1,215 research outputs found
Juries - Post-Trial Questioning of Jurors Enjoined Where Found a Searching Hostile Inquiry–Conduct Not Held Unethical. United States v. Driscoll (S.D.N.Y. 1967).
This recent case discusses United States v. Driscoll (S.D.N.Y. 1967)
"There's so much responsibility on users right now:" Expert Advice for Staying Safer From Hate and Harassment
Online hate and harassment poses a threat to the digital safety of people
globally. In light of this risk, there is a need to equip as many people as
possible with advice to stay safer online. We interviewed 24 experts to
understand what threats and advice internet users should prioritize to prevent
or mitigate harm. As part of this, we asked experts to evaluate 45 pieces of
existing hate-and-harassment-specific digital-safety advice to understand why
they felt advice was viable or not. We find that experts frequently had
competing perspectives for which threats and advice they would prioritize. We
synthesize sources of disagreement, while also highlighting the primary threats
and advice where experts concurred. Our results inform immediate efforts to
protect users from online hate and harassment, as well as more expansive
socio-technical efforts to establish enduring safety.Comment: 17 pages, 7 figures, 1 table, 84 reference
Building Nursing Capacity for Palliative Care at a Jesuit Catholic University: A Model Program
The average life span is increasing, due to vast advancements in social conditions, public health, and medical care. Globally, those living with chronic and serious medical conditions can benefit from palliative care services. Yet, the workforce is insufficient to support the demand. This case study describes efforts made by one Jesuit Catholic University to build nursing capacity and to promote access to high quality, compassionate palliative healthcare
SoK: Safer Digital-Safety Research Involving At-Risk Users
Research involving at-risk users -- that is, users who are more likely to
experience a digital attack or to be disproportionately affected when harm from
such an attack occurs -- can pose significant safety challenges to both users
and researchers. Nevertheless, pursuing research in computer security and
privacy is crucial to understanding how to meet the digital-safety needs of
at-risk users and to design safer technology for all. To standardize and
bolster safer research involving such users, we offer an analysis of 196
academic works to elicit 14 research risks and 36 safety practices used by a
growing community of researchers. We pair this inconsistent set of reported
safety practices with oral histories from 12 domain experts to contribute
scaffolded and consolidated pragmatic guidance that researchers can use to
plan, execute, and share safer digital-safety research involving at-risk users.
We conclude by suggesting areas for future research regarding the reporting,
study, and funding of at-risk user researchComment: 13 pages, 3 table
Researching AI Legibility Through Design
Everyday interactions with computers are increasingly likely to involve elements of Artificial Intelligence (AI). Encompassing a broad spectrum of technologies and applications, AI poses many challenges for HCI and design. One such challenge is the need to make AI’s role in a given system legible to the user in a meaningful way. In this paper we employ a Research through Design (RtD) approach to explore how this might be achieved. Building on contemporary concerns and a thorough exploration of related research, our RtD process reflects on designing imagery intended to help increase AI legibility for users. The paper makes three contributions. First, we thoroughly explore prior research in order to critically unpack the AI legibility problem space. Second, we respond with design proposals whose aim is to enhance the legibility, to users, of systems using AI. Third, we explore the role of design-led enquiry as a tool for critically exploring the intersection between HCI and AI research
SoK: hate, harassment, and the changing landscape of online abuse
We argue that existing security, privacy, and antiabuse protections fail to address the growing threat of online hate and harassment. In order for our community to understand and address this gap, we propose a taxonomy for reasoning about online hate and harassment. Our taxonomy draws on over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs. In the process, we identify seven classes of attacks—such as toxic content and surveillance—that each stem from different attacker capabilities and intents. We also provide longitudinal evidence from a three-year survey that hate and harassment is a pervasive, growing experience for online users, particularly for at-risk communities like young adults and people who identify as LGBTQ+. Responding to each class of hate and harassment requires a unique strategy and we highlight five such potential research directions that ultimately empower individuals, communities, and platforms to do so.Accepted manuscrip
Recommended from our members
Nighttime chemical transformation in biomass burning plumes : A box model analysis initialized with aircraft observations
Biomass burning (BB) is a large source of reactive compounds in the atmosphere. While the daytime photochemistry of BB emissions has been studied in some detail, there has been little focus on nighttime reactions despite the potential for substantial oxidative and heterogeneous chemistry. Here, we present the first analysis of nighttime aircraft intercepts of agricultural BB plumes using observations from the NOAA WP-3D aircraft during the 2013 Southeast Nexus (SENEX) campaign. We use these observations in conjunction with detailed chemical box modeling to investigate the formation and fate of oxidants (NO3, N2O5, O3, and OH) and BB volatile organic compounds (BBVOCs), using emissions representative of agricultural burns (rice straw) and western wildfires (ponderosa pine). Field observations suggest NO3 production was approximately 1 ppbv hr–1, while NO3 and N2O5 were at or below 3 pptv, indicating rapid NO3/N2O5 reactivity. Model analysis shows that >99% of NO3/N2O5 loss is due to BBVOC + NO3 reactions rather than aerosol uptake of N2O5. Nighttime BBVOC oxidation for rice straw and ponderosa pine fires is dominated by NO3 (72, 53%, respectively) but O3 oxidation is significant (25, 43%), leading to roughly 55% overnight depletion of the most reactive BBVOCs and NO2
The Astropy Problem
The Astropy Project (http://astropy.org) is, in its own words, "a community
effort to develop a single core package for Astronomy in Python and foster
interoperability between Python astronomy packages." For five years this
project has been managed, written, and operated as a grassroots,
self-organized, almost entirely volunteer effort while the software is used by
the majority of the astronomical community. Despite this, the project has
always been and remains to this day effectively unfunded. Further, contributors
receive little or no formal recognition for creating and supporting what is now
critical software. This paper explores the problem in detail, outlines possible
solutions to correct this, and presents a few suggestions on how to address the
sustainability of general purpose astronomical software
- …