323 research outputs found

    Self-Presentation Techniques Used by Local Television Sports Broadcasters on Twitter

    Get PDF
    Using self-presentation theory as a guide, this study examined if local sports broadcasters in the United States were more likely to write about their work life (front stage) or their personal life (backstage) when on Twitter. A content analysis of 19,649 tweets from 201 sportscasters throughout the United States revealed that the majority of tweets (77.4%) demonstrated front stage personas (a work-related tool), with the remaining 22.6% categorized as backstage personas (giving details about their personal lives). This illustrates that sportscasters’ interactions with followers online are, in essence, not much different from their interactions with them on television, in that they are simply giving them scores and news. Additional analysis addressed the difference in tweet content based on gender and what size city the broadcaster worked in. Theoretical implications regarding self-presentation theory and practical implications for sports media members are discussed.

    Trajectory and Policy Aware Sender Anonymity in Location Based Services

    Full text link
    We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these logs. Log sharing can be extremely valuable for advertising, data mining research and network management, but it poses a serious threat to the privacy of LBS users. Sender anonymity solutions prevent a malicious attacker from inferring the interests of LBS users by associating them with their service requests after gaining access to the anonymized logs. With the fast-increasing adoption of smartphones and the concern that historic user trajectories are becoming more accessible, it becomes necessary for any sender anonymity solution to protect against attackers that are trajectory-aware (i.e. have access to historic user trajectories) as well as policy-aware (i.e they know the log anonymization policy). We call such attackers TP-aware. This paper introduces a first privacy guarantee against TP-aware attackers, called TP-aware sender k-anonymity. It turns out that there are many possible TP-aware anonymizations for the same LBS log, each with a different utility to the consumer of the anonymized log. The problem of finding the optimal TP-aware anonymization is investigated. We show that trajectory-awareness renders the problem computationally harder than the trajectory-unaware variants found in the literature (NP-complete in the size of the log, versus PTIME). We describe a PTIME l-approximation algorithm for trajectories of length l and empirically show that it scales to large LBS logs (up to 2 million users)

    Technology, Counseling, and the Autism Spectrum: Using Tech to Promote Growth and Healing with Autism Spectrum Clients

    Get PDF
    Autism spectrum clients in counseling are challenging due to limitations in perspective taking as well as emotional/cognitive delays. Many autism spectrum clients use technology as a way to feel safe and relate to the world around them. Computer/tablet/video games have rich metaphors and themes that can help these young people understand themselves and the world around them and can be used to enhance self-representation and social, emotional, and cognitive growth

    Computer/Video Games as a Play Therapy Tool in Reducing Emotional Disturbances in Children

    Get PDF
    The purpose of this study is to examine the effectiveness of computer/video games as a play therapy tool for children suffering from an emotional disturbance of sadness (pervasive feelings of irritability, loss of enjoyment in activities previously enjoyed, withdrawal from friends or family, decline in school performance, and hopelessness). Children who suffer from emotional disturbances have problems functioning in school, in social and family settings, as well as transitioning into adulthood. Play therapy is an effective and creative way to work with children with emotional disturbances. Play becomes a way for the child to communicate and heal. Computer/video games are fun and inviting to children, and have been used in many different settings with children. To examine the effectiveness of computer/video games as a play therapy tool in treating emotional disturbances, a qualitative, collective case study design was used. Overall, the findings from the study supported the fact that children suffering from emotional disturbances encounter difficulties academically, emotionally, and socially. The findings support the literature that play therapy is effective in treating children suffering from emotional problems. Finally, the findings confirmed the usefulness of video and computer games as a play therapy tool with children suffering from the emotional disturbance of sadness

    To Publish or Perish: What Faculty Need to Know About Scholarly Activity

    Get PDF
    This session will feature a panel presentation to include Counselor Education and Family Studies leadership, published faculty, and counseling journal editorial board members. The topic will be on the expectations for faculty and tips for successful (unsuccessful) manuscript submission

    Fabrication and performance of selectively oxidized vertical-cavity lasers

    Get PDF
    Includes bibliographical references.We report the high yield fabrication and reproducible performance of selectively oxidized vertical-cavity surface emitting lasers. We show that linear oxidation rates of AlGaAs without an induction period allows reproducible fabrication of buried oxide current apertures within monolithic distributed Bragg reflectors. The oxide layers do not induce obvious crystalline defects, and continuous wave operation in excess of 650 h has been obtained. The high yield fabrication enables relatively high laser performance over a wide wavelength span. We observe submilliamp threshold currents over a wavelength range of up to 75 nm, and power conversion efficiencies at 1 mW output power of greater than 20% over a 50-nm wavelength range.The work at Sandia National Laboratories was supported in part by the United States DOE under contract No. DE-AC04-94AL85000

    Robust Principles: Architectural Design Principles for Adversarially Robust CNNs

    Full text link
    Our research aims to unify existing works' diverging opinions on how architectural components affect the adversarial robustness of CNNs. To accomplish our goal, we synthesize a suite of three generalizable robust architectural design principles: (a) optimal range for depth and width configurations, (b) preferring convolutional over patchify stem stage, and (c) robust residual block design through adopting squeeze and excitation blocks and non-parametric smooth activation functions. Through extensive experiments across a wide spectrum of dataset scales, adversarial training methods, model parameters, and network design spaces, our principles consistently and markedly improve AutoAttack accuracy: 1-3 percentage points (pp) on CIFAR-10 and CIFAR-100, and 4-9 pp on ImageNet. The code is publicly available at https://github.com/poloclub/robust-principles.Comment: Published at BMVC'2

    Classification of non-Riemannian doubled-yet-gauged spacetime

    Get PDF
    Assuming O(D,D)\mathbf{O}(D,D) covariant fields as the `fundamental' variables, Double Field Theory can accommodate novel geometries where a Riemannian metric cannot be defined, even locally. Here we present a complete classification of such non-Riemannian spacetimes in terms of two non-negative integers, (n,nˉ)(n,\bar{n}), 0≤n+nˉ≤D0\leq n+\bar{n}\leq D. Upon these backgrounds, strings become chiral and anti-chiral over nn and nˉ\bar{n} directions respectively, while particles and strings are frozen over the n+nˉn+\bar{n} directions. In particular, we identify (0,0)(0,0) as Riemannian manifolds, (1,0)(1,0) as non-relativistic spacetime, (1,1)(1,1) as Gomis-Ooguri non-relativistic string, (D−1,0)(D{-1},0) as ultra-relativistic Carroll geometry, and (D,0)(D,0) as Siegel's chiral string. Combined with a covariant Kaluza-Klein ansatz which we further spell, (0,1)(0,1) leads to Newton-Cartan gravity. Alternative to the conventional string compactifications on small manifolds, non-Riemannian spacetime such as D=10D=10, (3,3)(3,3) may open a new scheme of the dimensional reduction from ten to four.Comment: 1+41 pages; v2) Refs added; v3) Published version; v4) Sign error in (2.51) correcte
    • …
    corecore