online communities-master Subscribe to online communities-master

IN THE NEWS

Jan. 8, 2016

Privacy, security, and trust have long been watchwords in the computer science and computer engineering fields. Generally, however, these groups don’t prioritize how those issues impact users of the technology they create. GSLIS Assistant Professor Masooda Bashir wants to change that. With a background in math, computer science, and psychology, she has long been interested in the human aspects of digital technology.

“Once information is digitized, the security of that information, not to mention its privacy and the trust in that information, becomes very important,” she said. “How do users think and feel about these issues? These are timely topics for an information school.”

Bashir is especially pleased to be affiliated with GSLIS. “Librarians have historically been at the forefront of protecting patron privacy, and guarding intellectual freedom,” she said. “That philosophy is very big in my outlook and my research, and I’m very pleased to be part of that great...

Oct. 30, 2015
Cunningham_Paige_1.JPG

Doctoral student Paige Cunningham will speak at the annual meeting of the History of Education Society, an international organization that encourages teaching of and research in the history of education. The group’s 2015 meeting will be held November 5-8 in St. Louis. Cunningham will present her paper titled, “Learning from PLATO: Lessons in Online Community Building” on November 6.

Abstract: PLATO (Programmed Logic for Automatic Teaching Operations) is a computer-assisted instruction system, first developed at the University of Illinois in 1960. PLATO was originally a solitary experience in which individuals worked at their lessons on a terminal system, but did not interact electronically with other users. Users soon began to modify their computer-mediated reality, creating ways to talk to each other, leave each other messages, and even play games. A set of official communication tools...

Jun. 9, 2015

Assistant Professor Jana Diesner spoke at the ninth International Conference on Web and Social Media (ICWSM) on May 27. Hosted annually by the Association for the Advancement of Artificial Intelligence, ICWSM addresses themes in social and computational sciences related to human social behavior on the web. The 2015 conference was held May 26-29 at the University of Oxford.

Diesner presented research conducted in collaboration with informatics doctoral student Craig Evans and GSLIS doctoral student Jinseok Kim in a talk titled, “Impact of Entity Disambiguation Errors on Social Network Properties.”

May. 15, 2015

Professor Michael Twidale and doctoral candidate Aiko Takazawa spoke on May 14 at the Workshop on Social and Collaborative Information Seeking hosted by the Center for Discrete Mathematics & Theoretical Computer Science at Rutgers University. The workshop brought together multidisciplinary scholars, including innovators in social and collaborative information seeking, with the goal of defining research challenges in the field.

Twidale presented a talk titled, “Searching for Help: How Learning Technologies Involves Collaborative Search.”

Abstract: As computational and informational resources become ever more abundant, we see changes in the way people learn how to use them, adopt, adapt, appropriate, tinker, tailor, combine. and modify them. Examples include software developers who search as they code, and data scientists going online to get ideas for how best to clean,...

Nov. 6, 2014

The National Science Foundation recently featured current research about cybersecurity education programs, one of which is co-led by GSLIS Assistant Professor Masooda Bashir.

The Illinois Cyber Security Scholars Program (ICSSP) is funded by the NSF and teaches students how to protect the nation’s cyber infrastructure by designing more secure systems and methodologies, as well as better cyber policy. Bashir works closely with students in the program as well as with agencies and laboratories who provide student internships. The lead researcher on the grant is Roy Campbell, professor of computer science.

Co-PI Masooda Bashir says digital forensics gets to the heart of the multidisciplinary nature of cybersecurity.

"If you think about the amount of digital information that is being generated, exchanged, and stored daily you begin to understand the impact that the field of Digital...

Oct. 14, 2014

Update: Organisciak, Teevan, Dumais, Miller, and Kalai received the Notable Paper Award at HCOMP 2014 for the following research paper.

The New Scientist recently featured research on crowdsourcing conducted by doctoral candidate Peter Organisciak. The article, “Online crowd can guess what you want to watch or buy,” highlighted research conducted by Organisciak and a team of researchers from Microsoft Research and MIT including Jaime Teevan (Microsoft Research); Susan Dumais (Microsoft Research); Robert Miller (MIT CSAIL); Adam Kalai (Microsoft Research).

Currently, most online prediction models use algorithms that need a lot of data to make suggestions to a user. In certain instances, however, there isn’t enough data to make those algorithms work. Organisciak and the team turned to crowdsourcing by online workers to...

Oct. 13, 2014

GSLIS Assistant Professor Masooda Bashir is hosting renowned privacy scholar Daniel J. Solove when he visits campus to deliver a public talk, “Privacy, the Consent Dilemma, and the Problem of Defining Harm,” on October 14 at 3:00 p.m. The lecture is part of the Information Trust Institute’s Distinguished Lecture Series. Bashir also serves as assistant professor in the Information Trust Institute at the College of Engineering.

In this talk, Professor Solove will examine some of the challenging issues that privacy regulation must face in the years to come.  Much regulation of privacy seeks to facilitate what Solove refers to as “privacy self-management,” which involves providing people with control over their personal data, and allowing them to decide for themselves about how to weigh the costs and benefits of the collection, use, or disclosure of their information.  The problem is that in many circumstances, privacy self-management does not work and likely cannot be made to...

Pages