Search

Search Constraints

Start Over You searched for: Graduate Program Informatics Remove constraint Graduate Program: Informatics Degree PHD Remove constraint Degree: PHD

Search Results

1. POLICIES, STANDARDS, AND PRACTICES: AN ANALYSIS OF THE CURRENT STATE OF ORGANIZATIONAL SECURITY AT UNIVERSITIES AND CORPORATIONS

open_access
Open Access

2. Incorporating social media in community emergency response

open_access
Open Access

3. DESIGNING SELF-CARE TECHNOLOGY TO ENHANCE PATIENTS’ PREHABILITATION ENGAGEMENT

open_access
Open Access

4. FACTORS IN GENETIC DATA SHARING DECISIONS

open_access
Open Access

5. Promoting Computational Grounding Through Informal Coding Workshops for Non-programmers

open_access
Open Access

6. Understanding Ride-Sharing in On-Demand Platforms: Stakes, Dependency, and Sharing

open_access
Open Access

7. Promoting Change Readiness using a Simulated Event Communication Technique: Lessons Learned in a Public Safety Answering Point

open_access
Open Access

8. Multiobjective Optimization Approaches for Bias Mitigation in Machine Learning

open_access
Open Access

9. Artificial Intelligence and Human Intelligence to Derive Meaningful Information on Geographic Movement Described in Text

open_access
Open Access

11. Beyond Images: Robustifying Representation Learning against Trojaning Attacks

open_access
Open Access

12. Mitigating Social Challenges among Vulnerable Communities with Machine Learning

open_access
Open Access

13. Evaluating and Certifying the Adversarial Robustness of Neural Language Models

open_access
Open Access

14. Intra-Rural Digital Divides in Appalachia: Pathways for Digital Literacy and Inclusion

open_access
Open Access

15. Understanding Non-Participation in a Self-Regulated Computer-Mediated Communication Implementation: Exploring Challenges and Implications

open_access
Open Access

16. Crisis Media - Discovering Social Media's Role in the Emergency Management Process

open_access
Open Access

17. If You See Something Suspicious Online, Report It: An Investigation into Addressing and Overcoming the Challenges in Cybercrime Reporting

open_access
Open Access

18. Design and Data Mining Techniques for Large-Scale Scholarly Digital Libraries and Search Engines

open_access
Open Access

19. Empirical Studies on Platform-Driven and User-Initiated Methods for Misinformation Correction

open_access
Open Access

20. Excursions in Causal Data Science: Fairness, Causal Attribution, and Applications

open_access
Open Access

21. Towards Useful AI Interpretability for Humans via Interactive AI Explanations

open_access
Open Access

22. HUMAN-IN-THE-LOOP APPROACH TO INVESTIGATE ALGORITHMIC JUSTICE IN AI AND MACHINE LEARNING ENABLED TALENT ACQUISITION SYSTEMS

open_access
Open Access

23. Opportunities for Competency-Based Learning in Software Development Courses

open_access
Open Access

25. Exploring Social Interactions in Online Exercise Classes

open_access
Open Access

26. Mapping new Terrains in Sustainable HCI: Land/Body Doubling and Justice-Oriented Critical Posthuman Subjectivities

restricted_to_institution
Restricted (Penn State Only)

27. Improving Usability of Noisy and Unstructured Biomedical Imaging and Healthcare Text Data Modalities

restricted_to_institution
Restricted (Penn State Only)

28. Advancing Predictive Models in Healthcare: From Single to Multi-Modality

restricted_to_institution
Restricted (Penn State Only)

29. Applying machine learning and NLP techniques to Cyber Security: three selected studies

restricted_to_institution
Restricted (Penn State Only)

30. Predictive Modeling for High Dimensional Longitudinal Data

restricted_to_institution
Restricted (Penn State Only)

31. An Investigation of the Design Space for Student Learning Tools that Aid Interaction with Recorded Lecture Content

restricted_to_institution
Restricted (Penn State Only)

32. Toward Intelligent Writing Support Beyond Completing Sentences

restricted_to_institution
Restricted (Penn State Only)

34. Supporting claim-making in democratic deliberation through an information recommendation system

restricted_to_institution
Restricted (Penn State Only)

35. Towards Trustworthy Graph Neural Networks

open_access
Open Access

36. Pleasure Activism: Designing for Women’s Masturbation

restricted_to_institution
Restricted (Penn State Only)

37. The Learning Code : Designing AI-Driven Adaptive Learning Systems for Social Learning

open_access
Open Access

38. Scenario-Based Assessment of Information Technology Alignment and Misalignment: Incorporating User Perspectives

open_access
Open Access

39. Beyond the Information Given: Factors Intensifying or Attenuating Individuals’ Susceptibility to Misinformation

open_access
Open Access

40. Learning to Contextualize the Field of Sports Analytics

open_access
Open Access

41. User Agency in AI-infused Systems

restricted_to_institution
Restricted (Penn State Only)

42. Deep Learning for Visual Data Analysis and Synthesis in Healthcare and Beyond

restricted_to_institution
Restricted (Penn State Only)

43. Developing Conversational User Interfaces To Deliver Evidence-Based Health Interventions

restricted_to_institution
Restricted (Penn State Only)

44. Analysis of Extremist and Terrorist Groups on Twitter

open_access
Open Access

45. Data-Driven Scene Reconstruction, Understanding and Generation

restricted_to_institution
Restricted (Penn State Only)