skip to main content


Search for: All records

Award ID contains: 1651969

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available June 12, 2024
  2. Free, publicly-accessible full text available April 30, 2024
  3. Identifying people in photographs is an important task in many fields, including history, journalism, genealogy, and collecting, but accurate person identification remains challenging. Researchers especially struggle with the “last-mile problem” of historical person identification, where they must make a selection among a small number of highly similar candidates. We present SleuthTalk, a web-based collaboration tool integrated into the public website Civil War Photo Sleuth which addresses the last-mile problem in historical person identification by providing support for shortlisting potential candidates from face recognition results, private collaborative workspaces, and structured feedback. 
    more » « less
  4. Identifying historical photographs of people can generate significant cultural and economic value, but misidentifications can cause harms such as falsifying the historical record, spreading disinformation, and feeding conspiracy theories. In this paper, we introduce DoubleCheck, a quality assessment framework based on the concepts of information provenance and stewardship for verifying historical photo identifications. We built and evaluated DoubleCheck on Civil War Photo Sleuth (CWPS), a popular online community dedicated to identifying photos from the American CivilWar era (1861- 65) using facial recognition and crowdsourcing. 
    more » « less
  5. Online extremism can quickly spill over into the physical world and have dangerous consequences, as when rioters attacked the U.S. Capitol on January 6, 2021. While information and communication technologies have enabled extremists to plan and organize violent events, they have also enabled collective action by others to identify the perpetrators and hold them accountable. Through a mixed-methods case study of Sedition Hunters, a Twitter-based community whose goal is to identify individuals who took part in the Capitol attack, we explore: 1) how the community formed and changed over time; 2) the motives, ethos, and roles of its members; and 3) the methods and software tools they used to identify individuals and coordinate their activities. 
    more » « less
  6. null (Ed.)