-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathPythonIntroBook.bib
More file actions
311 lines (294 loc) · 27.3 KB
/
PythonIntroBook.bib
File metadata and controls
311 lines (294 loc) · 27.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
@article{cirillo_sex_2020,
title = {Sex and gender differences and biases in artificial intelligence for biomedicine and healthcare},
volume = {3},
copyright = {2020 The Author(s)},
issn = {2398-6352},
url = {https://www.nature.com/articles/s41746-020-0288-5},
doi = {10.1038/s41746-020-0288-5},
abstract = {Precision Medicine implies a deep understanding of inter-individual differences in health and disease that are due to genetic and environmental factors. To acquire such understanding there is a need for the implementation of different types of technologies based on artificial intelligence (AI) that enable the identification of biomedically relevant patterns, facilitating progress towards individually tailored preventative and therapeutic interventions. Despite the significant scientific advances achieved so far, most of the currently used biomedical AI technologies do not account for bias detection. Furthermore, the design of the majority of algorithms ignore the sex and gender dimension and its contribution to health and disease differences among individuals. Failure in accounting for these differences will generate sub-optimal results and produce mistakes as well as discriminatory outcomes. In this review we examine the current sex and gender gaps in a subset of biomedical technologies used in relation to Precision Medicine. In addition, we provide recommendations to optimize their utilization to improve the global health and disease landscape and decrease inequalities.},
language = {en},
number = {1},
urldate = {2021-05-24},
journal = {NPJ Digital Medicine},
author = {Cirillo, Davide and Catuara-Solarz, Silvina and Morey, Czuee and Guney, Emre and Subirats, Laia and Mellino, Simona and Gigante, Annalisa and Valencia, Alfonso and Rementeria, María José and Chadha, Antonella Santuccione and Mavridis, Nikolaos},
month = jun,
year = {2020},
note = {Number: 1
Publisher: Nature Publishing Group},
pages = {1--11},
annote = {Used-RPD Prob. Statement
No data collection/analysis - not allowed in Lit Review},
file = {Full Text PDF:/home/readda/Zotero/storage/EHQHQ2TD/Cirillo et al. - 2020 - Sex and gender differences and biases in artificia.pdf:application/pdf;Snapshot:/home/readda/Zotero/storage/25ANPWQZ/s41746-020-0288-5.html:text/html},
}
@misc{fennelly_for_2021,
title = {For {AI} to be effective in healthcare, gender bias must be addressed},
url = {https://www.siliconrepublic.com/innovation/ai-healthcare-gender-bias},
abstract = {Researcher Orna Fennelly discusses the benefits that AI can bring to the healthcare sector once gender bias is tackled first.},
language = {en},
urldate = {2021-05-24},
journal = {Silicon Republic},
author = {Fennelly, Orna},
month = mar,
year = {2021},
file = {Snapshot:/home/readda/Zotero/storage/IC9ZCD8M/ai-healthcare-gender-bias.html:text/html},
}
@article{wiens_diagnosing_2020,
title = {Diagnosing bias in data-driven algorithms for healthcare.},
volume = {26},
issn = {10788956},
url = {http://go.gale.com/ps/i.do?p=AONE&sw=w&issn=10788956&v=2.1&it=r&id=GALE%7CA611371145&sid=googleScholar&linkaccess=abs},
doi = {10.1038/s41591-019-0726-6},
language = {English},
number = {1},
urldate = {2022-01-04},
journal = {Nature Medicine},
author = {Wiens, Jenna and W. Nicholson Price, I. I. and Sjoding, Michael W.},
month = jan,
year = {2020},
note = {Publisher: Nature Publishing Group},
pages = {25--27},
file = {Snapshot:/home/readda/Zotero/storage/UFTSLSLZ/i.html:text/html;Wiens et al. - 2020 - Diagnosing bias in data-driven algorithms for heal.PDF:/home/readda/Zotero/storage/UJMD5WTB/Wiens et al. - 2020 - Diagnosing bias in data-driven algorithms for heal.PDF:application/pdf},
}
@article{zhou_survey_2020,
title = {A survey of fake news: {Fundamental} theories, detection methods, and opportunities},
volume = {53},
issn = {0360-0300},
shorttitle = {A survey of fake news},
url = {http://doi.org/10.1145/3395046},
doi = {10.1145/3395046},
abstract = {The explosive growth in fake news and its erosion to democracy, justice, and public trust has increased the demand for fake news detection and intervention. This survey reviews and evaluates methods that can detect fake news from four perspectives: the false knowledge it carries, its writing style, its propagation patterns, and the credibility of its source. The survey also highlights some potential research tasks based on the review. In particular, we identify and detail related fundamental theories across various disciplines to encourage interdisciplinary research on fake news. It is our hope that this survey can facilitate collaborative efforts among experts in computer and information sciences, social sciences, political science, and journalism to research fake news, where such efforts can lead to fake news detection that is not only efficient but, more importantly, explainable.},
number = {5},
urldate = {2022-01-04},
journal = {ACM Computing Surveys},
author = {Zhou, Xinyi and Zafarani, Reza},
month = sep,
year = {2020},
keywords = {deception detection, disinformation, fact-checking, Fake news, information credibility, knowledge graph, misinformation, news verification, social media},
pages = {109:1--109:40},
file = {Full Text PDF:/home/readda/Zotero/storage/LQMVCNC5/Zhou and Zafarani - 2020 - A Survey of Fake News Fundamental Theories, Detec.pdf:application/pdf},
}
@article{vinichenko_threats_2021,
title = {Threats and risks from the digitalization of society and artificial intelligence: {Views} of generation {Z} students},
volume = {8},
issn = {2313-626X},
shorttitle = {Threats and risks from the digitalization of society and artificial intelligence},
url = {http://www.science-gate.com/IJAAS/2021/V8I10/1021833ijaas202110012.html},
doi = {10.21833/ijaas.2021.10.012},
abstract = {The aim of this article was to identify the nature of threats and risks for people and society from the digitalization of...},
language = {en},
number = {10},
urldate = {2022-01-04},
journal = {International Journal of Advanced and Applied Sciences},
author = {Vinichenko, Mikhail V. and Nikiporets-Takigawa, Galina Yu. and Chulanova, Oksana L. and Ljapunova, Natalia V.},
month = oct,
year = {2021},
note = {Publisher: IASE},
pages = {108--115},
file = {Full Text PDF:/home/readda/Zotero/storage/JH5XHRM8/2021 - Threats and risks from the digitalization of socie.pdf:application/pdf;Snapshot:/home/readda/Zotero/storage/KFWJEA5B/1021833ijaas202110012.html:text/html},
}
@phdthesis{read_why_nodate,
address = {United States -- Texas},
type = {Ed.{D}.},
title = {Why women go elsewhere: {A} phenomenological study of women's underrepresentation in computer science},
copyright = {Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.},
abstract = {Women earn less than 25\% of undergraduate computer science (CS) degrees and
hold less than 25\% of CS jobs (National Center for Science and Engineering Statistics,
2019; U.S. Bureau of Labor Statistics, 2021). However, they earn over 50\% of all
undergraduate degrees and hold over 50\% of professional jobs in other disciplines
(National Center for Science and Engineering Statistics, 2019; U.S. Bureau of Labor
Statistics, 2021). Women are underrepresented in CS throughout its specialties, including
design, development, data mining, and management (U.S. Bureau of Labor Statistics,
2021). Women’s absence creates a void where their needs are not considered and are left
unmet across industries that manage broad aspects of people's lives, including their
security, utilities, and finances (Miner et al., 2016). Medical systems, designed and tested
from a male-centric perspective, misdiagnose women, often leading to delays in
treatment and poorer outcomes (Cirillo et al., 2020). Research indicates that multiple
factors drive women’s absence from CS, dissuading some from considering a CS career and leading others to abandon a CS program quickly (Cheryan et al., 2009; Cortland,
2019; Sax, Lehman, et al., 2016). This prevalent and ongoing issue harms society and
women.
This study uses Bronfenbrenner’s ecological systems framework
(Bronfenbrenner, 1979) to explore the reasons for women’s attitudes toward CS. By
combining their life experiences in context with their thoughts about CS, the research highlights explicit connections between feelings about CS and the sources and drivers of
those feelings. These connections inform the design of interventions and programs to
help women appreciate the importance and value of a CS career and realize that their
participation is vital to creating and integrating technology into society in ways that
benefit all people.},
language = {English},
urldate = {2023-01-04},
school = {Baylor University},
author = {Read, David S.},
keywords = {African American, College, Education, Inequality, Race, Social sciences, STEM},
annote = {Master's thesis. Qual study, constant comparative analysis, using Bronfenbrenner as lens for evaluating data from interviews. Looking at why "African American males capable of pursuing STEM decide to leave of avoid them"
},
file = {Full Text PDF:/home/readda/Zotero/storage/FEREYWDH/Bailey - A Closer Look into Why African American Men Leave .pdf:application/pdf},
}
@article{ma_machine_2020,
title = {Machine learning and {AI} in marketing – {Connecting} computing power to human insights},
volume = {37},
issn = {0167-8116},
url = {https://www.sciencedirect.com/science/article/pii/S0167811620300410},
doi = {10.1016/j.ijresmar.2020.04.005},
abstract = {Artificial intelligence (AI) agents driven by machine learning algorithms are rapidly transforming the business world, generating heightened interest from researchers. In this paper, we review and call for marketing research to leverage machine learning methods. We provide an overview of common machine learning tasks and methods, and compare them with statistical and econometric methods that marketing researchers traditionally use. We argue that machine learning methods can process large-scale and unstructured data, and have flexible model structures that yield strong predictive performance. Meanwhile, such methods may lack model transparency and interpretability. We discuss salient AI-driven industry trends and practices, and review the still nascent academic marketing literature which uses machine learning methods. More importantly, we present a unified conceptual framework and a multi-faceted research agenda. From five key aspects of empirical marketing research: method, data, usage, issue, and theory, we propose a number of research priorities, including extending machine learning methods and using them as core components in marketing research, using the methods to extract insights from large-scale unstructured, tracking, and network data, using them in transparent fashions for descriptive, causal, and prescriptive analyses, using them to map out customer purchase journeys and develop decision-support capabilities, and connecting the methods to human insights and marketing theories. Opportunities abound for machine learning methods in marketing, and we hope our multi-faceted research agenda will inspire more work in this exciting area.},
language = {en},
number = {3},
urldate = {2022-06-07},
journal = {International Journal of Research in Marketing},
author = {Ma, Liye and Sun, Baohong},
month = sep,
year = {2020},
keywords = {Machine learning, Unstructured data, Artificial intelligence (AI), Big data, Digital marketing, Interpretation, Marketing theory, Network, Prediction, Tracking data},
pages = {481--504},
file = {Ma and Sun - 2020 - Machine learning and AI in marketing – Connecting .pdf:/home/readda/Zotero/storage/88GN8SND/Ma and Sun - 2020 - Machine learning and AI in marketing – Connecting .pdf:application/pdf;ScienceDirect Snapshot:/home/readda/Zotero/storage/F8RJSUGR/S0167811620300410.html:text/html},
}
@article{bi_what_2019,
title = {What is machine learning? {A} primer for the epidemiologist},
volume = {188},
issn = {0002-9262},
shorttitle = {What is machine learning?},
url = {https://doi.org/10.1093/aje/kwz189},
doi = {10.1093/aje/kwz189},
abstract = {Machine learning is a branch of computer science that has the potential to transform epidemiologic sciences. Amid a growing focus on “Big Data,” it offers epidemiologists new tools to tackle problems for which classical methods are not well-suited. In order to critically evaluate the value of integrating machine learning algorithms and existing methods, however, it is essential to address language and technical barriers between the two fields that can make it difficult for epidemiologists to read and assess machine learning studies. Here, we provide an overview of the concepts and terminology used in machine learning literature, which encompasses a diverse set of tools with goals ranging from prediction to classification to clustering. We provide a brief introduction to 5 common machine learning algorithms and 4 ensemble-based approaches. We then summarize epidemiologic applications of machine learning techniques in the published literature. We recommend approaches to incorporate machine learning in epidemiologic research and discuss opportunities and challenges for integrating machine learning and existing epidemiologic research methods.},
number = {12},
urldate = {2022-06-07},
journal = {American Journal of Epidemiology},
author = {Bi, Qifang and Goodman, Katherine E and Kaminsky, Joshua and Lessler, Justin},
month = dec,
year = {2019},
pages = {2222--2239},
file = {Full Text PDF:/home/readda/Zotero/storage/FXQ3J6AQ/Bi et al. - 2019 - What is Machine Learning A Primer for the Epidemi.pdf:application/pdf;Snapshot:/home/readda/Zotero/storage/7ETY548L/5567515.html:text/html},
}
@article{de-sola_gutierrez_cell-phone_2016,
title = {Cell-phone addiction: {A} review},
volume = {7},
issn = {1664-0640},
shorttitle = {Cell-phone addiction},
url = {https://www.frontiersin.org/article/10.3389/fpsyt.2016.00175},
abstract = {We present a review of the studies that have been published about addiction to cell phones. We analyze the concept of cell-phone addiction as well as its prevalence, study methodologies, psychological features, and associated psychiatric comorbidities. Research in this field has generally evolved from a global view of the cell phone as a device to its analysis via applications and contents. The diversity of criteria and methodological approaches that have been used is notable, as is a certain lack of conceptual delimitation that has resulted in a broad spread of prevalent data. There is a consensus about the existence of cell-phone addiction, but the delimitation and criteria used by various researchers vary. Cell-phone addiction shows a distinct user profile that differentiates it from Internet addiction. Without evidence pointing to the influence of cultural level and socioeconomic status, the pattern of abuse is greatest among young people, primarily females. Intercultural and geographical differences have not been sufficiently studied. The problematic use of cell phones has been associated with personality variables, such as extraversion, neuroticism, self-esteem, impulsivity, self-identity, and self-image. Similarly, sleep disturbance, anxiety, stress, and, to a lesser extent, depression, which are also associated with Internet abuse, have been associated with problematic cell-phone use. In addition, the present review reveals the coexistence relationship between problematic cell-phone use and substance use such as tobacco and alcohol.},
urldate = {2022-06-07},
journal = {Frontiers in Psychiatry},
author = {De-Sola Gutiérrez, José and Rodríguez de Fonseca, Fernando and Rubio, Gabriel},
year = {2016},
file = {Full Text PDF:/home/readda/Zotero/storage/5XMPSILT/De-Sola Gutiérrez et al. - 2016 - Cell-Phone Addiction A Review.pdf:application/pdf},
}
@article{dienlin_is_2015,
title = {Is the privacy paradox a relic of the past? {An} in-depth analysis of privacy attitudes and privacy behaviors},
volume = {45},
issn = {00462772},
shorttitle = {Is the privacy paradox a relic of the past?},
url = {http://ezproxy.baylor.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=pbh&AN=102271752&site=ehost-live&scope=site},
doi = {10.1002/ejsp.2049},
abstract = {The privacy paradox states that online privacy concerns do not sufficiently explain online privacy behaviors on social network sites (SNSs). In this study, it was first asked whether the privacy paradox would still exist when analyzed as in prior research. Second, it was hypothesized that the privacy paradox would disappear when analyzed in a new approach. The new approach featured a multidimensional operationalization of privacy by differentiating between informational, social, and psychological privacy. Next to privacy concerns, also, privacy attitudes and privacy intentions were analyzed. With the aim to improve methodological aspects, all items were designed on the basis of the theory of planned behavior. In an online questionnaire with N = 595 respondents, it was found that online privacy concerns were not significantly related to specific privacy behaviors, such as the frequency or content of disclosures on SNSs (e.g., name, cell-phone number, or religious views). This demonstrated that the privacy paradox still exists when it is operationalized as in prior research. With regard to the new approach, all hypotheses were confirmed: Results showed both a direct relation and an indirect relation between privacy attitudes and privacy behaviors, the latter mediated by privacy intentions. In addition, also an indirect relation between privacy concerns and privacy behaviors was found, mediated by privacy attitudes and privacy intentions. Therefore, privacy behaviors can be explained sufficiently when using privacy attitudes, privacy concerns, and privacy intentions within the theory of planned behavior. The behaviors of SNS users are not as paradoxical as was once believed. Copyright © 2014 John Wiley \& Sons, Ltd.},
number = {3},
urldate = {2022-06-07},
journal = {European Journal of Social Psychology},
author = {Dienlin, Tobias and Trepte, Sabine},
month = apr,
year = {2015},
note = {Publisher: John Wiley \& Sons, Inc.},
keywords = {PSYCHOLOGY, DATA analysis software, DESCRIPTIVE statistics, ATTITUDE (Psychology), CHI-squared test, CONFIDENCE intervals, MEDICAL ethics, ODDS ratio, PLANNED behavior theory, PRIVACY, REGRESSION analysis, SELF-disclosure, SOCIAL media, STRUCTURAL equation modeling},
pages = {285--297},
file = {Dienlin and Trepte - 2015 - Is the privacy paradox a relic of the past An in-.pdf:/home/readda/Zotero/storage/QUBXAG7D/Dienlin and Trepte - 2015 - Is the privacy paradox a relic of the past An in-.pdf:application/pdf},
}
@article{berners-lee_we_2014,
title = {We need a {Magna} {Carta} for the {Internet}},
volume = {31},
issn = {1540-5842},
url = {http://onlinelibrary.wiley.com/doi/abs/10.1111/npqu.11475},
doi = {10.1111/npqu.11475},
language = {en},
number = {3},
urldate = {2022-06-07},
journal = {New Perspectives Quarterly},
author = {Berners-Lee, Tim},
year = {2014},
note = {\_eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/npqu.11475},
pages = {39--41},
file = {Full Text PDF:/home/readda/Zotero/storage/E9AZU8PK/Berners-Lee - 2014 - We Need a Magna Carta for the Internet.pdf:application/pdf;Snapshot:/home/readda/Zotero/storage/AUK947UK/npqu.html:text/html},
}
@misc{noauthor_resource_nodate,
title = {Resource description framework ({RDF}): {Concepts} and abstract syntax},
url = {https://www.w3.org/TR/rdf-concepts/},
urldate = {2022-06-07},
file = {Resource Description Framework (RDF)\: Concepts and Abstract Syntax:/home/readda/Zotero/storage/IBKE4GKM/rdf-concepts.html:text/html},
}
@article{chalaby_television_2016,
title = {Television and globalization: {The} {TV} content global value chain},
volume = {66},
issn = {00219916},
shorttitle = {Television and globalization},
url = {http://ezproxy.baylor.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=ufh&AN=113138492&site=ehost-live&scope=site},
doi = {10.1111/jcom.12203},
abstract = {This study uses the global value chain ( GVC) framework to analyze the globalization of television and argues that it has been driven by the dynamics of a newly formed TV content value chain. Distinct segments emerged as the chain globalized and firms sought a competitive advantage by expanding internationally within their sector. This article focuses on four dimensions of the TV content value chain and, documenting the growth of transnational TV networks and formats, argues that the TV industry's millennial global shift was triggered by internationalization of the chain's segments. Finally, it suggests that industry conglomeration should be comprehended in the context of Internet disruption and international fragmentation of production within expanding value chains.},
number = {1},
urldate = {2022-06-07},
journal = {Journal of Communication},
author = {Chalaby, Jean K.},
month = feb,
year = {2016},
note = {Publisher: Oxford University Press / USA},
keywords = {Broadcasting Policy, Cross-Border TV Networks, Cross‐Border TV Networks, Global Value Chain Analysis, Globalization, International Fragmentation of Production, Internet Disruption, Mass media research, Media Globalization, OTT Platforms, Television broadcasting policy, Television broadcasting research, Trade Integration, Transnational television, Transnational Television, TV Content Global Value Chain, TV Formats, Value chains},
pages = {35--59},
file = {Accepted Version:/home/readda/Zotero/storage/AFMHN4JI/Chalaby - 2016 - Television and Globalization The TV Content Globa.pdf:application/pdf},
}
@article{berners-lee_world-wide_2010,
title = {World-wide web: {The} information universe},
volume = {20},
copyright = {Copyright Emerald Group Publishing Limited 2010},
issn = {10662243},
shorttitle = {World-wide web},
url = {https://www.proquest.com/docview/578103687/abstract/84A7534ED9F64921PQ/1},
doi = {https://doi.org/10.1108/10662241011059471},
abstract = {The World-Wide Web (W3) initiative is a practical project designed to bring a global information universe into existence using available technology. This paper seeks to describe the aims, data model, and protocols needed to implement the web and to compare them with various contemporary systems. Since Vannevar Bush's article, men have dreamed of extending their intellect by making their collective knowledge available to each individual by using machines. Computers provide us two practical techniques for human-knowledge interface. One is hypertext, in which links between pieces of text (or other media) mimic human association of ideas. The other is text retrieval, which allows associations to be deduced from the content of text. The W3 ideal world allows both operations and provides access from any browsing platform. Various server gateways to other information systems have been produced, and the total amount of information available on the web is becoming very significant, especially since it includes all anonymous FTP archives, WAIS servers, and Gopher servers as well as specific W3 servers. The paper notices that a W3 server could provide the functions of each of these servers, and so it looks forward to a single protocol that can be used by the whole community.},
language = {English},
number = {4},
urldate = {2022-06-07},
journal = {Internet Research},
author = {Berners-Lee, Tim and Cailliau, Robert and Groff, Jean-François and Pollermann, Bernd},
year = {2010},
note = {Num Pages: 461-471
Place: Bradford, United Kingdom
Publisher: Emerald Group Publishing Limited},
keywords = {Studies, Servers, Information systems, Access to information, Books, Computers--Internet, Data models, Information retrieval, Internet, Names, Publishing, Search engines, User interface, World Wide Web},
pages = {461--471},
file = {Full Text PDF:/home/readda/Zotero/storage/UKNNSS97/Berners-Lee et al. - 2010 - World-wide web the information universe.pdf:application/pdf;World-wide_web_the_informatio.pdf:/home/readda/Zotero/storage/DVRN6XQS/World-wide_web_the_informatio.pdf:application/pdf},
}
@article{mcneff_global_2002,
title = {The global positioning system},
volume = {50},
issn = {1557-9670},
doi = {10.1109/22.989949},
abstract = {The paper provides a top-level perspective on how the global positioning system works, how its services are used, and delves into the most important technical and geo-political factors affecting its long-term availability in an international setting.},
number = {3},
journal = {IEEE Transactions on Microwave Theory and Techniques},
author = {McNeff, J.G.},
month = mar,
year = {2002},
note = {Conference Name: IEEE Transactions on Microwave Theory and Techniques},
keywords = {Humans, Atomic measurements, Availability, Extraterrestrial measurements, Global Positioning System, Position measurement, Satellite navigation systems, Synchronization, Time measurement, Timing},
pages = {645--652},
file = {IEEE Xplore Abstract Record:/home/readda/Zotero/storage/2GK56KXI/989949.html:text/html;IEEE Xplore Full Text PDF:/home/readda/Zotero/storage/T84M3DIW/McNeff - 2002 - The global positioning system.pdf:application/pdf},
}
@incollection{koya_measuring_2020,
address = {New York, NY, USA},
series = {{APIT} 2020},
title = {Measuring impact of academic research in computer and information science on society},
isbn = {978-1-4503-7685-3},
url = {http://doi.org/10.1145/3379310.3379312},
abstract = {Academic research in computer \& information science (CIS) has contributed immensely to all aspects of society. As academic research today is substantially supported by various government sources, recent political changes have created ambivalence amongst academics about the future of research funding. With uncertainty looming, it is important to develop a framework to extract and measure the information relating to impact of CIS research on society to justify public funding, and demonstrate the actual contribution and impact of CIS research outside academia. A new method combining discourse analysis and text mining of a collection of over 1000 pages of impact case study documents written in free-text format for the Research Excellence Framework (REF) 2014 was developed in order to identify the most commonly used categories or headings for reporting impact of CIS research by UK Universities (UKU). According to the research reported in REF2014, UKU acquired 83 patents in various areas of CIS, created 64 spin-offs, generated £857.5 million in different financial forms, created substantial employment, reached over 6 billion users worldwide and has helped save over £1 billion Pounds due to improved processes etc. to various sectors internationally, between 2008 and 2013.},
urldate = {2022-06-07},
booktitle = {Proceedings of the 2020 2nd {Asia} {Pacific} information technology conference},
publisher = {Association for Computing Machinery},
author = {Koya, Kushwanth and Chowdhury, Gobinda},
month = jan,
year = {2020},
keywords = {computer science, information science, research funding, research impact},
pages = {78--85},
file = {Full Text PDF:/home/readda/Zotero/storage/EKHBTIU7/Koya and Chowdhury - 2020 - Measuring Impact of Academic Research in Computer .pdf:application/pdf},
}
@misc{noauthor_computer_nodate,
title = {Computer science: {Definition} and meaning},
url = {https://www.merriam-webster.com/dictionary/computer%20science},
urldate = {2023-01-08},
journal = {Merriam-Webster},
file = {Computer science Definition & Meaning - Merriam-Webster:/home/readda/Zotero/storage/VYNBIN9M/computer science.html:text/html},
}