Search

Search Constraints

Start Over You searched for: Graduate Program Informatics Remove constraint Graduate Program: Informatics Degree PHD Remove constraint Degree: PHD Access Level open_access Remove constraint Access Level: open_access

Search Results

1. POLICIES, STANDARDS, AND PRACTICES: AN ANALYSIS OF THE CURRENT STATE OF ORGANIZATIONAL SECURITY AT UNIVERSITIES AND CORPORATIONS

open_access
Open Access

2. Incorporating social media in community emergency response

open_access
Open Access

3. DESIGNING SELF-CARE TECHNOLOGY TO ENHANCE PATIENTS’ PREHABILITATION ENGAGEMENT

open_access
Open Access

4. FACTORS IN GENETIC DATA SHARING DECISIONS

open_access
Open Access

5. Promoting Computational Grounding Through Informal Coding Workshops for Non-programmers

open_access
Open Access

6. Understanding Ride-Sharing in On-Demand Platforms: Stakes, Dependency, and Sharing

open_access
Open Access

7. Promoting Change Readiness using a Simulated Event Communication Technique: Lessons Learned in a Public Safety Answering Point

open_access
Open Access

8. Multiobjective Optimization Approaches for Bias Mitigation in Machine Learning

open_access
Open Access

9. Artificial Intelligence and Human Intelligence to Derive Meaningful Information on Geographic Movement Described in Text

open_access
Open Access

11. Beyond Images: Robustifying Representation Learning against Trojaning Attacks

open_access
Open Access

12. Mitigating Social Challenges among Vulnerable Communities with Machine Learning

open_access
Open Access

13. Evaluating and Certifying the Adversarial Robustness of Neural Language Models

open_access
Open Access

14. Intra-Rural Digital Divides in Appalachia: Pathways for Digital Literacy and Inclusion

open_access
Open Access

15. Understanding Non-Participation in a Self-Regulated Computer-Mediated Communication Implementation: Exploring Challenges and Implications

open_access
Open Access

16. Crisis Media - Discovering Social Media's Role in the Emergency Management Process

open_access
Open Access

17. If You See Something Suspicious Online, Report It: An Investigation into Addressing and Overcoming the Challenges in Cybercrime Reporting

open_access
Open Access

18. Design and Data Mining Techniques for Large-Scale Scholarly Digital Libraries and Search Engines

open_access
Open Access

19. Empirical Studies on Platform-Driven and User-Initiated Methods for Misinformation Correction

open_access
Open Access

20. Excursions in Causal Data Science: Fairness, Causal Attribution, and Applications

open_access
Open Access