skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Information Ecosystem Threats in Minoritized Communities: Challenges, Open Problems and Research Directions
Journalists, fact-checkers, academics, and community media are overwhelmed in their attempts to support communities suffering from gender-, race- and ethnicity-targeted information ecosystem threats, including but not limited to misinformation, hate speech, weaponized controversy and online-to-offline harassment. Yet, for a plethora of reasons, minoritized groups are underserved by current approaches to combat such threats. In this panel, we will present and discuss the challenges and open problems facing such communities and the researchers hoping to serve them. We will also discuss the current state-of-the-art as well as the most promising future directions, both within IR specifically, across Computer Science more broadly, as well as that requiring transdisciplinary and cross-sectoral collaborations. The panel will attract both IR practitioners and researchers and include at least one panelist outside of IR, with unique expertise in this space.  more » « less
Award ID(s):
2147305
PAR ID:
10438273
Author(s) / Creator(s):
;
Date Published:
Journal Name:
SIGIR '22: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval
Page Range / eLocation ID:
3384 to 3385
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Broadening participation in computing (BPC) has been a key focus of the National Science Foundation (NSF) for over two decades. Its aim is to support students and faculty from historically underrepresented groups, including women, people with disabilities, and certain racial and ethnic groups. Within these communities, the diverse range of gender and sexual identities remains overlooked in computing education research (CER). To address this invisibility, this panel will discuss the benefits of integrating LGBTQIA+ perspectives. The moderator will provide context, define relevant terms, and set ground rules for discussion. The panelists will offer insights from a variety of perspectives, including: a discussion of the policy landscape impacting LGBTQIA+ students and the importance of incorporating their perspectives as researchers and participants; the erasure of queer history in computer science and advocate for LGBTQIA+ inclusion, considering the humanitarian calling for the field and CS educators in our tech-driven world; the current resistance to supporting LGBTQIA+ scholarship in computing, advocating for an inclusive approach; and finally, the experiences of marginalized individuals in CS education and ways to support them, emphasizing inclusivity through storytelling and personal narratives. The panel aims to increase visibility, understanding, and collaboration between the computing education research community and LGBTQIA+ individuals. By acknowledging and integrating diverse perspectives, we can begin to create a more inclusive, equitable computing landscape. 
    more » « less
  2. As computing devices become more commonplace in every day life, we have seen an increase of possible attacks on commercial devices and critical infrastructure. As a result, both academia and industry have proposed solutions to mitigate or outright eliminate the ever expanding set of viable targets. Initially, this resulted in an influx of software-based defenses against these emerging threats. Unfortunately, it was found that software solutions could be bypassed with more advanced attacks and often resulted in high performance overhead. As such, hardware-assisted security defenses have been developed to provide improved security while keeping performance overhead to manageable levels, especially for IoT devices. In this paper, we will provide a survey of prominent hardware-assisted security defenses. We will enumerate the attacks these defenses aim to protect, as well as their effectiveness. We will also discuss the implications in both performance and system design. A comparison between approaches that target the same set of issues, and possible directions for future research will be presented. 
    more » « less
  3. Primate field projects are often under the direction of foreign researchers, who live and work alongside members of local communities. Here we discuss the impact of religion on orangutan research and conservation in Gunung Palung National Park, Indonesia over the past 25 years. We demonstrate how our local staff integrates orangutan conservation with religious practices. This includes sharing Islamic prayers on the responsibility of humans to safeguard nature, and the breaking of the fast during Ramadan with villages that are our conservation partners. Islam prohibits the eating of orangutans (as well as forest pigs). In contrast, the indigenous Dayak communities of Borneo historically do hunt and eat orangutans. This impacts the current orangutan distribution. At the Cabang Panti Research Site we have been recording the presence of hunters within our trail system, as well as the number of gunshots heard, since 2008. We find that there is a significant association between these occurrences and the end of the fasting month of Ramadan. We discuss changing religious values and how increasingly conservative practices affect foreign researchers, particularly women. We also detail how social media can help researchers become better informed about important local issues. For example, through our data collection we became aware that local people may be consuming wild pig meat around religious holidays, potentially unknowingly. Social media made us aware that local communities were concerned about this issue, which also impacts wildlife conservation, and thus we can tailor our outreach efforts to meet this intersection between religion and conservation. Funders: NSF (BCS-1638823, BCS-0936199); National Geographic; USFish/Wildlife (F15AP00812, F13AP00920, 96200-0-G249, 96200-9-G110); Leakey; Disney Wildlife Conservation; Wenner-Gren; Nacey-Maggioncalda; Orangutan Conservancy; Conservation-Food-Health; Woodland Park Zoo; Holloman Price; AZA; Ocean Park Conservation; USAID; Arcus 
    more » « less
  4. As of early 2023, only a limited number of Society of Automotive Engineers (SAE) Level 3 (L3) automated driving systems are available on the market, and they are primarily offered by luxury vehicle brands. SAE L3 automated driving systems are classified as conditional automation (CA), meaning that the vehicle can undertake some well-defined driving tasks under specific conditions, but the driver must be ready to assume control of the vehicle when prompted by the system. It is anticipated that an increasing number of L3 CA systems will be introduced on public roads in the next few years. However, L3 systems pose unique Human Factors (HF) challenges that require thoughtful consideration to ensure that production systems are feasible without compromising driver or road safety. This panel discussion brings together HF researchers and practitioners with expertise in human behavior and usability design for automotive applications to discuss and delineate key issues specifically related to L3 systems, as well as potential approaches to tackle these issues. 
    more » « less
  5. In this panel, the presenters will discuss their collective experience of teaching software engineering courses and/or running software engineering projects that help students learn about and experience the impact of computing on society and the social good. While the benefits of practical experience in software engineering are generally indisputable, the logistics and management of such projects are often discouraging for faculty, leading many to exclude live clients from software engineering courses. The presenters will demystify and discuss the realities of running client-oriented classes and projects in the contexts of our institutions, which vary greatly in size and student demographics and represent both public and private colleges. In particular, we will discuss various approaches used to identify, design, create, and evaluate software engineering projects for societal and social impact. Project duration ranges from one semester to two or more, and participation in team projects is modeled as pre-professional training, complete with software tools, interpersonal dynamics, and evaluation methods. 
    more » « less