4,908 research outputs found

    Debbie, the Debate Bot of the Future

    Full text link
    Chatbots are a rapidly expanding application of dialogue systems with companies switching to bot services for customer support, and new applications for users interested in casual conversation. One style of casual conversation is argument, many people love nothing more than a good argument. Moreover, there are a number of existing corpora of argumentative dialogues, annotated for agreement and disagreement, stance, sarcasm and argument quality. This paper introduces Debbie, a novel arguing bot, that selects arguments from conversational corpora, and aims to use them appropriately in context. We present an initial working prototype of Debbie, with some preliminary evaluation and describe future work.Comment: IWSDS 201

    Caney Valley High School Yearbook, 1977

    Get PDF
    The Caney High School annual was published as The Senior , The Reminder , Trailer , and As You Like It between 1911-1914. From 1915 on, the Caney High School yearbook was known as Kane Kan . Caney High School became Caney Valley High School in 1973.https://digitalcommons.pittstate.edu/caney_valley_yearbooks/1004/thumbnail.jp

    A persuasive chatbot using a crowd-sourced argument graph and concerns

    Get PDF
    Chatbots are versatile tools that have the potential of being used for computational persuasion where the chatbot acts as the persuader and the human agent as the persuadee. To allow the user to type his or her arguments, as opposed to selecting them from a menu, the chatbot needs a sufficiently large knowledge base of arguments and counterarguments. And in order to make the user change their current stance on a subject, the chatbot needs a method to select persuasive counterarguments. To address this, we present a chatbot that is equipped with an argument graph and the ability to identify the concerns of the user argument in order to select appropriate counterarguments. We evaluate the bot in a study with participants and show how using our method can make the chatbot more persuasive

    Caney High School Yearbook, 1972

    Get PDF
    The Caney High School annual was published as The Senior , The Reminder , Trailer , and As You Like It between 1911-1914. From 1915 on, the Caney High School yearbook was known as Kane Kan . Caney High School became Caney Valley High School in 1973.https://digitalcommons.pittstate.edu/caney_high_yearbooks/1061/thumbnail.jp

    Soundings: the Newsletter of the Monterey Bay Chapter of the American Cetacean Society. 1996

    Get PDF
    (PDF contains 96 pages.

    The Ouachitonian 1971

    Get PDF
    The 1971 Ouachita Baptist University yearbook, The Ouachitonian, records the events of this college year. Its goal is to remind readers of pleasant memories and enduring friendships formed at OBU, as well as of the students, faculty, staff, organizations, and events that shaped OBU in 1971.https://scholarlycommons.obu.edu/yearbooks/1074/thumbnail.jp

    Caney Valley High School Yearbook, 1974

    Get PDF
    The Caney High School annual was published as The Senior , The Reminder , Trailer , and As You Like It between 1911-1914. From 1915 on, the Caney High School yearbook was known as Kane Kan . Caney High School became Caney Valley High School in 1973.https://digitalcommons.pittstate.edu/caney_valley_yearbooks/1001/thumbnail.jp

    Staff Senate Minutes, 2008 May 13

    Get PDF

    Distributive Justice, Catholic Social Teaching, and the Moral Responsibility of Marketers

    Get PDF
    This commentary uses as its platform an essay by Karpatkin (1999) titled Toward a Fair and Just Marketplace for All Consumers: The Responsibilities of Marketing Professionals. This article supports Karpatkin\u27s position that, too often, large corporations are willing to exploit weak and vulnerable consumers as the means to unsavory financial gain. Vulnerable groups include the poor, children, and the disadvantaged elderly. Essentially, Karpatkin raises questions about the lack of distributive justice for these consumer segments in the marketplace. In answer to this, the author presents a religion-inspired business ethics. Using a body of writing sometimes called Catholic Social Teaching (CST), the author describes and discusses a set offour guiding ethical principles. At the foundation of CST is the principle of human dignity. Building on this base, the author explores three additional principles: stewardship, preferential option for the vulnerable, and worker dignity. Together, these principles provide a blended moral theory that outlines a rationale for giving economically or socially disadvantaged consumer segments distinct and special moral treatment in the marketplace

    Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy

    Get PDF
    Most of the actions that fall under the trilogy of cyber crime, terrorism,and war exploit pre-existing weaknesses in the underlying technology.Because these vulnerabilities that exist in the network are not themselvesillegal, they tend to be overlooked in the debate on cyber security. A UKreport on the cost of cyber crime illustrates this approach. Its authors chose to exclude from their analysis the costs in anticipation of cyber crime, such as insurance costs and the costs of purchasing anti-virus software on the basis that "these are likely to be factored into normal day-to-day expenditures for the Government, businesses, and individuals. This article contends if these costs had been quantified and integrated into the cost of cyber crime, then the analysis would have revealed that what matters is not so much cyber crime, but the fertile terrain of vulnerabilities that unleash a range of possibilities to whomever wishes to exploit them. By downplaying the vulnerabilities, the threats represented by cyber war, cyber terrorism, and cyber crime are conversely inflated. Therefore, reassessing risk as a strategy for security in cyberspace must include acknowledgment of understated vulnerabilities, as well as a better distributed knowledge about the nature and character of the overhyped threats of cyber crime, cyber terrorism, and cyber war
    • …
    corecore