2025 Issues

Volume 6, Issue 3, 2025

Special Issue on AI, Empathy and People

Front Cover

Publication Information

Table of Contents

Editorials

Axis of Access — The Controllers and the Controlled by M. G. Michael and Katina Michael

In This Special Issue: When Attention Is All Marketers Need—Artificial Intelligence in Marketing by Shashank Vaid, Stefano Puntoni, Benson Honig and Katina Michael

Special Issue Papers

Emulated Empathy: Can Risks Be Countered by a Soft-Law Standard? by Andrew McStay
Abstract

Exploring Social Robots for Healthy Older Adults: Aging With Companionship by Jordan Tschida, Katina Michael and Troy McDaniel
Abstract

Compassionate AI Design, Governance, and Use by Raffaele Fabio Ciriello, Angelina Ying Chen and Zara Annette Rubinsztein
Abstract

The Ethics of Empathetic AI in Medicine by E. Selinger and T. Carroll
Abstract

Utilizing Emotional Intelligence and Artificial Intelligence to Improve Safety Behavior in Smart Port Operations by Szu-Yu Kuo and Liang-Bi Chen
Abstract

Facial Emotion Recognition in the Future of Work: Social Implications and Policy Recommendations by Elma Hajric, Farah Najar Arevalo, Leonard Bruce, Fritz Antony Smith and Katina Michael
Abstract

A Neuroscience-Informed AI Framework to Decode the Complexities of Neurofinance by Christos Bormpotsis, Michael Nanos and Asma Patel
Abstract

Defining, Classifying and Identifying Addictive Patterns in Digital Products by Marta Beltrán
Abstract

Volume 6, Issue 2, 2025

Front Cover

Publication Information

Table of Contents

Editorials

George Roussos and Jordan Schoenherr Appointed New EIC/Co-EIC at IEEE TTS 2026–2028  by John Impagliazzo

Editorial: Pride and Jealousy in Academia by Paulo F. Ribeiro; Katina Michael

Special Issue Papers

Locational Data and the Public Interest by Michael Goodchild;Gary M. Langham;Richard Appelbaum;Jeremy Crampton;William A. Herbert;Krzysztof Janowicz;Mei-Po Kwan;Katina Michael;Lisa Schamess

An Ethics Framework for the Internet of Musical Things by James Brusseau;Luca Turchet

Sustainability and the Internet of Sounds: Case Studies by Leonardo Gabrielli;Emanuele Principi;Luca Turchet

The Invisible Arms Race: Digital Trends in Illicit Goods Trafficking and AI-Enabled Responses  by Ioannis Mademlis;Marina Mancuso;Caterina Paternoster;Spyridon Evangelatos;Emma Finlay;Joshua Hughes;Panagiotis Radoglou-Grammatikis;Panagiotis Sarigiannidis;Georgios Stavropoulos;Konstantinos Votis;Georgios Th. Papadopoulos

Measuring Online Hate on 4chan Using Pre-Trained Deep Learning Models by Adrian Bermudez-Villalva;Maryam Mehrnezhad;Ehsan Toreini

Borderline Disaster: An Empirical Study on Student Usage of GenAI in a Law Assignment by Armin Alimardani

Interpretable Machine Learning for Mitigating Feature-Driven Attacks by Corey M. Hartman;Bhaskar P. Rimal

Volume 6, Issue 1, 2025

Front Cover

Publication Information

Table of Contents

Editorial

In This Special Issue: Data Breaches in the Cloud—Business Security and Risk Management by David Kolevski, Katina Michael and Mark Freeman

Special Issue Papers

Artificial Intelligence in Cybersecurity: A Socio-Technical Framing by Katina Michael, Kathleen M. Vogel, Jeremy Pitt, and Mariana Zafeirakopoulos
Abstract

An Intelligent Sociotechnical Systems (iSTS) Framework: Enabling a Hierarchical Human-Centered AI (hHCAI) Approach by Wei Xu and Zaifeng Gao
Abstract

The Tough Sell of Resilience Engineering by Stephen L. Dorton, Glenn J. Lematta, and Kelly J. Neville
Abstract

AI and Big Data: Synergies and Cybersecurity Challenges in Key Sectors by Susan Helser and Mark Hwang
Abstract

What Is So Deep About Deepfakes? A Multi-Disciplinary Thematic Analysis of Academic Narratives About Deepfake
Technology by John Twomey, Didier Ching, Matthew Peter Aylett, Michael Quayle, Conor Linehan, and Gillian Murphy
Abstract

The Cloud Conundrum: Are Financial Institutions Heading for a Catastrophic Disruption Event? by Matthew Ryan, Glenn Withers, and Frank Den Hartog
Abstract

Can I Help Prevent Data Breaches in the Workplace? From Routine Activities to Extra-Role Security Behaviors by Jaeung Lee, Jingguo Wang, Melchor C. de Guzman, Manish Gupta, and H. Raghav Rao
Abstract

Vulnerable Agents and Sustainable Security by P. Chmielewski
Abstract