporary urban spaces based on the constructs of noticing, sensing, sharing, and smartness. The major contributions of this work include: further development of the research literature for awareness and for IT transformations in relation to smart cities; development, operationalization, and advancing of a conceptual framework for awareness in smart cities; and the identification of future directions for smart cities practitioners and researchers.
本文的目的是探讨与信息技术(IT)转型相关的智慧城市运动的当代理解,特别是新兴的感知技术和社交媒体在城市空间中的使用。面对快速的城市发展,城市正在通过自我创新来应对相关的前所未有的挑战和机遇。本文的重要之处在于它跨越了跨学科领域,揭示了意识和智慧城市现象。这项工作的理论视角借鉴了与IT转型、智慧城市和意识相关的材料话语实践、实践理论和行为视角。本研究的研究设计采用了探索性案例研究法、最小可行的社交媒体空间以及多种定性和定量数据收集和分析方法。本文主要从个体和社会两个层面对当代城市环境进行分析。与本研究同时进行的非正式谈话的轶事证据支持进一步的数据分析、比较和三角测量。主要研究结果基于注意、感知、共享和智慧的结构,从意识的角度讨论了与当代城市空间经验的关系。这项工作的主要贡献包括:进一步发展与智慧城市相关的意识和IT转型的研究文献;智慧城市意识概念框架的开发、实施和推进;并为智慧城市从业者和研究人员确定未来的发展方向。
{"title":"Is It All About Awareness?: People, Smart Cities 3.0, and Evolving Spaces for IT","authors":"H. McKenna","doi":"10.1145/2890602.2890612","DOIUrl":"https://doi.org/10.1145/2890602.2890612","url":null,"abstract":"The purpose of this paper is to explore contemporary understandings of the smart city movement in relation to information technology (IT) transformations, specifically emerging aware technologies and the use of social media in urban spaces. Faced with rapid urban growth, cities are responding by innovating themselves to address the associated and unprecedented challenges and opportunities. This paper is significant in that it reaches across interdisciplinary domains, to shed light on awareness and the smart cities phenomena. The theoretical perspective for this work draws on material-discursive practices, practice theory, and a performative perspective in relation to IT transformations, smart cities, and awareness. The research design for this study employs an exploratory case study approach, a minimally viable social media space, and multiple methods of qualitative and quantitative data collection and analysis. This paper focuses on two levels of analysis, the individual and the social, in contemporary urban environments. Anecdotal evidence from informal conversations conducted in parallel with this study supports further data analysis, comparison, and triangulation. Key findings are discussed in terms of awareness in relation to experiences of contemporary urban spaces based on the constructs of noticing, sensing, sharing, and smartness. The major contributions of this work include: further development of the research literature for awareness and for IT transformations in relation to smart cities; development, operationalization, and advancing of a conceptual framework for awareness in smart cities; and the identification of future directions for smart cities practitioners and researchers.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Use of Weight Loss Apps by Women with Eating Disorders 饮食失调的女性使用减肥应用程序
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2906187
E. Eikey
It is estimated that 20 million females in the United States have an eating disorder, and many more have unhealthy eating behaviors [17, 21]. Two eating disorders that are more common among females than males are anorexia and bulimia nervosa [1]. Approximately 1 in 200 females will develop anorexia nervosa, and 1-3 in 100 will develop bulimia nervosa [13]. The prevalence of these eating disorders has been continuously increasing [21]. While biological and psychological factors play a role in an individual’s predisposition and development of eating disorders [5], researchers in psychology have highlighted the sociocultural perspective, which is used to understand how social and cultural factors, such as media, affect an individual’s mental processes and behaviors [2]. Much of this research has focused on conventional mass media, such as magazines and television. In recent years, researchers have been calling for more work in understanding the impact of new media, such as online content, on the thin ideal, body image, and eating disorder symptomology [15]. Recent work has shown that online content, such as social media, is associated with poor body image and eating disorders, especially among females [7, 12, 20]. Missing in this research are studies on the impact of weight loss applications (“apps”) on eating disorders even though they contain similar content. Weight loss apps are becoming increasingly popular [8]. They allow users to track their calories, exercise, weight, and other factors. Weight loss apps enable and promote dieting, which is a risk for developing an eating disorder [14]. In Human-Computer Interaction (HCI), there has been a great deal of research on apps for diet and/or physical activity [3, 4, 18, 19]. While HCI researchers have focused on designing these apps to promote behavior change, they have largely viewed weight loss app users as having similar needs and have paid little attention to other factors that may influence their app use, such as eating disorders. However, not all weight loss app users have the same needs or challenges. In order to understand the potential negative effects of these apps and the best ways to address these problems, researchers and designers must understand the various types of users who utilize weight loss apps. One such subgroup is women with anorexia and bulimia nervosa. This is an important user group to study because many females frequently suffer from disordered eating behaviors, and anorexia and bulimia nervosa are most common among females [1, 9]. On one hand, research has shown that people with behaviors indicative of eating disorders use technology to maintain the symptomology of their disorder [11, 16]. On the other hand, technology can also be used to aid in eating disorder recovery [10, 22]. However, there has been little research examining the role of weight loss apps in enabling eating disorders or in supporting eating disorder recovery and maintenance. There may be aspects of weig
据估计,美国有2000万女性患有饮食失调症,还有更多的女性有不健康的饮食行为[17,21]。女性比男性更常见的两种饮食失调是厌食症和神经性贪食症[1]。大约每200名女性中就有1人会患上神经性厌食症,每100名女性中有1-3人会患上神经性贪食症[13]。这些饮食失调的患病率不断上升[21]。虽然生物和心理因素在个体的饮食失调易感性和发展过程中发挥作用[5],但心理学研究者强调了社会文化视角,即社会文化视角用于理解媒体等社会文化因素如何影响个体的心理过程和行为[2]。这些研究大多集中在传统的大众媒体上,比如杂志和电视。近年来,研究人员一直呼吁开展更多工作,以了解网络内容等新媒体对瘦身理想、身体形象和饮食失调症状的影响[15]。最近的研究表明,社交媒体等在线内容与身体形象不佳和饮食失调有关,尤其是在女性中[7,12,20]。这项研究缺少关于减肥应用程序(“应用程序”)对饮食失调的影响的研究,尽管它们包含类似的内容。减肥应用越来越受欢迎[8]。它们允许用户跟踪他们的卡路里、运动、体重和其他因素。减肥应用支持并促进节食,这有可能导致饮食失调[14]。在人机交互(Human-Computer Interaction, HCI)领域,人们对饮食和/或身体活动应用进行了大量研究[3,4,18,19]。虽然HCI研究人员专注于设计这些应用程序来促进行为改变,但他们在很大程度上认为减肥应用程序的用户有类似的需求,很少关注可能影响他们使用应用程序的其他因素,比如饮食失调。然而,并不是所有的减肥应用用户都有同样的需求或挑战。为了了解这些应用程序的潜在负面影响以及解决这些问题的最佳方法,研究人员和设计师必须了解使用减肥应用程序的各种类型的用户。其中一个亚群是患有厌食症和神经性贪食症的妇女。这是一个重要的研究用户群体,因为许多女性经常患有饮食失调行为,厌食症和神经性贪食症在女性中最为常见[1,9]。一方面,研究表明,有进食障碍行为的人会使用技术来维持其进食障碍的症状[11,16]。另一方面,技术也可以用来帮助饮食失调的恢复[10,22]。然而,很少有研究调查减肥应用在导致饮食失调或支持饮食失调恢复和维持方面的作用。减肥应用的某些方面可能有助于饮食失调的恢复;然而,也可能有一些方面阻碍用户恢复或促进维持饮食失调。尽管减肥应用很受欢迎,但很少有研究考虑到这些应用对患有饮食失调症的女性的作用。我的工作旨在填补这一空白,通过研究用户和医疗保健提供者对减肥应用程序对患有饮食失调症(特别是厌食症和神经性贪食症)的女性的看法。虽然从社会文化的角度来看,社会文化的影响是导致饮食失调的原因之一,但我的研究旨在研究减肥应用程序的积极和消极方面。我使用定性方法来了解这些饮食失调的女性如何以及为什么使用减肥应用程序。在我的初步研究中,我对一个流行的减肥应用相关的在线论坛上的用户帖子进行了定性的内容分析。通过这项研究,我发现体重指数(BMI)目标过轻的用户对该应用减少饮食失调行为和加剧饮食失调行为的能力有不同的看法。这项研究表明,有饮食失调行为的用户使用旨在减肥的应用程序。这些发现可以揭示使用减肥应用程序恢复饮食失调的问题,以及饮食失调用户的需求。具体来说,减肥应用过于关注体重和卡路里,允许不健康的饮食计划。为了恢复,饮食失调的用户希望有一种方法来跟踪他们的饮食行为和量身定制的健康计划。先前的研究表明,目前许多饮食失调恢复应用缺乏跟踪这些行为的方法,而且也没有很好地利用智能手机的功能[6,10],这可能有助于解释为什么饮食失调的用户转向移动减肥应用。
{"title":"The Use of Weight Loss Apps by Women with Eating Disorders","authors":"E. Eikey","doi":"10.1145/2890602.2906187","DOIUrl":"https://doi.org/10.1145/2890602.2906187","url":null,"abstract":"It is estimated that 20 million females in the United States have an eating disorder, and many more have unhealthy eating behaviors [17, 21]. Two eating disorders that are more common among females than males are anorexia and bulimia nervosa [1]. Approximately 1 in 200 females will develop anorexia nervosa, and 1-3 in 100 will develop bulimia nervosa [13]. The prevalence of these eating disorders has been continuously increasing [21]. While biological and psychological factors play a role in an individual’s predisposition and development of eating disorders [5], researchers in psychology have highlighted the sociocultural perspective, which is used to understand how social and cultural factors, such as media, affect an individual’s mental processes and behaviors [2]. Much of this research has focused on conventional mass media, such as magazines and television. In recent years, researchers have been calling for more work in understanding the impact of new media, such as online content, on the thin ideal, body image, and eating disorder symptomology [15]. Recent work has shown that online content, such as social media, is associated with poor body image and eating disorders, especially among females [7, 12, 20]. Missing in this research are studies on the impact of weight loss applications (“apps”) on eating disorders even though they contain similar content. Weight loss apps are becoming increasingly popular [8]. They allow users to track their calories, exercise, weight, and other factors. Weight loss apps enable and promote dieting, which is a risk for developing an eating disorder [14]. In Human-Computer Interaction (HCI), there has been a great deal of research on apps for diet and/or physical activity [3, 4, 18, 19]. While HCI researchers have focused on designing these apps to promote behavior change, they have largely viewed weight loss app users as having similar needs and have paid little attention to other factors that may influence their app use, such as eating disorders. However, not all weight loss app users have the same needs or challenges. In order to understand the potential negative effects of these apps and the best ways to address these problems, researchers and designers must understand the various types of users who utilize weight loss apps. One such subgroup is women with anorexia and bulimia nervosa. This is an important user group to study because many females frequently suffer from disordered eating behaviors, and anorexia and bulimia nervosa are most common among females [1, 9]. On one hand, research has shown that people with behaviors indicative of eating disorders use technology to maintain the symptomology of their disorder [11, 16]. On the other hand, technology can also be used to aid in eating disorder recovery [10, 22]. However, there has been little research examining the role of weight loss apps in enabling eating disorders or in supporting eating disorder recovery and maintenance. There may be aspects of weig","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Enhanced Visualization Tool for Teaching Monoalphabetic Substitution Cipher Frequency Analysis 一种增强的单字母替换密码频率分析教学可视化工具
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890613
Matthew D. Sprengel, Jason M. Pittman
Information Systems curricula require on-going and frequent review [2] [11]. Furthermore, such curricula must be flexible because of the fast-paced, dynamic nature of the workplace. Such flexibility can be maintained through modernizing course content or, inclusively, exchanging hardware or software for newer versions. Alternatively, flexibility can arise from incorporating new information into curricula from other disciplines. One field where the pace of change is extremely high is cybersecurity [3]. Students are left with outdated skills when curricula lag behind the pace of change in industry. For example, cryptography is a required learning objective in the DHS/NSA Center of Academic Excellence (CAE) knowledge criteria [1]. However, the overarching curriculum associated with basic ciphers has gone unchanged for decades. Indeed, a general problem in cybersecurity education is that students lack fundamental knowledge in areas such as ciphers [5]. In response, researchers have developed a variety of interactive classroom visualization tools [5] [8] [9]. Such tools visualize the standard approach to frequency analysis of simple substitution ciphers that includes review of most common, single letters in ciphertext. While fundamental ciphers such as the monoalphabetic substitution cipher have not been updated (these are historical ciphers), collective understanding of how humans interact with language has changed. Updated understanding in both English language pedagogy [10] [12] and automated cryptanalysis of substitution ciphers [4] potentially renders the interactive classroom visualization tools incomplete or outdated. Classroom visualization tools are powerful teaching aids, particularly for abstract concepts. Existing research has established that such tools promote an active learning environment that translates to not only effective learning conditions but also higher student retention rates [7]. However, visualization tools require extensive planning and design when used to actively engage students with detailed, specific knowledge units such as ciphers [7] [8]. Accordingly, we propose a heatmap-based frequency analysis visualization solution that (a) incorporates digraph and trigraph language processing norms; (b) and enhances the active learning pedagogy inherent in visualization tools. Preliminary results indicate that study participants take approximately 15% longer to learn the heatmap-based frequency analysis technique compared to traditional frequency analysis but demonstrate a 50% increase in efficacy when tasked with solving simple substitution ciphers. Further, a heatmap-based solution contributes positively to the field insofar as educators have an additional tool to use in the classroom. As well, the heatmap visualization tool may allow researchers to comparatively examine efficacy of visualization tools in the cryptanalysis of mono-alphabetic substitution ciphers.
信息系统课程需要持续和频繁的复习[2][11]。此外,由于工作场所的快节奏和动态性质,这些课程必须灵活。这种灵活性可以通过更新课程内容或交换硬件或软件以获得新版本来保持。另外,将新信息纳入其他学科的课程也可以提高灵活性。变化速度极高的一个领域是网络安全[3]。当课程设置落后于行业变革的步伐时,学生们所掌握的技能就会过时。例如,密码学是DHS/NSA学术卓越中心(CAE)知识标准中的一个必修学习目标[1]。然而,与基本密码相关的总体课程几十年来一直没有改变。事实上,网络安全教育中的一个普遍问题是学生缺乏密码等领域的基础知识[5]。为此,研究者开发了多种交互式课堂可视化工具[5][8][9]。这些工具可视化了简单替换密码的频率分析的标准方法,包括对密文中最常见的单个字母的审查。虽然诸如单字母替代密码之类的基本密码没有更新(这些都是历史密码),但对人类如何与语言交互的集体理解已经发生了变化。英语教学法[10][12]和替换密码的自动密码分析[4]的更新理解可能会使交互式课堂可视化工具不完整或过时。课堂可视化工具是强大的教学辅助工具,特别是对于抽象概念。现有的研究表明,这些工具促进了积极的学习环境,不仅转化为有效的学习条件,而且还提高了学生的保留率[7]。然而,可视化工具需要广泛的规划和设计,当使用时,学生积极参与详细的,具体的知识单元,如密码[7][8]。因此,我们提出了一种基于热图的频率分析可视化解决方案:(a)结合有向图和三向图语言处理规范;(b)增强可视化工具固有的主动学习教学法。初步结果表明,与传统的频率分析相比,研究参与者学习基于热图的频率分析技术大约需要15%的时间,但在解决简单替换密码的任务时,效率提高了50%。此外,基于热图的解决方案对该领域的贡献是积极的,因为教育者在课堂上有了一个额外的工具。此外,热图可视化工具可以让研究人员比较检验可视化工具在单字母替代密码分析中的有效性。
{"title":"An Enhanced Visualization Tool for Teaching Monoalphabetic Substitution Cipher Frequency Analysis","authors":"Matthew D. Sprengel, Jason M. Pittman","doi":"10.1145/2890602.2890613","DOIUrl":"https://doi.org/10.1145/2890602.2890613","url":null,"abstract":"Information Systems curricula require on-going and frequent review [2] [11]. Furthermore, such curricula must be flexible because of the fast-paced, dynamic nature of the workplace. Such flexibility can be maintained through modernizing course content or, inclusively, exchanging hardware or software for newer versions. Alternatively, flexibility can arise from incorporating new information into curricula from other disciplines. One field where the pace of change is extremely high is cybersecurity [3]. Students are left with outdated skills when curricula lag behind the pace of change in industry. For example, cryptography is a required learning objective in the DHS/NSA Center of Academic Excellence (CAE) knowledge criteria [1]. However, the overarching curriculum associated with basic ciphers has gone unchanged for decades. Indeed, a general problem in cybersecurity education is that students lack fundamental knowledge in areas such as ciphers [5]. In response, researchers have developed a variety of interactive classroom visualization tools [5] [8] [9]. Such tools visualize the standard approach to frequency analysis of simple substitution ciphers that includes review of most common, single letters in ciphertext. While fundamental ciphers such as the monoalphabetic substitution cipher have not been updated (these are historical ciphers), collective understanding of how humans interact with language has changed. Updated understanding in both English language pedagogy [10] [12] and automated cryptanalysis of substitution ciphers [4] potentially renders the interactive classroom visualization tools incomplete or outdated. Classroom visualization tools are powerful teaching aids, particularly for abstract concepts. Existing research has established that such tools promote an active learning environment that translates to not only effective learning conditions but also higher student retention rates [7]. However, visualization tools require extensive planning and design when used to actively engage students with detailed, specific knowledge units such as ciphers [7] [8]. Accordingly, we propose a heatmap-based frequency analysis visualization solution that (a) incorporates digraph and trigraph language processing norms; (b) and enhances the active learning pedagogy inherent in visualization tools. Preliminary results indicate that study participants take approximately 15% longer to learn the heatmap-based frequency analysis technique compared to traditional frequency analysis but demonstrate a 50% increase in efficacy when tasked with solving simple substitution ciphers. Further, a heatmap-based solution contributes positively to the field insofar as educators have an additional tool to use in the classroom. As well, the heatmap visualization tool may allow researchers to comparatively examine efficacy of visualization tools in the cryptanalysis of mono-alphabetic substitution ciphers.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What is Missing for Trust in the Cloud Computing? 云计算的信任缺失了什么?
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890605
Teófilo T. Branco, H. Santos
This article deals with an analysis of some contracts Cloud Computing on the questions involved in the security of their environment. The objective of this study is to evaluate if the content of the contracts for the provision of IT services platforms in Computer Cloud includes, at present, the clauses necessary to transmit trust in relation the safety. The services must comply with the recommendations and with the security standards to convey reliability. Also is necessary to make indications about security's requirements in their contracts. This study analyzed through in a literature review, the standards and the recommendations proposed by groups of research and Cloud Computing regulatory entities and made a comparison with the contractual clauses published on the web by some suppliers of Cloud IT platforms. A comparison of these contracts with the recommendations of respected entities in the area of the security for consumption of this type of service shows that there is still a lot to improve in these agreements to clarify the aspects of the safety in a transparent way.
本文分析了一些合同云计算所涉及的环境安全问题。本研究的目的是评估目前在计算机云中提供IT服务平台的合同的内容是否包括在安全方面传递信任所需的条款。服务必须符合建议和安全标准,以传递可靠性。在合同中说明安全要求也是必要的。本研究通过文献综述分析了研究小组和云计算监管机构提出的标准和建议,并与一些云IT平台供应商在网上发布的合同条款进行了比较。将这些合同与受尊敬的实体在这类服务消费安全方面的建议进行比较,可以看出这些协议仍有许多需要改进的地方,以便以透明的方式澄清安全的各个方面。
{"title":"What is Missing for Trust in the Cloud Computing?","authors":"Teófilo T. Branco, H. Santos","doi":"10.1145/2890602.2890605","DOIUrl":"https://doi.org/10.1145/2890602.2890605","url":null,"abstract":"This article deals with an analysis of some contracts Cloud Computing on the questions involved in the security of their environment. The objective of this study is to evaluate if the content of the contracts for the provision of IT services platforms in Computer Cloud includes, at present, the clauses necessary to transmit trust in relation the safety. The services must comply with the recommendations and with the security standards to convey reliability. Also is necessary to make indications about security's requirements in their contracts. This study analyzed through in a literature review, the standards and the recommendations proposed by groups of research and Cloud Computing regulatory entities and made a comparison with the contractual clauses published on the web by some suppliers of Cloud IT platforms. A comparison of these contracts with the recommendations of respected entities in the area of the security for consumption of this type of service shows that there is still a lot to improve in these agreements to clarify the aspects of the safety in a transparent way.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Plan to Improve Learning of Requirements Elicitation in an IS Curriculum 在信息系统课程中改进需求启发学习的计划
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890621
Jeremy D. Ezell, Diane Lending, S. Kruck, T. Dillon, Jeffrey L. May
In this paper, we present our plan to integrate requirements elicitation concepts and learning assessments into an Information System curriculum. Both contemporary research and practitioners have noted deficiencies in the abilities of entry-level IT consultants to effectively evaluate new information system needs in business environments. Thus, the ability to professionally and effectively elicit new IS requirements adds significant value to students seeking an IS degree.
在本文中,我们提出了将需求启发概念和学习评估整合到信息系统课程中的计划。当代研究和从业人员都注意到初级IT顾问在有效评估业务环境中新的信息系统需求方面的能力不足。因此,专业和有效地引出新的信息系统要求的能力为寻求信息系统学位的学生增加了重要的价值。
{"title":"A Plan to Improve Learning of Requirements Elicitation in an IS Curriculum","authors":"Jeremy D. Ezell, Diane Lending, S. Kruck, T. Dillon, Jeffrey L. May","doi":"10.1145/2890602.2890621","DOIUrl":"https://doi.org/10.1145/2890602.2890621","url":null,"abstract":"In this paper, we present our plan to integrate requirements elicitation concepts and learning assessments into an Information System curriculum. Both contemporary research and practitioners have noted deficiencies in the abilities of entry-level IT consultants to effectively evaluate new information system needs in business environments. Thus, the ability to professionally and effectively elicit new IS requirements adds significant value to students seeking an IS degree.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"13 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtual World Consumer Behavior 虚拟世界消费者行为
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2906192
Angie M. Cox
This research will look at consumer behaviors in Virtual Worlds (VW) in order to fill the research gap and build a model to explain why users chose to purchase in VWs. Results from this study will help Information Systems (IS) researchers and game developers understand specific user attributes that may affect their intentions to purchase. With this knowledge IS researchers and developers may have the opportunity to manipulate system components in ways to improve business processes and stimulate profits for businesses. This study will rely on the Theory of Reasoned Action (TRA), Flow Theory and the concept of desire for uniqueness (DFU). The study's data will come from online survey volunteer VW users in one region of the United States testing both the model's measurement tool and hypotheses with Structural Equation Modeling (SEM) with Partial Least Squares (PLS). The validity and reliability and the strength and polarity relationships between the variables (user skill, challenge and DFU; VW shopping attitude, subjective norms (SN); and VW purchase intentions) will be assessed. With the results of the study, suggestions for further research will be made.
这项研究将着眼于消费者在虚拟世界(VW)中的行为,以填补研究空白,并建立一个模型来解释为什么用户选择在VW中购买。这项研究的结果将有助于信息系统(IS)研究人员和游戏开发者了解可能影响他们购买意愿的特定用户属性。有了这些知识,信息系统研究人员和开发人员可能有机会以改进业务流程和刺激业务利润的方式操作系统组件。本研究将依赖于理性行为理论(TRA)、心流理论和独特欲望概念(DFU)。该研究的数据将来自美国一个地区的大众用户志愿者的在线调查,他们使用偏最小二乘(PLS)结构方程模型(SEM)测试模型的测量工具和假设。变量(用户技能、挑战和DFU)的效度、信度和强弱极性关系;大众购物态度、主观规范(SN);大众的购买意向)将被评估。根据研究结果,提出进一步研究的建议。
{"title":"Virtual World Consumer Behavior","authors":"Angie M. Cox","doi":"10.1145/2890602.2906192","DOIUrl":"https://doi.org/10.1145/2890602.2906192","url":null,"abstract":"This research will look at consumer behaviors in Virtual Worlds (VW) in order to fill the research gap and build a model to explain why users chose to purchase in VWs. Results from this study will help Information Systems (IS) researchers and game developers understand specific user attributes that may affect their intentions to purchase. With this knowledge IS researchers and developers may have the opportunity to manipulate system components in ways to improve business processes and stimulate profits for businesses. This study will rely on the Theory of Reasoned Action (TRA), Flow Theory and the concept of desire for uniqueness (DFU). The study's data will come from online survey volunteer VW users in one region of the United States testing both the model's measurement tool and hypotheses with Structural Equation Modeling (SEM) with Partial Least Squares (PLS). The validity and reliability and the strength and polarity relationships between the variables (user skill, challenge and DFU; VW shopping attitude, subjective norms (SN); and VW purchase intentions) will be assessed. With the results of the study, suggestions for further research will be made.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"179 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Black Lives Matter: The Journey of a Black IT Scholar 《黑人的命也重要:一位黑人IT学者的旅程》
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890623
C. Cain, E. Trauth
In this paper, we focus on the lived experiences of a particular Black scholar in pursuit of a PhD in IT. The content of this paper was adapted from a dissertation that focused on identifying and analyzing the factors that support or undermine the achievement of Black males completing IT degrees and entering the workforce. The content of this paper centers around the factors that impacted the scholar. In light of the Black Lives Matter movement, we wanted to take a social issue and deconstruct it to apply it to academia. In order to accomplish this, we used a researcher's lived experiences as a Black male for the data for this paper. By the scholar's own admission, [blinded for review] has not reached the level of success that the scholar would like the scholar is still striving to reach those goals. These are goals that the likes of Trayvon Martin, Mike Brown, Dontre Hamilton, Eric Garner, John Crawford III, Ezell Ford and countless others no longer have, which sparked the Black Lives Matter movement.
在本文中,我们关注的是一位黑人学者在攻读IT博士学位时的生活经历。本文的内容改编自一篇论文,该论文的重点是识别和分析支持或破坏黑人男性完成IT学位并进入劳动力市场的因素。本文的内容围绕影响学者的因素展开。鉴于“黑人的命也是命”运动,我们想把一个社会问题解构并应用到学术界。为了做到这一点,我们使用了一位研究人员作为黑人男性的生活经历作为本文的数据。学者自己承认,[盲法审查]没有达到学者希望达到的成功水平,学者仍在努力达到这些目标。这些目标是像特雷沃恩·马丁、迈克·布朗、唐特·汉密尔顿、埃里克·加纳、约翰·克劳福德三世、埃泽尔·福特等无数人不再拥有的,这引发了“黑人的命也重要”运动。
{"title":"Black Lives Matter: The Journey of a Black IT Scholar","authors":"C. Cain, E. Trauth","doi":"10.1145/2890602.2890623","DOIUrl":"https://doi.org/10.1145/2890602.2890623","url":null,"abstract":"In this paper, we focus on the lived experiences of a particular Black scholar in pursuit of a PhD in IT. The content of this paper was adapted from a dissertation that focused on identifying and analyzing the factors that support or undermine the achievement of Black males completing IT degrees and entering the workforce. The content of this paper centers around the factors that impacted the scholar. In light of the Black Lives Matter movement, we wanted to take a social issue and deconstruct it to apply it to academia. In order to accomplish this, we used a researcher's lived experiences as a Black male for the data for this paper. By the scholar's own admission, [blinded for review] has not reached the level of success that the scholar would like the scholar is still striving to reach those goals. These are goals that the likes of Trayvon Martin, Mike Brown, Dontre Hamilton, Eric Garner, John Crawford III, Ezell Ford and countless others no longer have, which sparked the Black Lives Matter movement.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Literature Review on Enterprise Social Media Collaboration in Virtual Teams: Challenges, Determinants, Implications and Impacts 关于虚拟团队中企业社交媒体协作的文献综述:挑战、决定因素、意义和影响
Pub Date : 2016-06-02 DOI: 10.1145/2890602.2890611
Sebastian Dürr, C. Oehlhorn, C. Maier, Sven Laumer
This literature review focusses research on Enterprise Social Media (ESM) and its use within virtual teams. The paper includes results from 38 articles outlining the existing body of knowledge and showing the steady progress in this research field. Previous literature often thematizes the external use of social media and technological aspects, but this research concentrates on the internal collaborative use, its challenges, related determinants, managerial implications and its impact on business. Existing research illustrates key factors in each of the previously mentioned subjects. However, as research should consider the entire field, a research agenda for further studies in this ESM topic is developed.
本文献综述重点研究企业社交媒体(ESM)及其在虚拟团队中的应用。本文收录了 38 篇文章的研究成果,概述了现有的知识体系,并展示了该研究领域的稳步进展。以往的文献通常以社交媒体的外部使用和技术方面为主题,而本研究则集中于内部协作使用、其挑战、相关决定因素、管理意义及其对业务的影响。现有研究说明了上述每个主题的关键因素。不过,由于研究应考虑整个领域,因此制定了进一步研究这一无害环境管理主题的研究议程。
{"title":"A Literature Review on Enterprise Social Media Collaboration in Virtual Teams: Challenges, Determinants, Implications and Impacts","authors":"Sebastian Dürr, C. Oehlhorn, C. Maier, Sven Laumer","doi":"10.1145/2890602.2890611","DOIUrl":"https://doi.org/10.1145/2890602.2890611","url":null,"abstract":"This literature review focusses research on Enterprise Social Media (ESM) and its use within virtual teams. The paper includes results from 38 articles outlining the existing body of knowledge and showing the steady progress in this research field. Previous literature often thematizes the external use of social media and technological aspects, but this research concentrates on the internal collaborative use, its challenges, related determinants, managerial implications and its impact on business. Existing research illustrates key factors in each of the previously mentioned subjects. However, as research should consider the entire field, a research agenda for further studies in this ESM topic is developed.","PeriodicalId":224051,"journal":{"name":"Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130280201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 2016 ACM SIGMIS Conference on Computers and People Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1