Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Susceptibility to Unreliable Information Sources: Swift Adoption with Minimal Exposure
WWW '24: Proceedings of the ACM Web Conference 2024Pages 4674–4685https://doi.org/10.1145/3589334.3648154Misinformation proliferation on social media platforms is a pervasive threat to the integrity of online public discourse. Genuine users, susceptible to others' influence, often unknowingly engage with, endorse, and re-share questionable pieces of ...
- research-articleNovember 2021
Predicting urban flooding susceptibility of public transit systems using machine learning approaches: a case study of the largest city in Canada
ARIC '21: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Advances in Resilient and Intelligent CitiesPages 32–41https://doi.org/10.1145/3486626.3493438Urban floods often cause the functional disruption of public transit systems, thereby impeding people's mobility and resulting in adverse socio-economic consequences. Climate change, rapid urbanization, and unplanned disaster management further increase ...
- short-paperAugust 2021
Exploring the Links between Personality Traits and Susceptibility to Disinformation
HT '21: Proceedings of the 32nd ACM Conference on Hypertext and Social MediaPages 291–294https://doi.org/10.1145/3465336.3475121The growth of online Digital/social media has allowed a variety of ideas and opinions to coexist. Social Media has appealed users due to the ease of fast dissemination of information at low cost and easy access. However, due to the growth in affordance ...
- research-articleJanuary 2021
Computational systems biology of pityriasis lichenoides chronica and its comorbidities
International Journal of Bioinformatics Research and Applications (IJBRA), Volume 17, Issue 5Pages 442–474https://doi.org/10.1504/ijbra.2021.120206Pityriasis lichenoides chronica (PLC) is a rare idiopathic skin disorder that is characterised by scaly, pink papules mainly on the trunks and limbs. The etiology and immunological pathways of the disease are yet unknown. In this study we have attempted ...
- research-articleNovember 2021
Information adoption via repeated or diversified social influence on Twitter
ASONAM '20: Proceedings of the 12th IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 237–241https://doi.org/10.1109/ASONAM49781.2020.9381365Influence arriving via social ties may be relevant for a person to decide to buy a new product, share information, or to adopt a new behaviour. However, quantifying social influence is a difficult task, even in online social systems where the ...
-
- research-articleAugust 2020
A real world study on employees' susceptibility to phishing attacks
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityArticle No.: 4, Pages 1–10https://doi.org/10.1145/3407023.3409179Phishing email attacks have been around for fifteen years but they are still among the top security risks faced by organisations. The most common approach to mitigate these attacks is employees' education and awareness. Employees' awareness on phishing ...
- research-articleNovember 2019
CT LIS: Learning Influences and Susceptibilities through Temporal Behaviors
ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 13, Issue 6Article No.: 57, Pages 1–21https://doi.org/10.1145/3363570How to quantify influences between users, seeing that social network users influence each other in their temporal behaviors? Previous work has directly defined an independent model parameter to capture the interpersonal influence between each pair of ...
- research-articleJuly 2019
Characterizing Susceptible Users on Reddit's ChangeMyView
SMSociety '19: Proceedings of the 10th International Conference on Social Media and SocietyPages 102–107https://doi.org/10.1145/3328529.3328550In the study of persuasion, little attention is paid to understanding features that indicate one's level of susceptibility. In this work, we examine features that are indicative of an individual's susceptibility on Reddit's changemyview. Specifically, ...
- research-articleJuly 2018
Susceptibility to Persuasive Strategies: A Comparative Analysis of Nigerians vs. Canadians
UMAP '18: Proceedings of the 26th Conference on User Modeling, Adaptation and PersonalizationPages 229–238https://doi.org/10.1145/3209219.3209239Personalizing persuasive technologies (PTs) is one of the hallmarks of a successful PT intervention. However, there is a lack of understanding of how Africans and North Americans differ or are similar in the susceptibility to persuasive strategies. To ...
- research-articleMay 2017
Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing
- Daniela Oliveira,
- Harold Rocha,
- Huizi Yang,
- Donovan Ellis,
- Sandeep Dommaraju,
- Melis Muradoglu,
- Devon Weir,
- Adam Soliman,
- Tian Lin,
- Natalie Ebner
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 6412–6424https://doi.org/10.1145/3025453.3025831Spear phishing emails are key in many cyber attacks. Successful emails employ psychological weapons of influence and relevant life domains. This paper investigates spear phishing susceptibility as a function of Internet user age (old vs young), weapon ...
- research-articleFebruary 2017
Online Actions with Offline Impact: How Online Social Networks Influence Online and Offline User Behavior
WSDM '17: Proceedings of the Tenth ACM International Conference on Web Search and Data MiningPages 537–546https://doi.org/10.1145/3018661.3018672Many of today's most widely used computing applications utilize social networking features and allow users to connect, follow each other, share content, and comment on others' posts. However, despite the widespread adoption of these features, there is ...
- research-articleOctober 2016
Tracking Virality and Susceptibility in Social Media
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 1059–1068https://doi.org/10.1145/2983323.2983800In social media, the magnitude of information propagation hinges on the virality and susceptibility of users spreading and receiving the information respectively, as well as the virality of information items. These users' and items' behavioral factors ...
- research-articleJuly 2016
R-Susceptibility: An IR-Centric Approach to Assessing Privacy Risks for Users in Online Communities
- Joanna Asia Biega,
- Krishna P. Gummadi,
- Ida Mele,
- Dragan Milchevski,
- Christos Tryfonopoulos,
- Gerhard Weikum
SIGIR '16: Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information RetrievalPages 365–374https://doi.org/10.1145/2911451.2911533Privacy of Internet users is at stake because they expose personal information in posts created in online communities, in search queries, and other activities. An adversary that monitors a community may identify the users with the most sensitive ...
- research-articleSeptember 2015
Soft-Error-Tolerant Design Methodology for Balancing Performance, Power, and Reliability
- Hsuan-Ming Chou,
- Ming-Yi Hsiao,
- Yi-Chiao Chen,
- Keng-Hao Yang,
- Jean Tsao,
- Chiao-Ling Lung,
- Shih-Chieh Chang,
- Wen-Ben Jone,
- Tien-Fu Chen
IEEE Transactions on Very Large Scale Integration (VLSI) Systems (ITVL), Volume 23, Issue 9Pages 1628–1639https://doi.org/10.1109/TVLSI.2014.2348872Soft error has become an important reliability issue in advanced technologies. To tolerate soft errors, solutions suggested in previous works incur significant performance and power penalties, especially when a design with fault-tolerant structures is ...
- articleAugust 2015
The evolution of subcritical Achlioptas processes
Random Structures & Algorithms (RSAA), Volume 47, Issue 1Pages 174–203https://doi.org/10.1002/rsa.20530In Achlioptas processes, starting from an empty graph, in each step two potential edges are chosen uniformly at random, and using some rule one of them is selected and added to the evolving graph. AlthouSgh the evolution of such 'local' modifications of ...
- articleJuly 2015
Landslide susceptibility evaluation based on BPNN and GIS: a case of Guojiaba in the Three Gorges Reservoir Area
International Journal of Geographical Information Science (IJGIS), Volume 29, Issue 7Pages 1111–1124https://doi.org/10.1080/13658816.2014.992436A landslide susceptibility evaluation is vital for disaster management and development planning in the Yangtze River Three Gorges Reservoir Area. In this study, with the support of remote sensing and Geographic Information System, 4 factor groups ...
- research-articleApril 2014
Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples
HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of SecurityArticle No.: 8, Pages 1–7https://doi.org/10.1145/2600176.2600178One hundred-sixty four participants from the United States, India and China completed a survey designed to assess past phishing experiences and whether they engaged in certain online safety practices (e.g., reading a privacy policy). The study ...
- research-articleAugust 2011
Bandgap voltage reference with low susceptibility to electromagnetic interference (EMI)
SBCCI '11: Proceedings of the 24th symposium on Integrated circuits and systems designPages 51–54https://doi.org/10.1145/2020876.2020889In this paper, the susceptibility of a current-mode bandgap voltage reference to electromagnetic interference (EMI) superimposed to the power supply is investigated by simulation. Designed for AMS 0.35 CMOS process, the circuit provides a stable voltage ...
- articleOctober 2010
3-D depth and susceptibility estimation of magnetic anomalies using local wavenumber (LW) method
Iranian Journal of Science and Technology, Transaction B: Engineering (IJSTTBE), Volume 34, Issue B5Pages 567–575Phase variation of potential field data can be used as an interpretation method. This idea appears in edge detection with tilt angle or phase angle. The advantages of this quantity are its independency to body magnetization direction and also its easy ...
- articleAugust 2010
Social Contagion and Information Technology Diffusion: The Adoption of Electronic Medical Records in U.S. Hospitals
Management Science (MANS), Volume 56, Issue 8Pages 1219–1241https://doi.org/10.1287/mnsc.1100.1183We use a social contagion lens to study the dynamic, temporal process of the diffusion of electronic medical records in the population of U.S. hospitals. Social contagion acknowledges the mutual influence among organizations within an institutional ...