Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computational Linguistics | 4 |
Computer Security | 4 |
Computer Software | 3 |
Social Media | 3 |
Accuracy | 2 |
Crime | 2 |
Identification | 2 |
Information Security | 2 |
Natural Language Processing | 2 |
Synchronous Communication | 2 |
Access to Information | 1 |
More ▼ |
Source
Arab World English Journal | 1 |
Association Supporting… | 1 |
IEEE Transactions on Learning… | 1 |
ProQuest LLC | 1 |
Author
Alsager, Haroon Nasser | 1 |
Huaibo Wang | 1 |
Mbaziira, Alex Vincent | 1 |
Qianta Zhu | 1 |
Qinhua Zheng | 1 |
Smith, Peter, Ed. | 1 |
Yishen Song | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Florida | 1 |
Georgia | 1 |
Indiana | 1 |
Kentucky | 1 |
Maryland | 1 |
New Jersey | 1 |
North Carolina | 1 |
Ohio | 1 |
Saudi Arabia | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information