{"title":"Applying virtual stories to enhance University students learn-to-learn competence for practicum preparation: an empirical exploratory study","authors":"J. Li","doi":"10.1109/ISTAS55053.2022.10227109","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227109","url":null,"abstract":"Though considerable literature conducted in the context of Western societies has concluded that the use of virtual reality (VR) technology can facilitate students’ learning, the applicability of this technology to advancing students’ practicum learning in the Chinese context remains uncertain. This presentation describes the design and implementation of a learning project based on the pedagogical foundation of learning-to-learn and the application of VR technology. The extent to which the project intervention can enhance students learn-to-learn competence (i.e. creativity, professional identity and teamwork skills) was assessed through a longitudinal survey study. ANOVA analysis was conducted based on the data collected at three time points (pre-intervention, post intervention and follow-up stages) on a group of 107 University students. Results indicate significant positive changes among student participants in their self-perceived creativity, teamwork skills and the accomplishment of course intended learning outcome. Issues and implications for University education in the digital and the COVID-19 pandemic era are discussed.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126733786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universal Acceptance as an Elixir for Multilingual Internet and Cybersecurity Considerations","authors":"Harish Chowdhary, N. Chaudhary","doi":"10.1109/ISTAS55053.2022.10227102","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227102","url":null,"abstract":"Universal Acceptance is fundamental for achieving a multilingual internet where users can browse the web in their preferred language or script. Universal Acceptance (UA) guarantees that all Internet-capable programs, hardware, and software handle all domain names and emails identically. UA is the entry point for the following billion Internet users. For decades the Internet has been working on a single language, i.e., English. Nevertheless, with the increasing demand for bringing back cultural language from every aspect, many websites and online services use multilingual pages for the feasibility of the user. A person who reads or studies anything in their native language is more likely to understand it quickly. Multilingual websites will help the individual navigate through it more convincingly than in any other language. Universal Acceptance will serve as the main concoction for making the idea of Multilingualism into reality through the Internet. This paper explores the need for Multilingualism on the global Internet, the eventual solution for bringing this transition to cyberspace via UA, and cybersecurity considerations.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132595845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Media Harms as a Trilemma: Asymmetry, Algorithms, and Audacious Design Choices","authors":"M. Cheong","doi":"10.1109/ISTAS55053.2022.10227099","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227099","url":null,"abstract":"Social media has expanded in its use, and reach, since the inception of early social networks in the early 2000s. Increasingly, users turn to social media for keeping up to date with current affairs and information. However, social media is increasingly used to promote disinformation and cause harm. In this contribution, I argue that as information (eco)systems, social media sites are vulnerable from three aspects, each corresponding to the classical 3-tier architecture in information systems: asymmetric networks (data tier); algorithms powering the supposed personalisation for the user experience (application tier); and adverse or audacious design of the user experience and overall information ecosystem (presentation tier) - which can be summarised as the 3 A’s. Thus, the open question remains: how can we ‘fix’ social media? I will unpack suggestions from various allied disciplines- from philosophy to data ethics to social psychology - in untangling the 3A’s above.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gammon, Qin Zhu, S. Streiner, R. Clancy, Ryan Thorpe
{"title":"Exploring the Perceptions of Professional Values among First-Year Engineering Students: A Cross-Cultural Comparison","authors":"A. Gammon, Qin Zhu, S. Streiner, R. Clancy, Ryan Thorpe","doi":"10.1109/ISTAS55053.2022.10227117","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227117","url":null,"abstract":"In the engineering ethics education literature, there has recently been increasing interest in longitudinal studies of engineering students’ moral development. Understanding how first-year engineering students perceive ethics can provide baseline information critical for understanding their moral development during their subsequent journey in engineering learning. Existing studies have mainly examined how first-year engineering students perceive the structure and elements of ethics curricula, pregiven ethics scenarios, what personal ethical beliefs and specific political ideals they hold (e.g., fairness and political involvement), and institutional ethical climates. Complementary to existing studies, our project surveyed how first-year engineering students perceive professional ethical values. Specifically, we asked students to list the three most important values for defining a good engineer. This question responds to a gap in existing engineering ethics literature that engineering students’ perceptions (especially first-year students) of professional virtues and values are not sufficiently addressed. We argue that designing effective and engaged ethics education experiences needs to consider the professional values perceived by students and how these values are related to the values communicated in the engineering curriculum. This paper is part of a larger project that compares how engineering students develop moral reasoning and intuition longitudinally across three cultures/countries: the United States, Netherlands, and China. We hope that findings from this paper can be useful for engineering educators to reflect on and design subsequent ethics education programs that are more responsive to students’ perceptions of professional values when beginning an engineering program.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"54 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124985105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invited Papers","authors":"","doi":"10.1109/istas55053.2022.10227093","DOIUrl":"https://doi.org/10.1109/istas55053.2022.10227093","url":null,"abstract":"","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121784845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying a Trustworthy AI Framework to Mitigate Bias and Increase Workforce Gender Diversity","authors":"X. Liu, Diane R. Murphy","doi":"10.1109/ISTAS55053.2022.10227119","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227119","url":null,"abstract":"Organizations increasingly use artificial intelligence (AI) technologies in their screening and recruiting process. However, AI-enabled recruiting and talent management tools have also introduced risks of unfair bias that may compromise workforce diversity. This conceptual paper frames an ethical discussion regarding gender equity in AI-enabled workforce decision applications. The authors examined several real-world cases in which AI was used in talent acquisition. The ensuing question is whether the use of AI in the hiring process can be turned into an advantage to improve gender equity. To address the question, a multi-faceted trustworthy AI framework was reviewed and applied to the workforce decision context. A list of implementation guidelines is proposed to mitigate bias and increase diversity in the IT workforce. The authors aim to stimulate further discussions and investigation on this complex topic and to call for action to develop educational programs or awareness campaigns on trustworthy AI, so improving gender equity in technology hiring.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132859893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nick J. Dodd, H. Fan, Parth Khopkar, Francis Mendoza, Edgard Musafiri Mimo, Yatiraj Shetty, Riley Tallman, Katina Michael
{"title":"Facial Emotion Recognition and the Future of Work","authors":"Nick J. Dodd, H. Fan, Parth Khopkar, Francis Mendoza, Edgard Musafiri Mimo, Yatiraj Shetty, Riley Tallman, Katina Michael","doi":"10.1109/ISTAS55053.2022.10227134","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227134","url":null,"abstract":"This article provides an overview of the emergent area of facial emotion recognition (FER). Increasingly, videoconferencing applications are being used to bridge the geographic divide, as telecommuters have opted to work remotely (e.g. from home) during the COVID-19 pandemic. organizations have established business continuity programs that want to ensure that their remote workers are maintaining their health and well-being. As a result, some videoconferencing software can now perform FER, providing feedback to supervisors about how well their workforce is coping during these unprecedented times. What might such technologies mean for how people present in front of the camera? And how do these systems work? The significance of this paper is in presenting an end-to-end technological description of FER systems in the context of a “future of work” use case scenario presenting a working prototype developed by the authors and available on GitHub. The concepts of fairness and algorithmic bias in context is considered, before proceeding to address some of the human and social dimensions of these systems.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Relationship Conflict within the Social Network of Large IS Projects using a SIR Model","authors":"Yuyang Tang, R. Williams","doi":"10.1109/ISTAS55053.2022.10227113","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227113","url":null,"abstract":"In large corporate organisations, significant business transformation initiatives are often implemented using large IS and IT projects that involve multiple third-party providers. These are often structured around multi-partner project teams that align to the various functional and technical aspects of the new system, incorporating a diversity of members within each project team, which frequently results in conflicts that spread across the social network of the implementation programme. While several studies on conflict in project teams have been published, to the best of our knowledge, there are no visual simulations that allow observers to examine the underlying social relationships and system dynamics. As a result, we believe exploring the process of conflict propagation through computational modelling will become a critical component of the study of conflict management. A common approach for modelling complex systems is agent-based modelling and simulation, which enables complex emergent behaviours to emerge at the system-level through simple rule-based interactions at the individual agent-level. We developed an agent-based model of conflict that incorporporated the Susceptible-Infectious-Removed model from epidemiology, in order investigate the propagation of conflict in a large IS implementation. Conflict is viewed as an infection, and the process of post-conflict management as patient recovery. We illustrate the model’s validity in reality and the results demonstrate that regardless of the magnitude of the conflict, if it is not adequately handled at the start, it may rapidly spread throughout the network.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright Page","authors":"","doi":"10.1109/istas55053.2022.10227125","DOIUrl":"https://doi.org/10.1109/istas55053.2022.10227125","url":null,"abstract":"","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114433300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Just-in-Time Transnational Organized Crime: Just Another Adaptive Supply Chain","authors":"Katina Michael","doi":"10.1109/ISTAS55053.2022.10227108","DOIUrl":"https://doi.org/10.1109/ISTAS55053.2022.10227108","url":null,"abstract":"There has been much research conducted on the theme of organized crime. Researchers have considered a variety of typologies of organized crime groups, discussed whether crime groups are organized or disorganized in nature, and provided evidence of organized crime through the use of case studies. This paper reviews previous literature in the domain of organized crime, taking the criminological view in focusing on transnational organized crime. The contribution of this article is in positing that modern day transnational organized crime groups can be likened to adaptive supply chain networks in electronic businesses that have the ability to deliver just-in-time processes and products. In essence, supply chains are the ideal metaphor to study organized crime groups that span several countries, where crime is conducted at a local level within a geographic region that has transnational implications in an end-to-end network. To some degree, organized crime group structures have evolved at the same pace as communications technologies. The internetworking paradox demonstrates how transnational organized crime groups now follow their medium of choice, the Internet, allowing for a seemingly disorganized group of individuals to come together to act in a highly organized and productive manner. In effect online and offline social networks of an illicit type are being facilitated by the growth in new technologies and applications. Furthermore, the wireless Internet has provided an adaptive capability that grants members of illicit networks additional stealth in carrying out criminal activities in a just-in-time mode of operation.","PeriodicalId":180420,"journal":{"name":"2022 IEEE International Symposium on Technology and Society (ISTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}