11,203 research outputs found

    One Small Step for Generative AI, One Giant Leap for AGI: A Complete Survey on ChatGPT in AIGC Era

    Full text link
    OpenAI has recently released GPT-4 (a.k.a. ChatGPT plus), which is demonstrated to be one small step for generative AI (GAI), but one giant leap for artificial general intelligence (AGI). Since its official release in November 2022, ChatGPT has quickly attracted numerous users with extensive media coverage. Such unprecedented attention has also motivated numerous researchers to investigate ChatGPT from various aspects. According to Google scholar, there are more than 500 articles with ChatGPT in their titles or mentioning it in their abstracts. Considering this, a review is urgently needed, and our work fills this gap. Overall, this work is the first to survey ChatGPT with a comprehensive review of its underlying technology, applications, and challenges. Moreover, we present an outlook on how ChatGPT might evolve to realize general-purpose AIGC (a.k.a. AI-generated content), which will be a significant milestone for the development of AGI.Comment: A Survey on ChatGPT and GPT-4, 29 pages. Feedback is appreciated ([email protected]

    MUFFLE: Multi-Modal Fake News Influence Estimator on Twitter

    Get PDF
    To alleviate the impact of fake news on our society, predicting the popularity of fake news posts on social media is a crucial problem worthy of study. However, most related studies on fake news emphasize detection only. In this paper, we focus on the issue of fake news influence prediction, i.e., inferring how popular a fake news post might become on social platforms. To achieve our goal, we propose a comprehensive framework, MUFFLE, which captures multi-modal dynamics by encoding the representation of news-related social networks, user characteristics, and content in text. The attention mechanism developed in the model can provide explainability for social or psychological analysis. To examine the effectiveness of MUFFLE, we conducted extensive experiments on real-world datasets. The experimental results show that our proposed method outperforms both state-of-the-art methods of popularity prediction and machine-based baselines in top-k NDCG and hit rate. Through the experiments, we also analyze the feature importance for predicting fake news influence via the explainability provided by MUFFLE

    Embodying entrepreneurship: everyday practices, processes and routines in a technology incubator

    Get PDF
    The growing interest in the processes and practices of entrepreneurship has been dominated by a consideration of temporality. Through a thirty-six-month ethnography of a technology incubator, this thesis contributes to extant understanding by exploring the effect of space. The first paper explores how class structures from the surrounding city have appropriated entrepreneurship within the incubator. The second paper adopts a more explicitly spatial analysis to reveal how the use of space influences a common understanding of entrepreneurship. The final paper looks more closely at the entrepreneurs within the incubator and how they use visual symbols to develop their identity. Taken together, the three papers reject the notion of entrepreneurship as a primarily economic endeavour as articulated through commonly understood language and propose entrepreneuring as an enigmatic attractor that is accessed through the ambiguity of the non-verbal to develop the ‘new’. The thesis therefore contributes to the understanding of entrepreneurship and proposes a distinct role for the non-verbal in that understanding

    Reawakening Sport and Community Engagament in a previous Olympic Host City: Capitalising on the Athens 2004 Olympic Volunteer Legacy 17 Years on

    Get PDF
    This project aimed to revise understanding of the current experiences of civil and volunteer sector stakeholders. It employed a qualitative, mixed-method, research design comprising strategically targeted semi-structured interviews and surveys with 19 civil society professionals and Athens 2004 volunteer programme administrators and participants. Findings reveal that the Athens 2004 Olympic Games was aided by existing sector expertise and resources, eventually encouraged further third sector development in the country, and inspired individuals to continue wider volunteer-related work. Additionally, while broader social, political, economic factors and a lack of post-Games strategy hindered sector development, new collaborative opportunities were also created. Ultimately, these findings provide a critical appraisal and guidelines for enhancing future Olympic volunteer legacies in host cities

    Optimising acoustic cavitation for industrial application

    Get PDF
    The ultrasonic horn is one of the most commonly used acoustic devices in laboratories and industry. For its efficient application to cavitation mediated process, the cavitation generated at its tip as a function of its tip-vibration amplitudes still needed to be studied in detail. High-speed imaging and acoustic detection are used to investigate the cavitation generated at the tip of an ultrasonic horn, operating at a fundamental frequency, f0, of 20 kHz. Tip-vibration amplitudes are sampled at fine increments across the range of input powers available. The primary bubble cluster under the tip is found to undergo subharmonic periodic collapse, with concurrent shock wave emission, at frequencies of f0/m, with m increasing through integer values with increasing tip-vibration amplitude. The contribution of periodic shock waves to the noise spectra of the acoustic emissions is confirmed. Transitional input powers for which the value of m is indistinct, and shock wave emission irregular and inconsistent, are identified through Vrms of the acoustic detector output. For cavitation applications mediated by bubble collapse, sonications at transitional powers may lead to inefficient processing. The ultrasonic horn is also deployed to investigate the role of shock waves in the fragmentation of intermetallic crystals, nominally for ultrasonic treatment of Aluminium melt, and in a novel two-horn configuration for potential cavitation enhancement effects. An experiment investigating nitrogen fixation via cavitation generated by focused ultrasound exposures is also described. Vrms from the acoustic detector is again used to quantify the acoustic emissions for comparison to the sonochemical nitrite yield and for optimisation of sonication protocols at constant input energy. The findings revealed that the acoustic cavitation could be enhanced at constant input energy through optimisation of the pulse duration and pulse interval. Anomalous results may be due to inadequate assessment for the nitrate generated. The studies presented in this thesis have illustrated means of improving the cavitation efficiency of the used acoustic devices, which may be important to some selected industrial processes

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance

    Photography and Aesthetics: a critical study on visual and textual narratives in the lifework of Sergio Larraín and its impact in 20th century Europe and Latin America

    Get PDF
    The main focus of this study is a theoretical exploration of critical approaches applicable to the work of the Chilean photographer Sergio Larraín (1931-2012). It presents analytical tools to contextualise and understand the importance and impact of his work in photographic studies and his portrayal of twentieth-century Latin American and European culture. It inspects in depth a large portion of his photo work, which is still only partially published and mostly reduced to his "active" period as a photojournalist, aside from the personal photographic exploration of his early and late career (C. Mena). This extended material creates a broader scope for understanding his photographs and him as a canonical photographer. This study analyses the photographer's trajectory as discourses of recollection of historical memory in time (Mauad) to trace Larraín's collective memory associated with his visual production. Such analysis helps decode his visual imagery and his projection and impact on the European and Latin American culture. This strategy helps solve a two fold problem: firstly, it generates an interpretive consistency to understand the Chilean's photographic practice; secondly, it explores the power of images as an aesthetic experience in the installation of nationalist ideologies and the creation of imaginaries (B. Anderson 163)

    BECOMEBECOME - A TRANSDISCIPLINARY METHODOLOGY BASED ON INFORMATION ABOUT THE OBSERVER

    Get PDF
    ABSTRACT Andrea T. R. Traldi BECOMEBECOME A Transdisciplinary Methodology Based on Information about the Observer The present research dissertation has been developed with the intention to provide practical strategies and discover new intellectual operations which can be used to generate Transdisciplinary insight. For this reason, this thesis creates access to new knowledge at different scales. Firstly, as it pertains to the scale of new knowledge generated by those who attend Becomebecome events. The open-source nature of the Becomebecome methodology makes it possible for participants in Becomebecome workshops, training programmes and residencies to generate new insight about the specific project they are working on, which then reinforce and expand the foundational principles of the theoretical background. Secondly, as it pertains to the scale of the Becomebecome framework, which remains independent of location and moment in time. The method proposed to access Transdisciplinary knowledge constitutes new knowledge in itself because the sequence of activities, described as physical and mental procedures and listed as essential criteria, have never been found organised 6 in such a specific order before. It is indeed the order in time, i.e. the sequence of the ideas and activities proposed, which allows one to transform Disciplinary knowledge via a new Transdisciplinary frame of reference. Lastly, new knowledge about Transdisciplinarity as a field of study is created as a consequence of the heretofore listed two processes. The first part of the thesis is designated ‘Becomebecome Theory’ and focuses on the theoretical background and the intellectual operations necessary to support the creation of new Transdisciplinary knowledge. The second part of the thesis is designated ‘Becomebecome Practice’ and provides practical examples of the application of such operations. Crucially, the theoretical model described as the foundation for the Becomebecome methodology (Becomebecome Theory) is process-based and constantly checked against the insight generated through Becomebecome Practice. To this effect, ‘information about the observer’ is proposed as a key notion which binds together Transdisciplinary resources from several studies in the hard sciences and humanities. It is a concept that enables understanding about why and how information that is generated through Becomebecome Practice is considered of paramount importance for establishing the reference parameters necessary to access Transdisciplinary insight which is meaningful to a specific project, a specific person, or a specific moment in time
    • …
    corecore