Podcasts about acm transactions

  • 22PODCASTS
  • 30EPISODES
  • 57mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 19, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about acm transactions

Latest podcast episodes about acm transactions

ACM ByteCast
Travis S. Humble - Episode 66

ACM ByteCast

Play Episode Listen Later Mar 19, 2025 39:54


In this episode of ACM ByteCast, Rashmi Mohan hosts Travis S. Humble, Director of the Quantum Science Center (QSC), a Distinguished Scientist at Oak Ridge National Laboratory, and Director of the lab's Quantum Computing Institute. He leads the development of new quantum technologies and infrastructure to impact the DOE mission of scientific discovery through quantum computing. As director of the QSC, Travis leads the innovation of scalable, resilient quantum information technologies through new materials, devices, and algorithms and facilitates the transfer of quantum technologies to the broadest audience. He also holds a joint faculty appointment with the University of Tennessee Bredesen Center for Interdisciplinary Research and Graduate Education working with students on energy-efficient computing solutions. Travis is Editor-in-Chief for ACM Transactions on Quantum Computing, Associate Editor for Quantum Information Processing, and Co-Chair of the IEEE Quantum Initiative.  Travis describes his journey into quantum computing, which began in theoretical chemistry, where he studied quantum processes in chemical reactions. He explains the difference between classical and quantum computing and why quantum computing is particularly well suited for scientific applications such as drug discovery and energy solutions. He talks about Oak Ridge's quantum computing resources and how researchers can access them. Travis also stresses the role education in advancing quantum computing and shares his predictions for its near future.

WorkCookie - A SEBOC Podcast
Ep. 232 - Building Trust and Inclusion in Tech-Hybrid Teams

WorkCookie - A SEBOC Podcast

Play Episode Listen Later Dec 2, 2024 65:08


We explored the challenges and potential solutions for building trust, inclusion, and collaboration in tech-hybrid or remote teams. A focus on how technology supports transparent communication and fosters connections in tech-enabled environments related to socio-technical teams. (Tech-hybrid teams blend humans and robotics, AI, or other modern technology as team members.)  In this Episode: Dr. Emi Baressi, Tom Bradshaw, special guests Keith and Daniel Edwards from the Houston RobotLab, Dr. Matt Lampe, Alexander Abney-King, Nic Krueger, Rich Cruz, Dr. Martha Grajdek    Visit us https://www.seboc.com/ Follow us on LinkedIn: https://bit.ly/sebocLI Join an open-mic event: https://www.seboc.com/events   References: Arslan, A., Cooper, C., Khan, Z., Golgeci, I., & Ali, I. (2022). Artificial intelligence and human workers interaction at team level: a conceptual assessment of the challenges and potential HRM strategies. International Journal of Manpower, 43(1), 75–88. https://doi.org/10.1108/IJM-01-2021-0052   Berretta, S., Tausch, A., Ontrup, G., Gilles, B., Peifer, C., & Kluge, A. (2023). Defining human-AI teaming the human-centered way: A scoping review and network analysis. Frontiers in Artificial Intelligence, 6, 1250725–1250725. https://doi.org/10.3389/frai.2023.1250725 Belanger, F., Collins, R. W., & Cheney, P. H. (2001). Technology Requirements and Work Group Communication for Telecommuters. Information Systems Research, 12(2), 155–176. https://doi.org/10.1287/isre.12.2.155.9695   Belling, S. (2021). PsychoWorkplacegenerationslogy of Remote Teams: Trust, People, and Connections. In Remotely Possible (pp. 59–73). Apress. https://doi.org/10.1007/978-1-4842-7008-0_5   Boccoli, G., Gastaldi, L., & Corso, M. (2024). Transformational leadership and work engagement in remote work settings: The moderating role of the supervisor's digital communication skills. Leadership & Organization Development Journal, 45(7), 1240–1257. https://doi.org/10.1108/LODJ-09-2023-0490   Brock, J. K.-U., & von Wangenheim, F. (2019). Demystifying AI: What Digital Transformation Leaders Can Teach You about Realistic Artificial Intelligence. California Management Review, 61(4), 110–134. https://doi.org/10.1177/1536504219865226   Chin, J. H., Haring, K. S., & Kim, P. (2023). Understanding the neural mechanisms of empathy toward robots to shape future applications. Frontiers in neurorobotics, 17, 1145989. https://doi.org/10.3389/fnbot.2023.1145989   Ezer, N., Bruni, S., Cai, Y., Hepenstal, S. J., Miller, C. A., & Schmorrow, D. D. (2019). Trust Engineering for Human-AI Teams. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 63(1), 322–326. https://doi.org/10.1177/1071181319631264   Flathmann, C., Schelble, B. G., Rosopa, P. J., McNeese, N. J., Mallick, R., & Madathil, K. C. (2023). Examining the impact of varying levels of AI teammate influence on human-AI teams. International Journal of Human-Computer Studies, 177, 103061-. https://doi.org/10.1016/j.ijhcs.2023.103061   Fuchs, A., Passarella, A., & Conti, M. (2024). Optimizing Delegation in Collaborative Human-AI Hybrid Teams. ACM Transactions on Autonomous and Adaptive Systems. https://doi.org/10.1145/3687130   Guznov, S., Lyons, J., Pfahler, M., Heironimus, A., Woolley, M., Friedman, J., & Neimeier, A. (2020). Robot Transparency and Team Orientation Effects on Human-Robot Teaming. International Journal of Human-Computer Interaction, 36(7), 650–660. https://doi.org/10.1080/10447318.2019.1676519   Hagemann, V., Rieth, M., Suresh, A., & Kirchner, F. (2023). Human-AI teams—Challenges for a team-centered AI at work. Frontiers in Artificial Intelligence, 6, 1252897–1252897. https://doi.org/10.3389/frai.2023.1252897   Harris-Watson, A. M., Larson, L. E., Lauharatanahirun, N., DeChurch, L. A., & Contractor, N. S. (2023). Social perception in Human-AI teams: Warmth and competence predict receptivity to AI teammates. Computers in Human Behavior, 145, 107765-. https://doi.org/10.1016/j.chb.2023.107765   Hauptman, A. I., Schelble, B. G., Duan, W., Flathmann, C., & McNeese, N. J. (2024). Understanding the influence of AI autonomy on AI explainability levels in human-AI teams using a mixed methods approach. Cognition, Technology & Work, 26(3), 435–455. https://doi.org/10.1007/s10111-024-00765-7   Hauptman, A. I., Schelble, B. G., McNeese, N. J., & Madathil, K. C. (2023). Adapt and overcome: Perceptions of adaptive autonomous agents for human-AI teaming. Computers in Human Behavior, 138, 107451-. https://doi.org/10.1016/j.chb.2022.107451   Li, M., Kwon, M., & Sadigh, D. (2021). Influencing leading and following in human–robot teams. Autonomous Robots, 45(7), 959–978. https://doi.org/10.1007/s10514-021-10016-7   Ma, L. M., Ijtsma, M., Feigh, K. M., & Pritchett, A. R. (2022). Metrics for Human-Robot Team Design: A Teamwork Perspective on Evaluation of Human-Robot Teams. ACM Transactions on Human-Robot Interaction, 11(3), 1–36. https://doi.org/10.1145/3522581   Naikar, N., Brady, A., Moy, G., & Kwok, H.-W. (2023). Designing human-AI systems for complex settings: ideas from distributed, joint, and self-organising perspectives of sociotechnical systems and cognitive work analysis. Ergonomics, 66(11), 1669–1694. https://doi.org/10.1080/00140139.2023.2281898   Traeger, M. L., Sebo, S. S., Jung, M., Scassellati, B., & Christakis, N. A. (2020). Vulnerable robots positively shape human conversational dynamics in a human–robot team. Proceedings of the National Academy of Sciences, 117(12), 6370–6375. https://doi.org/10.1073/pnas.1910402117   You, S., & Robert, L. P. (2022). Team robot identification theory (TRIT): robot attractiveness and team identification on performance and viability in human–robot teams. The Journal of Supercomputing, 78(18), 19684–19706. https://doi.org/10.1007/s11227-022-04645-7

WorkCookie - A SEBOC Podcast
Ep. 231 - Embracing Technology While Keeping People First

WorkCookie - A SEBOC Podcast

Play Episode Listen Later Nov 25, 2024 61:22


Explore how leaders can balance the benefits of technology integration with a human-centered approach. We discussed; - Strategies for ensuring that new digital tools and systems enhance, rather than diminish, employee experience and engagement. - The definition of personhood in the workplace. In this Episode: Dr. Emi Barresi, Tom Bradshaw, Ken Durbin, Nic Krueger, Lee Crowson Alexander Abney-King, LindaAnn Rogers   Visit us https://www.seboc.com/ Follow us on LinkedIn: https://bit.ly/sebocLI Join an open-mic event: https://www.seboc.com/events   References: Corbett, F., & Spinello, E. (2020). Connectivism and leadership: harnessing a learning theory for the digital age to redefine leadership in the twenty-first century. Heliyon, 6(1), e03250–e03250. https://doi.org/10.1016/j.heliyon.2020.e03250   Cortellazzo, L., Bruni, E., & Zampieri, R. (2019). The role of leadership in a digitalized world: A review. Frontiers in Psychology, 10, 1938–1938. https://doi.org/10.3389/fpsyg.2019.01938   Gomoll, A., Hmelo-Silver, C. E., Šabanović, S., & Francisco, M. (2016). Dragons, ladybugs, and softballs: Girls' stem engagement with human-centered robotics. Journal of Science Education and Technology, 25(6), 899–915. https://doi.org/10.1007/s10956-016-9647-z   Flathmann, C., Schelble, B. G., Rosopa, P. J., McNeese, N. J., Mallick, R., & Madathil, K. C. (2023). Examining the impact of varying levels of AI teammate influence on human-AI teams. International Journal of Human-Computer Studies, 177, 103061-. https://doi.org/10.1016/j.ijhcs.2023.103061   Guillen, I., & Montalvo, F. (2021). Human-centered modeling applications in intelligent manufacturing systems. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 65(1), 838–842. https://doi.org/10.1177/1071181321651292   Malik, A. (2022). Strategic human resource management and employment relations : an international perspective (Second edition). Springer.   Pfannstiel, M. A. (2023). Human-Centered Service Design for Healthcare Transformation : Development, Innovation, Change (1st ed. 2023.). Springer International Publishing. https://doi.org/10.1007/978-3-031-20168-4   Shneiderman, B. (2020). Bridging the gap between ethics and practice: guidelines for reliable, safe, and trustworthy human-centered ai systems. ACM Transactions on Interactive Intelligent Systems, 10(4), 1–31. https://doi.org/10.1145/3419764   Wymer, J. A., Weberg, D. R., Stucky, C. H., & Allbaugh, N. N. (2023). Human-centered design: principles for successful leadership across health care teams and technology. Nurse Leader, 21(1), 93–98. https://doi.org/10.1016/j.mnl.2022.11.004  

Fronteiras da Engenharia de Software
A linguagem de programação Lua (e seu impacto na Engenharia de Software)

Fronteiras da Engenharia de Software

Play Episode Listen Later Nov 19, 2024 69:07


Neste episódio do Fronteiras da Engenharia de Software, exploramos o impacto global da linguagem de programação Lua na engenharia de software. Criada no Brasil, Lua é amplamente utilizada em diversas áreas, como desenvolvimento de jogos, ferramentas para engenheiros e sistemas embarcados. Com uma abordagem técnica e histórica, analisamos suas características e seu legado no cenário tecnológico. Nosso convidado é Roberto Ierusalimschy, Professor Titular da PUC-Rio e co-criador de Lua. Roberto é uma das mentes por trás dessa linguagem leve, eficiente e amplamente reconhecida. Além de liderar o design da linguagem, publicou artigos em revistas prestigiadas como Communications of the ACM e ACM Transactions on Programming Languages and Systems e escreveu o livro Programming in Lua. Sua vasta experiência oferece uma visão profunda sobre os desafios e conquistas no desenvolvimento de Lua. Os apresentadores Adolfo Neto e Maria Claudia Emer conduzem a conversa, abordando temas como: Introdução à linguagem Lua e sua utilidade como primeira linguagem de programação. O processo de design e manutenção da linguagem, incluindo como decisões sobre novas features são tomadas. Usos notáveis de Lua em jogos (como no Roblox) e em ferramentas para pesquisa em engenharia de software. Além disso, discutimos a importância de Lua como um marco para linguagens de programação originadas em países em desenvolvimento e traçamos paralelos com outras linguagens criadas por brasileiros, como Elixir e Lean. Roberto também compartilha reflexões sobre sua trajetória acadêmica, suas motivações e temas de interesse para futuras colaborações em pesquisa. Encerramos com uma provocação sobre as próximas fronteiras na engenharia de software, oferecendo uma visão para os profissionais da área. Roberto Ierusalimschy:  https://www.inf.puc-rio.br/~roberto/  https://scholar.google.com/citations?user=_pZgPlIAAAAJ&hl=en&oi=ao https://www.inf.puc-rio.br/blog/professor/roberto-ierusalimschy/  https://github.com/roberto-ieru  Artigos: A Look at the Design of Lua, Communications of the ACM, 2018 https://bit.ly/3YT8Jro  The Evolution of Lua, HOPL 2007 https://bit.ly/40Up0iq  Demais Links  Programming in Lua https://amzn.to/4e0BYOs  Entrevista de Roberto no freecodecamp em português  https://www.freecodecamp.org/portuguese/news/podcast-ep05/ Entrevista de Roberto no OsProgramadores https://osprogramadores.com/podcast/podcast-16/ Tim Menzies https://www.csc.ncsu.edu/people/tjmenzie https://timm.fyi/  Lua na PUC-Rio (2020) https://www.youtube.com/watch?v=REwxKPitiZM Posse e aula magistral do professor Roberto Ierusalimschy (2023) https://youtu.be/Va6i3zh4_Io?si=vAATO2r_iP93ow0P  Lua Workshop  30 anos de Lua  https://www.youtube.com/playlist?list=PLRKeuVfLlY-4OZKpfochBktBuqgz123YH Roberto Ierusalimschy – Pesquisador Homenageado da CELP https://www.inf.puc-rio.br/blog/noticia/noticia/roberto-ierusalimschy-pesquisador-homenageado-da-celp  Entrevistas com Roberto https://open.spotify.com/search/%22roberto%20ierusalimschy%22/podcastAndEpisodes  Comente no YouTube, no Spotify ou pelo email ⁠fronteirasesw@gmail.com⁠ Entrevistadores: Adolfo Neto (PPGCA UTFPR) ⁠⁠⁠⁠⁠⁠⁠https://adolfont.github.io⁠  ⁠  ⁠e Maria Claudia Emer Nosso site é: ⁠⁠⁠⁠⁠https://fronteirases.github.io⁠  ⁠   Música utilizada: Extreme Energy (Music Today 80). Composed & Produced by: Anwar Amr. Link:⁠ ⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/watch?v=8ZZbAkKNx7s⁠  ⁠⁠⁠⁠      Data de publicação: 19 de novembro de 2024. Como citar este episódio: FRONTEIRAS DA ENGENHARIA DE SOFTWARE EP. 52:  A linguagem de programação Lua (e seu impacto na Engenharia de Software), com Roberto Ierusalimschy (PUC-Rio). [Locução de]: Adolfo Neto e Maria Claudia Emer. Entrevistado: Roberto Ierusalimschy. S. l.: Fronteiras da Engenharia de Software, 19 nov. 2024. Podcast. Disponível em: ⁠⁠⁠⁠https://fronteirases.github.io/episodios/paginas/52⁠. ⁠Acesso em: 19 out. 2024.

this IS research
Orthogonal testing planes and electricity in the kitchen

this IS research

Play Episode Listen Later Sep 18, 2024 54:01


Did you know that when you spend time on an online platform, you could be experiencing between six to eight different experimental treatments that stem from several hundred A/B tests that run concurrently? That's how common digital experimentation is today. And while this may be acceptable in industry, large-scale digital experimentation poses some substantial challenges for researchers wanting to evaluate theories and disconfirm hypotheses through randomized controlled trials done on digital platforms. Thankfully, the brilliant has a new paper forthcoming that illuminates the orthogonal testing plane problem and offers some guidelines for sidestepping the issue. So if experiments are your thing, you really need to listen to what is really going on out there. References Abbasi, A., Somanchi, S., & Kelley, K. (2024). The Critical Challenge of using Large-scale Digital Experiment Platforms for Scientific Discovery. MIS Quarterly, . Miranda, S. M., Berente, N., Seidel, S., Safadi, H., & Burton-Jones, A. (2022). Computationally Intensive Theory Construction: A Primer for Authors and Reviewers. MIS Quarterly, 46(2), i-xvi. Karahanna, E., Benbasat, I., Bapna, R., & Rai, A. (2018). Editor's Comments: Opportunities and Challenges for Different Types of Online Experiments. MIS Quarterly, 42(4), iii-x. Kohavi, R., & Thomke, S. (2017). The Surprising Power of Online Experiments. Harvard Business Review, 95(5), 74-82. Fisher, R. A. (1935). The Design of Experiments. Oliver and Boyd. Pienta, D., Vishwamitra, N., Somanchi, S., Berente, N., & Thatcher, J. B. (2024). Do Crowds Validate False Data? Systematic Distortion and Affective Polarization. MIS Quarterly, . Bapna, R., Goes, P. B., Gupta, A., & Jin, Y. (2004). User Heterogeneity and Its Impact on Electronic Auction Market Design: An Empirical Exploration. MIS Quarterly, 28(1), 21-43. Somanchi, S., Abbasi, A., Kelley, K., Dobolyi, D., & Yuan, T. T. (2023). Examining User Heterogeneity in Digital Experiments. ACM Transactions on Information Systems, 41(4), 1-34. Mertens, W., & Recker, J. (2020). New Guidelines for Null Hypothesis Significance Testing in Hypothetico-Deductive IS Research. Journal of the Association for Information Systems, 21(4), 1072-1102. GRADE Working Group. (2004). Grading Quality of Evidence and Strength of Recommendations. British Medical Journal, 328(7454), 1490-1494. Abbasi, A., Parsons, J., Pant, G., Liu Sheng, O. R., & Sarker, S. (2024). Pathways for Design Research on Artificial Intelligence. Information Systems Research, 35(2), 441-459. Abbasi, A., Chiang, R. H. L., & Xu, J. (2023). Data Science for Social Good. Journal of the Association for Information Systems, 24(6), 1439-1458. Babar, Y., Mahdavi Adeli, A., & Burtch, G. (2023). The Effects of Online Social Identity Signals on Retailer Demand. Management Science, 69(12), 7335-7346. Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design Science in Information Systems Research. MIS Quarterly, 28(1), 75-105. Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-291. Benbasat, I., & Zmud, R. W. (2003). The Identity Crisis Within The IS Discipline: Defining and Communicating The Discipline's Core Properties. MIS Quarterly, 27(2), 183-194. Gregor, S., & Hevner, A. R. (2013). Positioning and Presenting Design Science Research for Maximum Impact. MIS Quarterly, 37(2), 337-355. Rai, A. (2017). Editor's Comments: Avoiding Type III Errors: Formulating IS Research Problems that Matter. MIS Quarterly, 41(2), iii-vii. Burton-Jones, A. (2023). Editor's Comments: Producing Significant Research. MIS Quarterly, 47(1), i-xv.  Abbasi, A., Dillon, R., Rao, H. R., & Liu Sheng, O. R. (2024). Preparedness and Response in the Century of Disasters: Overview of Information Systems Research Frontiers. Information Systems Research, 35(2), 460-468.

Subject to
Subject to: Carola Doerr

Subject to

Play Episode Listen Later Apr 4, 2024 74:58


Carola Doerr, formerly Winzen, is a CNRS research director in the Computer Science department LIP6 of Sorbonne Université in Paris, France. Carola's main research activities are in the analysis of black-box optimization algorithms, both by mathematical and by empirical means. Specifically, she is very interested in controlling the choice and the configuration of black-box optimization algorithms all along the optimization process -- with and without Machine Learning techniques. She is equally interested in complexity results, running time bounds, good benchmarking practices, empirical evaluations, and practical applications of self-adjusting black-box optimization algorithms. Carola is associate editor of IEEE Transactions on Evolutionary Computation, ACM Transactions on Evolutionary Learning and Optimization (TELO) and Evolutionary Computation. She is/was program chair for the BBSR track at GECCO 2024, the GECH track at GECCO 2023, for PPSN 2020, FOGA 2019 and for the theory tracks of GECCO 2015 and 2017. She has organized Dagstuhl seminars and Lorentz Center workshops. Together with Pascal Kerschke, Carola leads the 'Algorithm selection and configuration' working group of COST action CA22137. Carola's works have received several awards, among them the CNRS bronze medal, the Otto Hahn Medal of the Max Planck Society, best paper awards at GECCO, CEC, and EvoApplications.

The Empathy Edge
Dr. Michelle Zhou: Empathic AI is Real and It's Here - But We Need Everyone Involved!

The Empathy Edge

Play Episode Listen Later Nov 7, 2023 43:55


Much of the AI you hear about these days is about large language models trained to look for commonalities and best next guesses. This causes a lot of fear around how AI will be abused - Will the bots take over? Are the inputs unbiased and accurate? Will my teenager cheat on his school essay? But we can take a more thoughtful and opportunistic view of AI, specifically in areas where we can teach AI empathy. Yes, I said teach AI empathy. My guest today, Dr. Michelle Zhou, and I discuss how cognitive AI is different from large learning model AI, how these systems learn empathy, and how they empower both companies and individuals without the resources for expensive solutions. We discuss why empathy is actually even more necessary, not less, in the age of AI. And most importantly, we chat about why everyone needs to get involved in AI - why we need to "democratize it", as Dr. Zhou states, in order to be more inclusive and learn how to respond to a variety of needs and people. Dr. Zhou reveals why she believes basic customer service chatbots are one of the worst uses of AI out there!To access the episode transcript, please click on the episode title at www.TheEmpathyEdge.com Key Takeaways:AI currently looks for commonalities in people and data, as it learns to be more empathetic, we need to teach it how to recognize differences, not just those similarities. The more we all interact with AI, the more that AI is going to be smarter about understanding individual differences.There is a time and place for canned responses by a ChatBot, but often people will respond better if there is a specific response to their unique questions and needs. "In order for AI to be inclusive, then we need more people to be there. If there are more people participating, then you have more diversity. The more involvement from a human side, the more inclusive AI can be." — Dr. Michelle Zhou About Michelle Zhou, Co-Founder & CEO, Juji Inc.Dr. Michelle Zhou is a Co-Founder and CEO of Juji, Inc., an Artificial Intelligence (AI) company located in Silicon Valley, specializing in building cognitive conversational AI technologies and solutions that enable the creation and adoption of empathic and empathetic AI agents. Prior to starting Juji, Michelle led the User Systems and Experience Research (USER) group at IBM Research – Almaden and then the IBM Watson Group. Michelle's expertise is in the interdisciplinary area of intelligent user interaction (IUI), including conversational AI systems and personality analytics. She is an inventor of the IBM Watson Personality Insights and has led the research and development of at least a dozen products in her areas of expertise. Michelle has published over 100 peer-reviewed, refereed scientific articles and 45+ patents. Michelle is the Editor-in-Chief of ACM Transactions on Interactive Intelligent Systems (TiiS) and an Associate Editor of ACM Transactions on Intelligent Systems and Technology (TIST). She received a Ph.D. in Computer Science from Columbia University and is an ACM Distinguished Scientist. Dr. Zhou has been featured in Axios, Fortune, New York Times, Christian Science Monitor, and spoke at Fortune Brainstorm Tech last year.Connect with Michelle Zhou Website: https://juji.io/ X: https://twitter.com/senseofsnow2011 LinkedIn: https://www.linkedin.com/in/mxzhou/ Join the tribe, download your free guide! Discover what empathy can do for you: http://red-slice.com/business-benefits-empathy Connect with Maria: Get the podcast and book: TheEmpathyEdge.comLearn more about Maria and her work: Red-Slice.comHire Maria to speak at your next event: Red-Slice.com/Speaker-Maria-RossTake my LinkedIn Learning Course! Leading with EmpathyLinkedIn: Maria RossInstagram: @redslicemariaX: @redsliceFacebook: Red SliceThreads: @redslicemaria

AI For All Podcast
Cognitive AI, AI Assistants, and Artificial Empathy | Juji's Michelle Zhou

AI For All Podcast

Play Episode Listen Later Aug 10, 2023 41:38


On this episode of the AI For All Podcast, Michelle Zhou, Co-Founder and CEO of Juji, joins Ryan Chacon and Neil Sahota to discuss cognitive AI. They talk about the benefits of cognitive AI, artificial empathy, robots vs chatbots, psychographics in AI, why enterprises should adopt cognitive AI, no-code AI, AI as an assistant, and the future of AI. Dr. Michelle Zhou is a co-founder and CEO of Juji. Prior to starting Juji, Michelle led the User Systems and Experience Research (USER) group at IBM Research – Almaden and then the IBM Watson Group. Michelle's expertise is in the interdisciplinary area of intelligent user interaction (IUI), including conversational AI systems and personality analytics. She is an inventor of the IBM Watson Personality Insights and has led the research and development of at least a dozen products in her areas of expertise. Michelle has published over 100 peer-reviewed, refereed scientific articles and 45+ patents. Michelle is the Editor-in-Chief of ACM Transactions on Interactive Intelligent Systems (TiiS) and an Associate Editor of ACM Transactions on Intelligent Systems and Technology (TIST). She received a PhD in Computer Science from Columbia University and is an ACM Distinguished Scientist. Juji is an AI company located in Silicon Valley, specializing in building cognitive conversational AI technologies and solutions that enable the creation and adoption of empathic and empathetic AI agents. Their goal is to democratize AI and enable every organization, with or without AI or IT resources, to rapidly generate, customize, and operate AI beings that help scale out their high-touch, high-stakes services with a human touch. More about Juji: https://juji.io/ Key Questions and Topics from This Episode: (00:00) Intro to the AI For All Podcast (01:15) Intro to Michelle Zhou and Juji (01:48) What is cognitive AI? (03:00) Benefits of cognitive AI (05:03) Artificial empathy (16:28) Robots vs chatbots (19:26) Psychographics in AI (27:13) Why should enterprises adopt cognitive AI? (31:31) No-code AI (35:19) AI as an assistant (37:13) Future of AI Subscribe on YouTube: https://bit.ly/43dYQV9 Join Our Newsletter: https://ai-forall.com Follow Us on Twitter: https://twitter.com/_aiforall

Gesunde Gestaltung
#23: Prof. Dr. Marc Hassenzahl zu KI im therapeutischen Kontext, Experience Design und Bedürfnisorientierung

Gesunde Gestaltung

Play Episode Listen Later Jul 24, 2023 105:34


Dr. Marc Hassenzahl ist Professor für "Ubiquitous Design / Erlebnis und Interaktion" am Institut für Wirtschaftsinformatik der Universität Siegen. Als promovierter Psychologe verbindet er seinen erfahrungswissenschaftlichen Hintergrund mit der Leidenschaft für das Interaktionsdesign. Im Mittelpunkt steht dabei die Theorie und Praxis des Gestaltens freudvoller, bedeutungsvoller und transformativer Erlebnisse. Marc ist Autor von "Experience Design. Technology for all the right reasons" (MorganClaypool) und anderen Beiträgen an der Nahtstelle von Psychologie, Designforschung, Interaktions- und Industriedesign. In dieser vielschichtigen Folge beschäftigen wir uns mit der Frage wie wir Erlebnisse gestalten können und welche Rolle dabei die Orientierung an Bedürfnissen spielen kann. Wir widmen uns auch den gegenwärtigen Herausforderungen einer Nachhaltigen Entwicklung und welchen Beitrag Gestaltung hierzu leisten kann. Und wir erörtern Chancen, Risiken und Annäherungsversuche zur KI im therapeutischen Kontext.     Time Stamps und erwähnte Quellen:   05:00 Am Anfang: Diefenbach, S., & Hassenzahl, M. (2017). Psychologie in der nutzerzentrierten Produktgestaltung. Mensch-Technik-Erlebnis-Interaktion. Springer, Berlin, Heidelberg.   zu Bedürfnissen: Hassenzahl, M., Eckoldt, K., Diefenbach, S., Laschke, M., Lenz, E., & Kim, J. (2013). Designing moments of meaning and pleasure. Experience design and happiness. International Journal of Design, 7(3), 21–31.   29:00 Frauenberger, Christopher. "Entanglement HCI the next wave?." ACM Transactions on Computer-Human Interaction (TOCHI) 27.1 (2019): 1-27.   30:00 Hassenzahl, M., Dörrenbächer, J., Laschke, M., & Sadeghian, S. (2022, October). European Union's Green Smart Directive or How Resource-Conscious Smart Systems Saved the World. In Nordic Human-Computer Interaction Conference (pp. 1-5).   41:00 Dörrenbächer, J., Laschke, M., & Hassenzahl, M. (2021). Utopien erleben. Eine Methode für soziale Innovationen aus dem Jahr 2020. In bauhaus-paradigmen: künste, design und pädagogik (pp. 372–380).   48:00 Dörrenbächer, J., Ringfort-Felner, R., Neuhaus, R., & Hassenzahl, M. (Eds.). (2022). Meaningful futures with robots: Designing a new coexistence. CRC Press.   52:00 Laschke, M., Braun, C., Neuhaus, R., & Hassenzahl, M. (2020). Meaningful Technology at Work – A Reflective Design Case of Improving Radiologists ' Wellbeing Through Medical Technology. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1–12.   1:03 Hassenzahl, M., & Klapperich, H. (2014, October). Convenient, clean, and efficient? The experiential costs of everyday automation. In Proceedings of the 8th nordic conference on human-computer interaction: fun, fast, foundational (pp. 21-30).   1:06 Lenz, E., Hassenzahl, M., & Diefenbach, S. (2019). How Performing an Activity Makes Meaning. Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems  - CHI '19, 1–6. https://doi.org/10.1145/3290607.3312881     Weiterführende Informationen und relevante Links: Ceschin, Fabrizio; Gaziulusoy, Idil (2016): Evolution of design for sustainability: From product design to design for system innovations and transitions. In: Design Studies 47, S. 118-163. DOI: 10.1016/j.destud.2016.09.002.   Defila, Rico; Di Giulio, Antonietta (Hg.) (2019): Transdisziplinär und transformativ forschen, Band 2. Eine Methodensammlung. Wiesbaden: Springer VS Open (Springer eBook Collection).   Eilert, Rebecca; Hassenzahl, Marc; Buhr, Mirijam (07062020): The Osteoarthritis-Journey. In: Ron Wakkary, Kristina Andersen, Will Odom, Audrey Desjardins und Marianne Graves Petersen (Hg.): Companion Publication of the 2020 ACM Designing Interactive Systems Conference. DIS '20: Designing Interactive Systems Conference 2020. Eindhoven Netherlands, 06 07 2020 10 07 2020. New York, NY, USA: ACM, S. 111-116.  

The Social-Engineer Podcast
Ep. 197 - The Doctor Is In Series - Information Elicitation

The Social-Engineer Podcast

Play Episode Listen Later Feb 6, 2023 53:04


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie are discussing: Information Elicitation. We will discuss what it is, why it's so important to use ‘science-based interviewing', and why approaches that encourage cooperation are better than manipulation of information retrieval. [Feb 6, 2023]   00:00 – Intro 00:20 – Dr. Abbie Maroño Intro 00:54 – Intro Links Social-Engineer.com- http://www.social-engineer.com/ Managed Voice Phishing- https://www.social-engineer.com/services/vishing-service/ Managed Email Phishing- https://www.social-engineer.com/services/se-phishing-service/ Adversarial Simulations- https://www.social-engineer.com/services/social-engineering-penetration-test/ Social-Engineer channel on SLACK- https://social-engineering-hq.slack.com/ssb CLUTCH- http://www.pro-rock.com/ org- http://www.innocentlivesfoundation.org/ 03:58 – The Topic of the Day: Information Elicitation                                                        05:41 – How does your scientific research affect practitioners?                                                   06:47 – Start with the Brain                                                         07:32 – Elicitation: A Scientific Definition                                                               09:36 – Weaponizing Elicitation                                                  11:17 – It's Easier Than You Think                                                             13:40 – The Perils of Poker Face                                                16:41 – Being on the Defensive                                                 19:17 – Me, You, and Us                                                               21:28 – The Verbal Approaches                                                 25:16 – Collaboration is Key!                                                       30:37 – An Effective Approach: Subliminal Priming                                                            32:00 – "They'll Become What They're Called"                                                    33:33 – This Applies to Life                                                           35:07 – Make it Conversational                                                  36:56 – The Scharff Technique                                                   40:48 – Forensic vs Clinical                                                           43:23 – Last Week on "24"                                                           45:01 – Tips for the Boss: Shame Doesn't Work                                                   49:41 – This is the Hardest Part                                                  51:46 – Wrap Up & Outro social-engineer.com innocentlivesfoundation.org   Find us online: Twitter: https://twitter.com/abbiejmarono LinkedIn: com/in/dr-abbie-maroño-phd-35ab2611a Twitter: https://twitter.com/humanhacker LinkedIn: com/in/christopherhadnagy   References: Kong, Y., & Schoenebeck, G. (2019). An information theoretic framework for designing information elicitation mechanisms that reward truth-telling. ACM Transactions on Economics and Computation (TEAC), 7(1), 1-33.   Lakin, J. L., Jefferis, V. E., Cheng, C. M., & Chartrand, T. L. (2003). The chameleon effect as social glue: Evidence for the evolutionary significance of nonconscious mimicry. Journal of nonverbal behavior, 27(3), 145-162.   Tschacher, W., Rees, G. M., & Ramseyer, F. (2014). Nonverbal synchrony and affect in dyadic interactions. Frontiers in psychology, 5, 1323.   Brandon, S. E., Wells, S., & Seale, C. (2018). Science‐based interviewing: Information elicitation. Journal of Investigative Psychology and Offender Profiling, 15(2), 133-148.   Kong, Y., Schoenebeck, G., Tao, B., & Yu, F. Y. (2020, April). Information elicitation mechanisms for statistical estimation. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 34, No. 02, pp. 2095-2102).   Shaw, D. J., Vrij, A., Leal, S., Mann, S., Hillman, J., Granhag, P. A., & Fisher, R. P. (2015). Mimicry and investigative interviewing: Using deliberate mimicry to elicit information and cues to deceit. Journal of Investigative Psychology and Offender Profiling, 12(3), 217-230.   Baddeley, M. C., Curtis, A., & Wood, R. (2004). An introduction to prior information derived from probabilistic judgements: elicitation of knowledge, cognitive bias and herding. Geological Society, London, Special Publications, 239(1), 15-27.   Deeb, H., Vrij, A., Leal, S., & Burkhardt, J. (2021). The effects of sketching while narrating on information elicitation and deception detection in multiple interviews. Acta Psychologica, 213, 103236.   Boone, R. T., & Buck, R. (2003). Emotional expressivity and trustworthiness: The role of nonverbal behavior in the evolution of cooperation. Journal of Nonverbal Behavior, 27(3), 163-182.   Culpepper, P. D. (2018). Creating cooperation. In Creating Cooperation. Cornell University Press.   Brimbal, L., Dianiska, R. E., Swanner, J. K., & Meissner, C. A. (2019). Enhancing cooperation and disclosure by manipulating affiliation and developing rapport in investigative interviews. Psychology, Public Policy, and Law, 25(2), 107.   Granhag, P. A., Oleszkiewicz, S., Strömwall, L. A., & Kleinman, S. M. (2015). Eliciting intelligence with the Scharff technique: Interviewing more and less cooperative and capable sources. Psychology, Public Policy, and Law, 21(1), 100.   Vallano, J. P., & Schreiber Compo, N. (2015). Rapport-building with cooperative witnesses and criminal suspects: A theoretical and empirical review. Psychology, Public Policy, and Law, 21(1), 85.   Rilling, J. K., Gutman, D. A., Zeh, T. R., Pagnoni, G., Berns, G. S., & Kilts, C. D. (2002). A neural basis for social cooperation. Neuron, 35(2), 395-405.   Fehr, E., & Rockenbach, B. (2004). Human altruism: economic, neural, and evolutionary perspectives. Current opinion in neurobiology, 14(6), 784-790.   Krill, A. L., & Platek, S. M. (2012). Working together may be better: Activation of reward centers during a cooperative maze task. PloS one, 7(2), e30613.

Speaking to Legends
#16 Howard Morgan - Measure and Optimise Everything

Speaking to Legends

Play Episode Listen Later Dec 8, 2022 41:53


Howard Morgan is currently the Chairman of B Capital. He co-founded First Round Capital with Josh Kopelman as the first professional Seed Stage Fund, where he remains Senior Advisor. Prior to First Round, Howard helped found Idealab with Bill Gross, and served as President of Renaissance Technologies, which he co-founded with Jim Simons. Prior to his move into the business of technology, Howard served as a professor at the Wharton School and the Moore School, both at the University of Pennsylvania, as well as at Cornell University. He is also an Executive Fellow at UC Berkeley. Howard's research on user interface technology and the optimization of computer networks was critical to bringing the ARPAnet to Philadelphia in the 1970s. Through this early internet participation, he helped corporate and government agencies use technology to improve the efficiency of both large and small organizations. He also has deep experience with very large databases, and served as the first Editor of the ACM Transactions on Database Systems Journal. Throughout his career, Howard has sought out great people and nurtured them so that they could realize their dreams. His mentees have included both PhD students researching a key topic, and early stage entrepreneurs building companies and taking them from seed stage through initial public offerings. He currently serves as a Director of Idealab, and he is on the board of several non-profits including Cold Spring Harbor Laboratories and Math For America. He has also served on a number of public company Boards, including Franklin Electronic Publishers and Internet Brands, Inc. He was CEO of Kentek and Franklin during various turnover or transitional periods and in 1997 he was named Delaware Valley Entrepreneur of the Year. Howard is a respected author and a frequent speaker at major industry conferences. Howard received a PhD in Operations Research from Cornell University in 1968, and a BS in Physics from City College of the City University of New York in 1965.

Hajiaghayi Podcast
Live of Profs Hajiaghayi & Aravind Srinivasan of UMD on Social Networks, Randomized Algorithms, AWS

Hajiaghayi Podcast

Play Episode Listen Later Sep 26, 2022 140:24


Glad to announce that this Sun Sep 25, 11AM ET, we, Prof. Aravind Srinivasan of UMD University who is also an Amazon Scholar. He is an elected Fellow of six professional societies: ACM, IEEE, AMS, AAAS, EATCS, and SIAM and recipient of prestigious awards such as Dijkstra Prize. He is a Distinguished University Professor at UMD and a Distinguished Alumnus of IIT Madras. He served as Editor-in-Chief of the ACM Transactions on Algorithms for 6 years (see his LinkedIn page at https://www.linkedin.com/in/aravind-srinivasan-8a572811/ for more details). Prof. Aravind Srinivasan and Prof. Mohammad Hajiaghayi of UMDs plan to have a YouTube Live @hajiaghayi, and simultaneously Live events on Instagram @mhajiaghayi, LinkedIn @Mohammad Hajiaghayi, Twitter @MTHajiaghayi, and Facebook @Mohammad Hajiaghayi of life, research on Randomized Algorithms and Techniques, their use in Industry such as Amazon AWS, being Editor-in-Chief of a major journal, administrative work, Ph.D. Advising, Major Open Problems in the field. Please join us on our simultaneous Lives at YouTube, Instagram, LinkedIn, Twitter, or Facebook and ask questions you may have.#computerscience #CS #SocialNetworks #DiseaseNetworks #Randomization #correlation #EditorinChief #PhDAdvising #Amazon #AWS #Belllabs #Dijkstra #mahsa_amini

ACM ByteCast
Michelle Zhou - Episode 28

ACM ByteCast

Play Episode Listen Later Aug 16, 2022 48:38


In this episode of ACM ByteCast, our new co-host Bruke Kifle, AI Product Manager at Microsoft and member of the ACM Practitioner Board, interviews Michelle Zhou, Co-founder and CEO of Juji, Inc. She is an expert in the field of Human-Centered AI, an interdisciplinary area that intersects AI and Human-Computer Interaction (HCI). Zhou has authored more than 100 scientific publications on subjects including conversational AI, personality analytics, and interactive visual analytics of big data. Her work has resulted in a dozen widely used products or solutions and 45 issued patents. Prior to founding Juji, she spent 15 years at IBM Research and the Watson Group, where she managed the research and development of Human-Centered AI technologies and solutions, including IBM RealHunter and Watson Personality Insights. Zhou serves as Editor-in-Chief of ACM Transactions on Interactive Intelligent Systems (TiiS) and an Associate Editor of ACM Transactions on Intelligent Systems and Technology (TIST), and was formerly the Steering Committee Chair for the ACM International Conference Series on Intelligent User Interfaces (IUI). She is an ACM Distinguished Member and Member at Large on the ACM Council. Michelle presents five inflection points that led to her current work, including the impact of two professors in graduate school who helped her find her direction in AI. She explains what no-code AI means, why the ability for users to customize AI without having coding skills is important, and responds to the critics of no-code AI. Bruke and Michelle then delve into the inception of her AI company that develops AI assistants with cognitive intelligence, Juji, and how it is being used as a platform to introduce AI to early education. Finally, Michelle shares thoughts on the future of software and the no-code movement, as well as the future of AI itself.

The Prepare.ai Podcast
Sanmay Das on Algorithms Making Societal Decisions

The Prepare.ai Podcast

Play Episode Listen Later May 18, 2022 51:14


Sanmay Das is a professor of Computer Science at George Mason University. From 2013-2020, he was on the faculty of the Dept. of Computer Science and Engineering at Washington University in St. Louis, where he also founded and served as the first chair of the steering committee of the Division of Computational and Data Sciences. Dr. Das received his Ph.D. from MIT and a Bachelor's degree from Harvard, both in Computer Science.He is chair of the Association for Computing Machinery Special Interest Group on Artificial Intelligence, a member of the board of directors of the International Foundation for Autonomous Agents and Multiagent Systems, and serves as an associate editor for the ACM Transactions on Economics and Computation, the Journal of Artificial Intelligence Research, and Autonomous Agents and Multiagent Systems. He has been recognized with awards for research and teaching, including an NSF CAREER Award and the Department Chair Award for Outstanding Teaching at Washington University.

What is it about computational communication science?
How to audit algorithms online?

What is it about computational communication science?

Play Episode Listen Later Mar 29, 2022 52:23


In this episode Emese Domahidi (Assistant Professor at TU Ilmenau) and Mario Haim (Assistant Professor at the U of Leipzig) discuss with Juhi Kulshrestha (Assistant Professor at U Konstanz) what makes algorithms online a research object. We touch on topics like filter bubbles and echo chambers, biases, how to investigate algorithms, the role of platforms and companies, data sources and possible effects of algorithmic curation. Last but not least, we discuss how far this field of resesarch has come by now and which future directions might be fruitful. References Friedman, B., & Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems (TOIS), 14(3), 330–347. Kulshrestha, J., Eslami, M., Messias, J., Zafar, M. B., Ghosh, S., Gummadi, K. P., & Karahalios, K. (2019). Search bias quantification: Investigating political bias in social media and web search. Information Retrieval Journal, 22(1), 188–227. Urman, A., Makhortykh, M., Ulloa, R., & Kulshrestha, J. (2021). Where the Earth is flat and 9/11 is an inside job: A comparative algorithm audit of conspiratorial information in web search results. arXiv preprint arXiv:2112.01278.

Idea Land
Machines that Think and Feel with Michelle Zhou

Idea Land

Play Episode Listen Later Feb 13, 2022 68:00


I talk to Dr. Michelle Zhou Ph.D., CEO, and co-founder of Juji, a Silicon Valley company focused on creating next-generation cognitive AI with emotional intelligence. Basically, Michelle is working on making the talking, feeling AI that we've all seen in science fiction, a reality. Michelle talks about what it means for a bot to have high EQ, why humans get so attached to machines, and how people and machines can work together in ways that highlight their strengths! Extended Background: https://link.edgepilot.com/s/dc654903/deTMubrSUkaIAC7o_0cECw?u=https://eur02.safelinks.protection.outlook.com/?url=https%253A%252F%252Flink.edgepilot.com%252Fs%252F494bde62%252FPq3VKVOaM0ueE8P0Ium3bQ%253Fu%253Dhttps%253A%252F%252Feur02.safelinks.protection.outlook.com%252F%253Furl%253Dhttps%2525253A%2525252F%2525252Flink.edgepilot.com%2525252Fs%2525252Fb654c29b%2525252Fc_kon4HrKkixZAkola-itg%2525253Fu%2525253Dhttps%2525253A%2525252F%2525252Feur02.safelinks.protection.outlook.com%2525252F%2525253Furl%2525253Dhttps%25252525253A%25252525252F%25252525252Flink.edgepilot.com%25252525252Fs%25252525252F8891db37%25252525252F3yTCj3Oh3kSJO9CZztQZEw%25252525253Fu%25252525253Dhttps%25252525253A%25252525252F%25252525252Feur02.safelinks.protection.outlook.com%25252525252F%25252525253Furl%25252525253Dhttps%252525252525253A%252525252525252F%252525252525252Flink.edgepilot.com%252525252525252Fs%252525252525252Fb6b029e0%252525252525252FowplQWpR0UudHXQiL5TOzw%252525252525253Fu%252525252525253Dhttps%252525252525253A%252525252525252F%252525252525252Feur02.safelinks.protection.outlook.com%252525252525252F%252525252525253Furl%252525252525253Dhttps%2525252525252525253A%2525252525252525252F%2525252525252525252Flink.edgepilot.com%2525252525252525252Fs%2525252525252525252F148d45e3%2525252525252525252FaT3tVK2Xs0KP4c25Mcd3og%2525252525252525253Fu%2525252525252525253Dhttps%2525252525252525253A%2525252525252525252F%2525252525252525252Feur02.safelinks.protection.outlook.com%2525252525252525252F%2525252525252525253Furl%2525252525252525253Dhttps%25252525252525252525253A%25252525252525252525252F%25252525252525252525252Fwww.linkedin.com%25252525252525252525252Fin%25252525252525252525252Fmxzhou%25252525252525252525252F%2525252525252525252526data%2525252525252525253D04%25252525252525252525257C01%25252525252525252525257Ceburke%252525252525252525252540siliconrepublic.com%25252525252525252525257Cd9e12ec93b5e4bb80f2f08d9988376d4%25252525252525252525257C1809b95ebd9d42c68e5689e13139dd77%25252525252525252525257C0%25252525252525252525257C0%25252525252525252525257C637708512672879724%2525252525252 (Dr. Michelle Zhou) is a Co-Founder and CEO of Juji, Inc., an Artificial Intelligence  (AI) company located in Silicon Valley, specializing in building cognitive conversational AI technologies and solutions that enable the creation and adoption of empathic and empathetic AI agents. Prior to starting Juji, Michelle led the User Systems and Experience Research (USER) group at IBM Research – Almaden and then the IBM Watson Group. Michelle's expertise is in the interdisciplinary area of intelligent user interaction (IUI), including conversational AI systems and personality analytics. She is an inventor of the IBM Watson Personality Insights and has led the research and development of at least a dozen products in her areas of expertise. Michelle has also published over 100 peer-reviewed, refereed scientific articles and 45+ patents. Michelle is currently the Editor-in-Chief of ACM Transactions on Interactive Intelligent Systems (TiiS) and an Associate Editor of ACM Transactions on Intelligent Systems and Technology (TIST). She received a Ph.D. in Computer Science from Columbia University and is an ACM Distinguished Scientist. Subscribe for more incredible guests. Reach out with feedback and ideas. Find Idea Land on https://youtu.be/hPTmXbQEsxE (YouTube), https://open.spotify.com/episode/5UVyknxcQHyccQI6KOgIp7?si=-raXVT_qTz-8OKJEaqRCJA (Spotify), and...

Information Systems DIGEST Podcast
Designing for Societal Good - Guest Sandeep Purao

Information Systems DIGEST Podcast

Play Episode Play 26 sec Highlight Listen Later Jan 26, 2022 74:56


Host Casandra Grundstrom is joined by special guest Professor Sandeep Purao. He is a Trustee Professor in the Information and Process Management Group and Associate Director of the Hoffman Center for Business Ethics at Bentley University. He is also a Visiting Professor at Agder University in Norway. His current research focuses on the design and evaluation of digital solutions for complex societal problems. Sandeep's work has been published in MIS Quarterly, Information Systems Research, Journal of MIS, ACM Computing Surveys, ACM Transactions, Journal of the Medical Internet Research and others, and funded by federal agencies, private foundations, and industry consortia. He holds a Ph.D. in Management Information Systems from the University of Wisconsin-Milwaukee.In this episode, we finish our design theme series by exploring designing for societal good through projects on a more micro-scale for elderly communities when practicing self-management of illness and empathy as part of the design process, as well as designing counters to political polarization in fake news and echo chambers.  Commencing the new year off on a positive note, with insights from Sandeep about bringing about change in a world and finding joy in what we do. We are academic superheroes!References:Hao, H., Garfield, M. and Purao, S. 2021. Risk Factors that Contribute to the Length of Homeless Shelter Stays: Evidence-based Regression Analyses. International Journal of Public Health,  Forthcoming.Herwix, A., Haj-Bolouri, A., Rossi, M., Chiarini-Tremblay, M., Purao, S., and Gregor, S. 2022. Ethics in Information Systems and Design Science Research: Five Perspectives. Communications of the AIS,  Forthcoming.Khouri, Y., Purao, S., & Duffy, M. 2018. The Influence of Values on the Use of Citizen Services: The Elderly Perspective. In Proceedings of the 24th Americas Conference on Information Systems (AMCIS).Purao, S., Murungi, D. M., & Yates, D. 2021. Deliberative Breakdowns in the Social Representation Process: Evidence from Reader Comments in Partisan News Sites. ACM Transactions on Social Computing, 4(2), 1-35.Purao, S., Hao, H., and Meng, C. 2021. The Use of Smart Home Speakers by the Elderly: Exploratory Analyses and Potential for Big Data. Big Data Research. Elsevier.Purao, S., & Garfield, M. 2020. Process Modeling in Humanitarian Settings: A Case Study and Lessons Learned. In Proceedings of the 28th European Conference on Information Systems (ECIS).Purao, S. 2002. Design research in the technology of information systems: Truth or dare. Unpublished Manuscript, Georgie State University.Selected References on Design:Baldwin, C.Y., Clark, K.B. and Clark, K.B., 2000. Design rules: The power of modularity (Vol. 1). MIT press.Cross, N., 1982. Designerly ways of knowing. Design studies, 3(4), pp.221-227.Simon, H.A., 1996. The sciences of the artificial. MIT press.Suh, N.P. and Suh, P.N., 1990. The principles of design (No. 6). Oxford University Press. Other References:Al Gore's Budgets' - https://www.ccair.org/guest-blog-what-i-learned-from-spending-three-days-with-al-gore/Sandeep Purao's Website - https://purao.us/research-projects/ Vanessa Otero Political Polzarization- https://libguides.geneseo.edu/newsliteracy/identifying-major-news-sources  

The Cybertraps Podcast
Increasing Cybersecurity through Behaviors with Jason Hong Cybertraps 47

The Cybertraps Podcast

Play Episode Listen Later Jun 3, 2021 38:35


Jason Hong is a full professor in the Human Computer Interaction Institute, which is part of the School of Computer Science at Carnegie Mellon University (CMU). He was formerly an associate editor for IEEE Pervasive Computing, and currently on the editorial board for ACM Transactions on Computer Human Interaction. He has chaired or co-chaired a number of technical program committees, including HotMobile, Mobisys, and CHI, and has also served on SIGMOBILE's test of time committee (mobile computing papers over 10 years old that should be recognized for their impact). He is also a 2010 Alfred P. Sloan Research Fellow, a PopTech Science Fellow, a Kavli Fellow, a New America National Cybersecurity Fellow, and a member of CHI Academy, which is “an honorary group of individuals who have made substantial contributions to the field of human-computer interaction”. Lastly, he co-founded Wombat Security Technologies, a startup that commercialized our NSF-funded research on anti-phishing and was acquired by Proofpoint for $225M in 2018 In this episode we talk about how to be smarter about cybersecurity, based on research. How to increase the chances that someone will make wise decisions relating to cybersecurity.  Thanks to our mission partner: Buoyancy Digital is proud to be the inaugural Mission Partner for the Cybertraps Podcast series. A digital advertising consultancy with an ethos, Buoyancy was founded by Scott Rabinowitz, who has been in digital media since 1997 and has overseen $300 million in youth safety compliant ad buys across all digital platforms. For IAB, Google and Bing accredited brand and audience safe advertising sales solutions, media buying and organizational training for media publishers, let's chat.

google school behavior increasing cybersecurity computer science bing hong nsf proofpoint buoyancy 225m human computer interaction institute carnegie mellon university cmu acm transactions cybertraps
Vi & Alex Before Bed
#13 - Reddit and its battle to keep the internet a good place

Vi & Alex Before Bed

Play Episode Listen Later Oct 14, 2020 21:47


[ 100% English ] Vi has planned to have an episode about Reddit for a long time. It is because Alex is a huge fan of Reddit. However, research articles and also stories about Reddit are not simple. Finally, it was a good time for Alex to speak his mind (heavy editing though). At least, we hope to introduce some discussion about free speech on the internet these days.  References:   Jhaver, S., Birman, I., Gilbert, E., & Bruckman, A. (2019). Human-machine collaboration for content regulation: The case of Reddit Automoderator. ACM Transactions on Computer-Human Interaction (TOCHI), 26(5), 1-35. Retrieved from http://eegilbert.org/papers/tochi-jhaver-automod.pdf Marantz, A. (2018). Reddit and the Struggle to Detoxify the Internet. The New Yorker, 12. Retrieved from https://sites.tufts.edu/cartereng1fall2018/files/2018/08/Reddit-and-the-Struggle-to-Detoxify-the-Internet-.pdf 

Materialism
μ: Auxetics

Materialism

Play Episode Listen Later Jul 22, 2020 14:26


This episode covers a fascinating class of materials called auxetics. Experience tells us that when we pull a material in tension, it should shrink; auxetics do the opposite. By shifting, winding, or rotating, these materials get wider when stretched and thinner when compressed. Lakes R. Foam structures with a negative Poisson's ratio. Science. 1987 Feb 27;235:1038-41. Evans KE. Auxetic polymers: a new range of materials. Endeavour. 1991 Jan 1;15(4):170-4. Saxena KK, Das R, Calius EP. Three decades of auxetics research− materials with negative Poisson's ratio: a review. Advanced Engineering Materials. 2016 Nov;18(11):1847-70. Grima JN, Evans KE. Auxetic behavior from rotating triangles. Journal of materials science. 2006 May 1;41(10):3193-6. Alderson A, Alderson KL. Auxetic materials. Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering. 2007 Apr 1;221(4):565-75. Konaković M, Crane K, Deng B, Bouaziz S, Piker D, Pauly M. Beyond developable: computational design and fabrication with auxetic materials. ACM Transactions on Graphics (TOG). 2016 Jul 11;35(4):1-1. If you have questions or feedback please send us emails at materialism.podcast@gmail.com. Make sure to subscribe to the show on iTunes, Spotify, google play, and now Youtube or wherever you find your podcasts. If you like the show and want to help us reach more people, consider leaving a review - it helps us improve and it exposes new people to the show. Finally, check out our Instagram page @materialism.podcast and connect with us to let us know what new material you’d like to hear about next. We’d like to give a shoutout to AlphaBot for allowing us to use his music within the podcast. Check him out on Spotify. And as always a special thanks to Kolobyte who created the intro and outro for our podcast. He makes a ton of really cool synthwave music which you can check out at kolobyte.bandcamp.com. Also visit our sponsors for this episode www.materialstoday.com and matmatch.com. Follow us on Instagram: https://www.instagram.com/materialism.podcast/?hl=en Follow us on Twitter: https://twitter.com/MaterialismPod Visit our website: www.materialismpodcast.com Materialism Team: Taylor Sparks (co-creator, co-host, production), Andrew Falkowski (co-creator, co-host, production), Jared Duffy (production, marketing, and editing) Support Materialism by donating to their Tip Jar: https://tips.pinecast.com/jar/materialism

Cybercrimeology
Goldphish memories: Aging and susceptibility to fraud

Cybercrimeology

Play Episode Listen Later Feb 14, 2020 31:09


Find out more about the researcher:https://people.clas.ufl.edu/natalieebner/Papers Mentioned in this show:Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., & Oliveira, D. S. (2018). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B.http://www.daniela.ece.ufl.edu/Research_files/gerontology18.pdf More to read: Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content. ACM Transactions on Computer-Human Interaction (TOCHI), 26(5), 1-28.https://dl.acm.org/doi/abs/10.1145/3336141Oliveira, D.S., Lin, T., Rocha, H. et al. Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: an age-comparative perspective. Crime Sci 8, 3 (2019) doi:10.1186/s40163-019-0098-8https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-019-0098-8 The intro from this show is from an educational video from the Prelinger Archives.  https://archive.org/details/prelinger 

Don't Panic Geocast
Episode 139 - Rebroadcast "At least there were functions" Greg Wilson

Don't Panic Geocast

Play Episode Listen Later Oct 6, 2017 70:35


John and Shannon are back to doing science instead of troubleshooting and take a break to talk with Dr. Greg Wilson about Software Carpentry, how to teach effectively, and a smattering of related topics about the academic world. Greg Wilson Software Carpentry Data Carpentry Library Carpentry It Will Never Work in Theory The Architecture of Open Source Applications Request a Software Carpentry Workshop Small Teaching: Everyday Lessons from the Science of Learning (Lang) How Learning Works: Seven Research-Based Principles for Smart Teaching (Ambrose et al.) Fun Paper Friday Stefik, Andreas, and Susanna Siebert. “An empirical investigation into programming language syntax.” ACM Transactions on Computing Education (TOCE) 13.4 (2013): 19. Greg’s Review or Stefik and Siebert Whitten, Alma, and J. Doug Tygar. “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.” Usenix Security. Vol. 1999. 1999. Perez De Rosso, Santiago, and Daniel Jackson. “What’s wrong with git?: a conceptual design.” (2013). Contact us: Show - www.dontpanicgeocast.com - SWUNG Slack - @dontpanicgeo - show@dontpanicgeocast.com John Leeman - www.johnrleeman.com - @geo_leeman Shannon Dulin - @ShannonDulin  

science vol andreas functions pgp greg wilson daniel jackson acm transactions software carpentry john leeman
Don't Panic Geocast
Episode 95 - "At least there were functions" Greg Wilson

Don't Panic Geocast

Play Episode Listen Later Nov 18, 2016 70:19


John and Shannon are back to doing science instead of troubleshooting and take a break to talk with Dr. Greg Wilson about Software Carpentry, how to teach effectively, and a smattering of related topics about the academic world. Greg Wilson Software Carpentry Data Carpentry Library Carpentry It Will Never Work in Theory The Architecture of Open Source Applications Request a Software Carpentry Workshop Small Teaching: Everyday Lessons from the Science of Learning (Lang) How Learning Works: Seven Research-Based Principles for Smart Teaching (Ambrose et al.) Fun Paper Friday Stefik, Andreas, and Susanna Siebert. “An empirical investigation into programming language syntax.” ACM Transactions on Computing Education (TOCE) 13.4 (2013): 19. Greg’s Review or Stefik and Siebert Whitten, Alma, and J. Doug Tygar. “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.” Usenix Security. Vol. 1999. 1999. Perez De Rosso, Santiago, and Daniel Jackson. “What’s wrong with git?: a conceptual design.” (2013). Contact us: Show - www.dontpanicgeocast.com - SWUNG Slack - @dontpanicgeo - show@dontpanicgeocast.com John Leeman - www.johnrleeman.com - @geo_leeman Shannon Dulin - @ShannonDulin  

science vol andreas functions pgp greg wilson daniel jackson acm transactions software carpentry john leeman
METRANS Transportation Center - USC and CSULB
Supply Chain Consolidation and Cooperation in the Agricultural Industry

METRANS Transportation Center - USC and CSULB

Play Episode Listen Later Oct 11, 2016 58:40


This talk evaluates the California cut flower industry's current transportation practices and investigates the feasibility and cost of establishing a shipping consolidation center in Oxnard, California. The problem is formulated using a Mixed-Integer programming model. The model estimates a 34.8% shipping cost decrease, $20M, if all California farms participated in the consolidation center. Our analysis of estimated cut-flower trade flows originating from Miami shows that the magnitudes of these flows are relatively sensitive to shipping cost, controlling for market size. Maged Dessouky Professor of Industrial and Systems Engineering USC Viterbi School of Engineering Wentao Zhang Ph. D. Candidate, Industrial Systems and Engineering USC Viterbi School of Engineering Maged M. Dessouky is a Professor in the Daniel. J. Epstein Department of Industrial and Systems Engineering at the University of Southern California and the Director of the Epstein Institute. He received B.S. and M.S. degrees from Purdue University and a Ph.D. in Industrial Engineering from the University of California, Berkeley. He is area/associate editor the Transportation Research Part B: Methodological, IIE Transactions and Computers and Industrial Engineering, on the editorial board of Transportation Research Part E: Logistics and Transportation Review, and previously served as area editor/associate of ACM Transactions of Modeling and Computer Simulation and IEEE Transactions on Intelligent Transportation Systems. He is a Fellow of IIE and was awarded the 2007 Transportation Science and Logistics Best Paper Prize.

CERIAS Security Seminar Podcast
Ninghui Li, Privacy Notions for Data Publishing and Analysis

CERIAS Security Seminar Podcast

Play Episode Listen Later Feb 18, 2015 50:29


Data collected by organizations and agencies are a key resource intoday's information age. The use of sophisticated data mining techniquesmakes it possible to extract relevant knowledge that can then be used for avariety of purposes, such as research, developing innovative technologiesand services, intelligence and counterterrorism operations, and providinginputs to public policy making. However the disclosure of those data posesserious threats to individual privacy. In this talk, we will present the evolvement of privacy notions fordata publishing and analysis, leading to our proposed membership privacyframework, which formalizes the intuition that privacy means that theadversary cannot significantly increasing its ability to conclude that anentity is in the input dataset. We show that several recently proposedprivacy notions, including differential privacy, are instantiations of themembership privacy framework, and that the framework provides a principledapproach to developing new privacy notions under which better utility can beachieved than what is possible under differential privacy. About the speaker: Ninghui Li is a Professor of Computer Science at Purdue University. Hisresearch interests are insecurity and privacy. Prof. Li is currently Vice Chair of ACM SpecialInterest Group on Security, Audit and Control (SIGSAC) and Program Chair of 2015 ACM Conference on Computer andCommunications Security (CCS). He is on the editorial boards of IEEE Transactions on Dependable and SecureComputing, Journal of Computer Security, and ACM Transactions on InternetTechnology.

METRANS Transportation Center - USC and CSULB
Research, Practice and Future Directions of Dynamic Ridesharing

METRANS Transportation Center - USC and CSULB

Play Episode Listen Later Apr 17, 2013 60:21


A transportation seminar presented by the USC METRANS Center for Transportation. Abstract: Although ridesharing can provide a wealth of benefits, such as reduced travel costs, congestion, and consequently less pollution, there are a number of challenges that have restricted its widespread adoption. In fact, even at a time when improving communication systems provide real-time detailed information that could be used to facilitate ridesharing, the share of work trips that use ridesharing has decreased by almost 10% in the past 30 years. In this seminar, Dr. Dessouky presents a classification and taxonomy to understand the key aspects of ridesharing systems. The objective is to present a framework that can help identify key challenges in the widespread use of ridesharing and thus foster the development of effective formal ridesharing mechanisms that would overcome these challenges and promote its widespread use. Speaker Bio: Maged M. Dessouky is a Professor in the Daniel J. Epstein Department of Industrial and Systems Engineering and Director of the Epstein Institute at USC. Dr. Dessouky has an in-depth theoretical and practical understanding of models and heuristic methods for transportation system optimization. He is the Principal Investigator of an FHWA-funded project to develop Transportation Market, a distributed system for negotiating routes and prices between consumers and providers of transportation. He is Area Editor of Computers and Industrial Engineering, ACM Transactions of Modeling and Computer Simulation and IIE Transactions, and serves on the Editorial Board of Transportation Research Part B: Methodological. He is the recipient of the 2007 Transportation Science and Logistics Best Paper Prize for his paper, ”Optimal Slack Time for Schedule-Based Transit Operations,” and is a Fellow of IIE. He received his Ph.D. in Industrial Engineering from the University of California, Berkeley, and M.S. and B.S. degrees from Purdue University.

CERIAS Security Seminar Podcast
Cristina Nita-Rotaru, Secure Network Coding for Wireless Mesh Networks

CERIAS Security Seminar Podcast

Play Episode Listen Later Aug 25, 2010 52:31


In this talk we identify two general frameworks (inter-flow and intra-flow) that encompassseveral network coding-based systems proposed in wireless mesh networks. Our systematicanalysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks,which may severely degrade system performance. We then focus on addressing the most severeand generic attack against network coding systems, known as packet pollution attack. We showthat existing cryptographic mechanisms that were proposed to solve the problem have a prohibitivecost that makes them impractical in wireless mesh networks. We propose the first practical defensemechanisms to pollution attacks in network coding for wireless mesh networks. The experimentalresults show that the proposed mechanisms can effectively filter out polluted packets and quicklyidentify and isolate attacker nodes while incurring small computation and bandwidth overhead. About the speaker: Cristina Nita-Rotaru is an Associate Professor in the Department of Computer Science at Purdue University where she established the Dependable and Secure Distributed Systems Laboratory (DS2).She is a member of the Center for Education and Research in Information Assurance and Security (CERIAS) and is associated with the Center for Wireless Systems and Applications (CWSA) at Purdue University.Her research interests lie in designing distributed systems, network protocols and applications that are robust to failure, mis-configuration, and malicious attacks. Cristina Nita-Rotaru is a recipient of the NSF Career Award in 2006. She has served on the Technical Program Committee of numerous conferences in security, networking, and distributed systems. She is currently serving as an Associate Editor for ACM Transactions on Information Security and Elsevier Computer Communications.

CERIAS Security Seminar Podcast
Ravi Sandhu, The Secure Information Sharing Problem and Solution Approaches

CERIAS Security Seminar Podcast

Play Episode Listen Later Sep 27, 2006 60:29


The secure information sharing problem is one of the oldest and most fundamental and elusive problems in information security. Mission objectives dictate that Information must be shared and made available to authorized recipients, and yet information must be protected from leakage and subversion by malicious insiders and malicious software. The doctrine of "share but protect" indicates the inherent conflict in achieving effective secure information sharing. In this talk we demonstrate the complexity and richness of the secure information sharing problem space. We then identify some "sweet spots" that appear promising in their practical benefit and feasibility of solutions. We describe the PEI models approach to decompose security problems into the three layers of policy models (topmost), enforcement models (middle), and implementation models (bottom). We discuss how this approach can be applied to the secure information sharing problem. Finally we indicate how modern trusted computing technology can be used to solve important variations of this problem. About the speaker: Dr. Ravi Sandhu earned B.Tech. and M.Tech. degrees from IIT Bombay and Delhi respectively, and M.S. and Ph.D. degrees from Rutgers University. He is a Fellow of ACM and IEEE, and recipient of the IEEE Computer Society Technical Achievement Award. His research has focused on information security, privacy and trust, with special emphasis on models, protocols and mechanisms. His doctoral work on safety and expressive power of access control was further developed by him culminating in the Typed Access Matrix in 1992. In collaboration with Prof. Jajodia, he analyzed and reconciled confidentiality and integrity in multilevel secure databases. In 1993 he showed that Chinese Wall separation of duty policies were instances of information flow. In 1996, along with industry colleagues, he published the seminal paper on role-based access control which evolved into the 2004 NIST/ANSI standard RBAC model. In 2002, with Jaehong Park, he introduced the Usage Control model for next-generation access. Other recent activities include Information Sharing models and implementations using Trusted Computing, and the PEI (policy, enforcement and implementation) layered models method for synthesizing secure systems. Ravi has published over 160 technical papers on information security, has received over 30 research grants and has graduated 12 PhD's in his career.Ravi is the founding editor of the Synergy Lecture Series on Information Security, Privacy and Trust. Earlier, he was the founding editor-in-chief of the ACM Transactions on Information and Systems Security (TISSEC), from 1997 to 2004. He was Chairman of ACM SIGSAC from 1995 to 2003, and founded and led the ACM Conference on Computer and Communications Security and the ACM Symposium on Access Control Models and Technologies to high reputation and prestige. He served as the security editor for IEEE Internet Computing from 1998 to 2004. In 2000 Ravi Sandhu co-founded the company now known as TriCipher and continues to serve as its Chief Scientist. He is the principal security architect of the TriCipher Armored Credential System. He is an inventor on eight security technology patents and has over fifteen patents pending. He is also the principal architect of the M.S. and Ph.D. programs in Information Security and Assurance at George Mason University.

CERIAS Security Seminar Podcast
Virgil D. Gligor, On the Evolution of Adversary Models for Security Protocols - from the Beginning to Sensor Networks

CERIAS Security Seminar Podcast

Play Episode Listen Later Apr 26, 2006 53:27


Invariably, new technologies introduce new vulnerabilities which, in principle, enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks enabled by new vulnerabilities and sometimes address attacks rendered impractical by new technologies. In this talk, I provide a brief overview of adversary models beginning with those required by program and data sharing technologies, continuing with those required by computer communication and networking technologies, and ending with those required by mobile ad-hoc and sensor network technologies. I argue that mobile ad-hoc and sensor networks require new adversary models (e.g., different from those of Dolev-Yao and Byzantine adversaries). I illustrate this with adversaries that attack perfectly sensible and otherwise correct protocols of mobile ad-hoc and sensor networks. These attacks cannot be countered with traditional security protocols as they require emergent security properties. About the speaker: Virgil D. Gligor received his B.Sc., M.Sc., and Ph.D. degrees from the University of California at Berkeley. He has been at the University of Maryland since 1976, and is currently a Professor of Electrical and Computer Engineering. He is an Editorial Board member of the ACM Transactions on Information System Security, IEEE Transactions on Dependable and Secure Computing, and IEEE Transactions on Computers. Over the past three decades, his research interests ranged from access control mechanisms, penetration analysis, and denial-of-service protection to cryptographic protocols and applied cryptography.

CERIAS Security Seminar Podcast
Marianne Winslett, Traust and PeerTrust2: Applying Trust Negotiation to Real Systems

CERIAS Security Seminar Podcast

Play Episode Listen Later Apr 20, 2005 54:02


Automated trust negotiation is an approach to authorization for open systems, i.e., systems where resources are shared across organizational boundaries. Automated trust negotiation enables open computing by assigning an access control policy to each resource that is to be made accessible to "outsiders"; an attempt to access the resource triggers a trust negotiation, consisting of the iterative, bilateral disclosure of digital credentials and related information. In our recent work in applying the TrustBuilder system for trust negotiation to real-world systems, we have encountered the need to make trust negotiation facilities available to legacy peers, which has led to the development of the Traust system. We have also encountered the need to include helpful third parties in the negotiation process, such as credential wallets, remote authorization servers, and brokers. PeerTrust2 is our effort to design a language that allows us to reason about trust negotiations involving helpful third parties, while supporting exposure control, delegation, proof hints, declarations of purpose, sensitive policies, and other potentially useful aspects of access control. In this talk, I will demonstrate Traust and describe its internal design, and then describe PeerTrust2. About the speaker: Marianne Winslett has been a professor at the University of Illinois at Urbana-Champaign since 1987. Her current research interests include security in open systems and data management for high-performance parallel scientific applications. She was an editor for ACM Transactions on Database Systems from 1994 to 2004, and has been the vice-chair of ACM SIGMOD since 2000. She received an NSF Presidential Young Investigator Award in 1989.