4,876 research outputs found

    Designing a Patient-Centered Clinical Workflow to Assess Cyberbully Experiences of Youths in the U.S. Healthcare System

    Get PDF
    Cyberbullying or online harassment is often defined as when someone repeatedly and intentionally harasses, mistreats, or makes fun of others aiming to scare, anger or shame them using electronic devices [296]. Youths experiencing cyberbullying report higher levels of anxiety and depression, mental distress, suicide thoughts, and substance abuse than their non-bullied peers [360, 605, 261, 354]. Even though bullying is associated with significant health problems, to date, very little youth anti-bullying efforts are initiated and directed in clinical settings. There is presently no standardized procedure or workflow across health systems for systematically assessing cyberbullying or other equally dangerous online activities among vulnerable groups like children or adolescents [599]. Therefore, I developed a series of research projects to link digital indicators of cyberbullying or online harassment to clinical practices by advocating design considerations for a patient-centered clinical assessment and workflow that addresses patients’ needs and expectations to ensure quality care. Through this dissertation, I aim to answer these high-level research questions:RQ1. How does the presence of severe online harassment on online platforms contribute to negative experiences and risky behaviors within vulnerable populations? RQ2. How efficient is the current mechanism of screening these risky online negative experiences and behaviors, specifically related to cyberbully, within at-risk populations like adolescent in clinical settings? RQ3. How might evidence of activities and negative harassing experiences on online platforms best be integrated into electronic health records during clinical treatment? I first explore how harassment is presented within different social media platforms from diverse contexts and cultural norms (study 1,2, and 3); next, by analyzing actual patient data, I address current limitations in the screening process in clinical settings that fail to efficiently address core aspect of cyberbullying and their consequences within adolescent patients (study 4 and 5); finally, connecting all my findings, I recommend specific design guidelines for a refined screening tool and structured processes for implementation and integration of the screened data into patients’ electronic health records (EHRs) for better patient assessment and treatment outcomes around cyberbully within adolescent patients (study 6)

    Novel Alert Visualization: The Development of a Visual Analytics Prototype for Mitigation of Malicious Insider Cyber Threats

    Get PDF
    Cyber insider threat is one of the most difficult risks to mitigate in organizations. However, innovative validated visualizations for cyber analysts to better decipher and react to detected anomalies has not been reported in literature or in industry. Attacks caused by malicious insiders can cause millions of dollars in losses to an organization. Though there have been advances in Intrusion Detection Systems (IDSs) over the last three decades, traditional IDSs do not specialize in anomaly identification caused by insiders. There is also a profuse amount of data being presented to cyber analysts when deciphering big data and reacting to data breach incidents using complex information systems. Information visualization is pertinent to the identification and mitigation of malicious cyber insider threats. The main goal of this study was to develop and validate, using Subject Matter Experts (SME), an executive insider threat dashboard visualization prototype. Using the developed prototype, an experimental study was conducted, which aimed to assess the perceived effectiveness in enhancing the analysts’ interface when complex data correlations are presented to mitigate malicious insiders cyber threats. Dashboard-based visualization techniques could be used to give full visibility of network progress and problems in real-time, especially within complex and stressful environments. For instance, in an Emergency Room (ER), there are four main vital signs used for urgent patient triage. Cybersecurity vital signs can give cyber analysts clear focal points during high severity issues. Pilots must expeditiously reference the Heads Up Display (HUD), which presents only key indicators to make critical decisions during unwarranted deviations or an immediate threat. Current dashboard-based visualization techniques have yet to be fully validated within the field of cybersecurity. This study developed a visualization prototype based on SME input utilizing the Delphi method. SMEs validated the perceived effectiveness of several different types of the developed visualization dashboard. Quantitative analysis of SME’s perceived effectiveness via self-reported value and satisfaction data as well as qualitative analysis of feedback provided during the experiments using the prototype developed were performed. This study identified critical cyber visualization variables and identified visualization techniques. The identifications were then used to develop QUICK.v™ a prototype to be used when mitigating potentially malicious cyber insider threats. The perceived effectiveness of QUICK.v™ was then validated. Insights from this study can aid organizations in enhancing cybersecurity dashboard visualizations by depicting only critical cybersecurity vital signs

    Finding influential users of web event in social media

    Get PDF
    Users of social media have different influences on the evolution of a Web event. Finding influential users could benefit such information services as recommendation and market analysis. However, most of the existing methods are only based on social networks of users or user behaviors while the role of the contents contributed by users in social media is ignored. In fact, a Web event evolves with both user behaviors and the contents. This paper proposes an approach to find influential users by extracting user behavior network and association network of words within the contents and then uses PageRank algorithm and HITS algorithm to calculate the influence of users on the integration of two networks. The proposed approach is effective on several real-world datasets
    • …
    corecore