Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Cecilia G. Manrique
University of Wisconsin - La Crosse
La Crosse, Wisconsin
 

Cecilia G. Manrique is a full professor who teaches in the Political Science/Public Administration and Women’s Studies Departments at the University of Wisconsin-La Crosse. She received her doctorate in Political Science from the University of Notre Dame. After receiving her doctorate degree, she obtained a Bachelor of Science degree in Computer Science from Quincy University. Her areas of specialization are comparative politics and international relations, especially regarding the developing world. She has published in the fields of immigration and incorporating technology in the political science classroom. She is the author of The Houghton Mifflin Guide to the Internet for Political Science, which is in its second edition. Her most recent publications include a co-authored book with Gabriel Manrique of Winona State University, The Multicultural or Immigrant Faculty in American Higher Education, and a chapter in the book Women Faculty of Color in the White Classroom.

She has been a member of the American Political Science Association (APSA) since 1988, was past President of the Computers and Multimedia Section (now the Information Technology and Politics section) of APSA, and has been Treasurer of the section since 1995. She also serves as Treasurer of the Wisconsin Political Science Association.

Manrique was named University of Wisconsin System Woman of Color in 1996 and YWCA Coulee Region Outstanding Woman in 1997. She has also been twice named Outstanding Advisor for the Central and Northern regions for her work with the University of Wisconsin-La Crosse chapter of the Golden Key International Honour Society, and named Outstanding Advisor several times at the campus Celebration of Involvement. She is currently serving a second three-year term as Secretary of Golden Key’s International Leadership Council.


     

Identifying informative tweets during a pandemic via a topic-aware neural language model
Gao W., Li L., Tao X., Zhou J., Tao J. World Wide Web 2655-70, 2023.  Type: Article

Years ago, when Twitter was a new social media tool, I reviewed an article for Computing Reviews that looked at how tweets can be used in emergency situations. This new paper follows along similar lines: Twitter can be used to help with spe...

 

Website visual design qualities: a threefold framework
Hartono E., Holsapple C. ACM Transactions on Management Information Systems 10(1): 1-21, 2019.  Type: Article

This work contributes to the literature on information systems by studying a theoretical perspective “that integrates three [major] dimensions of artifact visual design quality”: the aesthetic, functional, and symbo...

 

 Toward effective robot-child tutoring: internal motivation, behavioral intervention, and learning outcomes
Ramachandran A., Huang C., Scassellati B. ACM Transactions on Interactive Intelligent Systems 9(1): 1-23, 2019.  Type: Article

Are robots effective learning tools for children? This paper hopes to answer this question. However, the study seems to raise more questions than it answers due to its short time frame (two weeks) and limited participation (29 students...

 

 Coders: the making of a new tribe and the remaking of the world
Thompson C., Penguin Books, New York, NY, 2019. 448 pp.  Type: Book (978-0-735220-56-0), Reviews: (2 of 2)

As someone who obtained a computer science (CS) degree after finishing a doctorate in political science in the 1980s, I took a walk down memory lane with this book. It was fun to reminisce using the author’s four waves of cod...

 

Cybersecurity in Nigeria: a case study of surveillance and prevention of digital crime
Iorliam A., Springer International Publishing, New York, NY, 2019. 72 pp.  Type: Book (978-3-030152-09-3)

Many of us have received a message from a “Nigerian prince” or a supposed “friend” in Nigeria. The first one involves an inheritance that the scammer needs to give out right away; in the second, ...

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy