SlideShare a Scribd company logo
1 of 53
Is It Time For a Career
Switch?
ABSTRACT



Tenure



what to recommend to a user  when to make appropriate recommendations and its
impact on the item selection in the context of a job recommender system



The proportional hazards model, hierarchical Bayesian framework



estimates the likelihood of a user’s decision to make a job transition at a certain
time, which is denoted as the tenure-based decision probability
CONTRIBUTION


Analyze the problem of finding the right time to make recommendations in the job
domain.



Propose using the proportional hazards model to tackle the problem and extend it with
a hierarchical Bayesian framework.



Evaluate the model with a real-world job application data from LinkedIn
RELATED WORK



Major recommendation approaches: content-based filtering and collaborative
filtering



Timeliness



E.g. software engineer – senior software engineer
Method


HIERARCHICAL PROPORTIONAL HAZARDS MODEL



Review of Proportional Hazards Model



Model Extension with Bayesian Framework





Problem Definition

Parameter Estimation

TENURE-BASED DECISION PROBABILITY
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
Goal


Predict the probability that a user makes a decision of item jb at current time tb ,given
that she made the last decision of ja at time ta and she did not make the transition
decision up to time tb .
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL


Review of Proportional Hazards Model



Survival function :determines the failure of an event



Failure: as a user making a decision to transit to a new job
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL


Two common approaches to incorporate covariates x in the hazards model:



Cox proportional hazards model :



Accelerated life model :
Weibull distribution is used for p ( y )

θ
:
Model Extension with Bayesian
Framework

Data sparsity
Parameter Estimation
TENURE-BASED DECISION PROBABILITY
TENURE-BASED DECISION PROBABILITY



Push-based Scenario



Pull-based Scenario
EVALUATION OF HAZARDS MODEL



tenure-based decision probability



predicted decision time



covariates
EVALUATION OF HAZARDS MODEL



Evaluation Metrics


Perplexity/Likelihood



Estimated Decision Time
EVALUATION OF HAZARDS MODEL



Models to Compare



H-One :the hazards model that fits a single set of parameters with no
covariates ;m = {∗ → ∗}



H-Source :the hazards model that fits multiple sets of parameters with no
covariates to the tenure data ;m = { a → ∗}



H-SourceDest :m = { a → b }



H-SourceDestCov : incorporates covariates into the hazards model in HSourceDest .
EVALUATION OF HAZARDS MODEL



covariates



1) about the user u : the user’s gender, age, number of connections, number of
jobs that the user has changed, average months that the user changes a job;



2)about the item ja or jb : discretized company size, the company age



3)about the relationship between ja and jb : the ratio of the company size, the ratio of the
company age; whether j a and j b are in the same function, whether they are in the same
industry;



4)about the user’s aspiration of category b : number of job applications from user u in
category b in the last week, last month, last two months, and last three months.
EVALUATION OF RECOMMENDATION
MODEL


In the Push-Based Scenario
In the Pull-Based Scenario
• BasicModel
• Basic+TranProb
• Basic+TranProb+Tenure
• Basic+TranProb+TenureProb
CONCLUSION


Q: When is the right time to make a job recommendation and how do we
use this inference to improve the utility of a job recommender system?



the hierarchical proportional hazards model



real-world job application data : Linkedin
Is This App Safe for Children? A
Comparison Study
of Maturity Ratings on Android
and iOS Applications
ABSTRACT



we develop mechanisms to verify the maturity ratings of mobile apps and investigate
possible reasons behind the incorrect ratings.
INTRODUCTION



Android maturity rating policy




“Everyone,” “Low Maturity,” “Medium Maturity,” and “High Maturity,”

iOS’s policy


“4+,” “9+,” “12+,” and “17+.”



iOS rates each app submitted according to its own policies



Android apps are purely a result of app developers’ self-report.
INTRODUCTION



Android rating policy is unclear, and it is difficult for developers to understand the
difference between the four maturity-rating levels



Contribution:


We develop a text mining algorithm to automatically predict apps’ actual maturity ratings from
app descriptions and user reviews.



By comparing Android ratings with iOS ratings, we illustrate the percentage of Android apps with
incorrect maturity ratings and examine the types of apps which tend to be misclassified.



We conduct some preliminary analyses to explore the factors that may lead to untruthful
maturity ratings in Android apps.
RESEARCH QUESTIONS



Does iOS rating strictly reflect its policy?



Are app ratings reflected in app descriptions and user reviews? If so, can
we build an effective text mining approach to predict the true rating of an
app?



Do Android developers provide accurate maturity ratings for their own
apps? For apps published in both markets, are Android ratings consistent
with iOS ratings?



What are the factors that could lead to untruthful maturity ratings in
Android apps in comparison to iOS apps?
METHODOLOGY



iOS Maturity Rating Policy vs. Implementation


iOS actually downgrades its official maturity policy during implementation.
Android Apps’ Maturity Ratings
discrepancies
• Android does not consider horror content ( C ) as mature content, while iOS does
include
• Android considers graphic violence ( B3 ) as mature content while iOS directly rejects
apps with graphic violence.
• Android integrates privacy protection in its maturity rating policy by including the
social feature ( I ) and location collection ( J ). However, no corresponding privacyrelated consideration exists in the maturity rating scheme by iOS.
• Frequent/intense cartoon violence and fantasy violence ( A2 ) is rated as “Medium
Maturity” (i.e., level 3) in Android but as “9+” (i.e., level 2) in iOS.
• Frequent/intense simulated gambling ( H2 ) is rated as “High Maturity” (i.e., level 4) in
Android but is rates as “12+” (i.e., level 3) in iOS.
we can now use iOS actual maturity rating as a
baseline to examine the reliability of Android apps’
maturity ratings.
Comparing Apps on iOS and Android



For each Android app, we choose
up to 150 search results from the iOS
App Store. For those showing similar
app names, we conducted analysis
to determine the closest fit.



their descriptions and developers’
company names



apps’ icons and screenshots
ALM—Automatic Label of Maturity
Ratings for Mobile Apps


“Android-only” apps



ALM is a semi-supervised learning algorithm, and it processes apps’ descriptions and
user reviews to determine maturity ratings.

1.

Building seed-lexicons for objectionable content detection

2.

Assigning initial weights to seed-terms

3.

Classification

4.

Expanding seed-lexicons and adjusting weights
1.Building seed-lexicons for
objectionable content detection


Apps are organized based on their rating scheme together with their
corresponding token, such as A1.txt , A2.txt , B1.txt , and H2.txt .



Human experts read grouped app descriptions and select seed
lexicons to detect objectionable content.



grouped into three bigger lexicons denoted as Ti, i∈ 9,12,17 for classifying
the maturity rating: 9+, 12+, and 17+
2.Assigning initial weights to seedterms

Pi, Ni
For each seed-term t, denote its frequency in Pi and Ni as tp and tn
2.Assigning initial weights to seedterms
3.Classification



For each app 4 , all terms in its description are selected and categorized
as a set A=tk



maturity rating ma
4.Expanding seed-lexicons and
adjusting weights
EXPERIMENT

A total of 1,464 apps were found on iOS App Store and the rest 3,595 apps were
classified as Android-only apps.
Experiment 1: Predicting Apps’
Maturity Ratings by the ALM algorithm
Experiment 2: Overrated and
Underrated Android Applications

• overrated
• underrated
Overrated Android Applications



possible reasons


Intelligence



Simulated Gambling



Violence



Mature and Suggestive Themes
Underrated Android Applications
Experiment 3: Exploring Factors
Contributing to Incorrect Ratings


apps’ attributes :
popularity, price, and dangerous level of the required permissions .



Developers’ attributes :
general privacy awareness, trustworthiness, actual privacy
awareness, and child safety awareness .
Conclusion


examine the maturity rating policies on both Android and iOS
platforms



possible reasons behind the incorrect ratings



ALM algorithm

More Related Content

Viewers also liked

Questions about questions
Questions about questionsQuestions about questions
Questions about questionsmoresmile
 
Magnet community identification on social networks
Magnet community identification on social networksMagnet community identification on social networks
Magnet community identification on social networksmoresmile
 
Generating event storylines from microblogs
Generating event storylines from microblogsGenerating event storylines from microblogs
Generating event storylines from microblogsmoresmile
 
Presentation-for-broker
Presentation-for-brokerPresentation-for-broker
Presentation-for-brokerDenis Aristov
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogsmoresmile
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities inmoresmile
 
Topical keyphrase extraction from twitter
Topical keyphrase extraction from twitterTopical keyphrase extraction from twitter
Topical keyphrase extraction from twittermoresmile
 
Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Denis Aristov
 
Презентация CarScan24.ru
Презентация CarScan24.ruПрезентация CarScan24.ru
Презентация CarScan24.ruDenis Aristov
 
When relevance is not enough
When relevance is not enoughWhen relevance is not enough
When relevance is not enoughmoresmile
 
Modul pengukuran. aliran fluida.
Modul   pengukuran. aliran fluida.Modul   pengukuran. aliran fluida.
Modul pengukuran. aliran fluida.bacukids
 
Exploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthExploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthmoresmile
 
Accounting principles
Accounting principlesAccounting principles
Accounting principlescantaboop
 
Event summarization using tweets
Event summarization using tweetsEvent summarization using tweets
Event summarization using tweetsmoresmile
 
Doppler effect experiment and applications
Doppler effect experiment and applicationsDoppler effect experiment and applications
Doppler effect experiment and applicationsmarina fayez
 

Viewers also liked (18)

Doppler
DopplerDoppler
Doppler
 
Questions about questions
Questions about questionsQuestions about questions
Questions about questions
 
Magnet community identification on social networks
Magnet community identification on social networksMagnet community identification on social networks
Magnet community identification on social networks
 
Generating event storylines from microblogs
Generating event storylines from microblogsGenerating event storylines from microblogs
Generating event storylines from microblogs
 
HSI_Intro_Short
HSI_Intro_ShortHSI_Intro_Short
HSI_Intro_Short
 
Presentation-for-broker
Presentation-for-brokerPresentation-for-broker
Presentation-for-broker
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogs
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities in
 
Topical keyphrase extraction from twitter
Topical keyphrase extraction from twitterTopical keyphrase extraction from twitter
Topical keyphrase extraction from twitter
 
Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru
 
Презентация CarScan24.ru
Презентация CarScan24.ruПрезентация CarScan24.ru
Презентация CarScan24.ru
 
When relevance is not enough
When relevance is not enoughWhen relevance is not enough
When relevance is not enough
 
Presentation2
Presentation2Presentation2
Presentation2
 
Modul pengukuran. aliran fluida.
Modul   pengukuran. aliran fluida.Modul   pengukuran. aliran fluida.
Modul pengukuran. aliran fluida.
 
Exploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthExploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouth
 
Accounting principles
Accounting principlesAccounting principles
Accounting principles
 
Event summarization using tweets
Event summarization using tweetsEvent summarization using tweets
Event summarization using tweets
 
Doppler effect experiment and applications
Doppler effect experiment and applicationsDoppler effect experiment and applications
Doppler effect experiment and applications
 

Similar to Is it time for a career switch

IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTtsysglobalsolutions
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET Journal
 
An Approach To Sentiment Analysis
An Approach To Sentiment AnalysisAn Approach To Sentiment Analysis
An Approach To Sentiment AnalysisSarah Morrow
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modelingzakieh alizadeh
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsIRJET Journal
 
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...cscpconf
 
Report of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoReport of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoYifan Guo
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
 
SURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISSURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISIRJET Journal
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Xavier Ochoa
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...IRJET Journal
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Reviewinventionjournals
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataIRJET Journal
 

Similar to Is it time for a career switch (20)

IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
 
An Approach To Sentiment Analysis
An Approach To Sentiment AnalysisAn Approach To Sentiment Analysis
An Approach To Sentiment Analysis
 
Crm updated report
Crm updated reportCrm updated report
Crm updated report
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
 
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
 
Report of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoReport of Previous Project by Yifan Guo
Report of Previous Project by Yifan Guo
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
SURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISSURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSIS
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Review
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Is it time for a career switch

  • 1. Is It Time For a Career Switch?
  • 2. ABSTRACT  Tenure  what to recommend to a user  when to make appropriate recommendations and its impact on the item selection in the context of a job recommender system  The proportional hazards model, hierarchical Bayesian framework  estimates the likelihood of a user’s decision to make a job transition at a certain time, which is denoted as the tenure-based decision probability
  • 3. CONTRIBUTION  Analyze the problem of finding the right time to make recommendations in the job domain.  Propose using the proportional hazards model to tackle the problem and extend it with a hierarchical Bayesian framework.  Evaluate the model with a real-world job application data from LinkedIn
  • 4. RELATED WORK  Major recommendation approaches: content-based filtering and collaborative filtering  Timeliness  E.g. software engineer – senior software engineer
  • 5. Method  HIERARCHICAL PROPORTIONAL HAZARDS MODEL   Review of Proportional Hazards Model  Model Extension with Bayesian Framework   Problem Definition Parameter Estimation TENURE-BASED DECISION PROBABILITY
  • 8. HIERARCHICAL PROPORTIONAL HAZARDS MODEL Goal  Predict the probability that a user makes a decision of item jb at current time tb ,given that she made the last decision of ja at time ta and she did not make the transition decision up to time tb .
  • 9. HIERARCHICAL PROPORTIONAL HAZARDS MODEL  Review of Proportional Hazards Model  Survival function :determines the failure of an event  Failure: as a user making a decision to transit to a new job
  • 10. HIERARCHICAL PROPORTIONAL HAZARDS MODEL  Two common approaches to incorporate covariates x in the hazards model:  Cox proportional hazards model :  Accelerated life model :
  • 11. Weibull distribution is used for p ( y ) θ :
  • 12. Model Extension with Bayesian Framework Data sparsity
  • 13.
  • 16. TENURE-BASED DECISION PROBABILITY  Push-based Scenario  Pull-based Scenario
  • 17. EVALUATION OF HAZARDS MODEL  tenure-based decision probability  predicted decision time  covariates
  • 18. EVALUATION OF HAZARDS MODEL  Evaluation Metrics  Perplexity/Likelihood  Estimated Decision Time
  • 19. EVALUATION OF HAZARDS MODEL  Models to Compare  H-One :the hazards model that fits a single set of parameters with no covariates ;m = {∗ → ∗}  H-Source :the hazards model that fits multiple sets of parameters with no covariates to the tenure data ;m = { a → ∗}  H-SourceDest :m = { a → b }  H-SourceDestCov : incorporates covariates into the hazards model in HSourceDest .
  • 20. EVALUATION OF HAZARDS MODEL  covariates  1) about the user u : the user’s gender, age, number of connections, number of jobs that the user has changed, average months that the user changes a job;  2)about the item ja or jb : discretized company size, the company age  3)about the relationship between ja and jb : the ratio of the company size, the ratio of the company age; whether j a and j b are in the same function, whether they are in the same industry;  4)about the user’s aspiration of category b : number of job applications from user u in category b in the last week, last month, last two months, and last three months.
  • 21.
  • 22.
  • 23.
  • 24. EVALUATION OF RECOMMENDATION MODEL  In the Push-Based Scenario
  • 25.
  • 26. In the Pull-Based Scenario • BasicModel • Basic+TranProb • Basic+TranProb+Tenure • Basic+TranProb+TenureProb
  • 27. CONCLUSION  Q: When is the right time to make a job recommendation and how do we use this inference to improve the utility of a job recommender system?  the hierarchical proportional hazards model  real-world job application data : Linkedin
  • 28. Is This App Safe for Children? A Comparison Study of Maturity Ratings on Android and iOS Applications
  • 29. ABSTRACT  we develop mechanisms to verify the maturity ratings of mobile apps and investigate possible reasons behind the incorrect ratings.
  • 30. INTRODUCTION  Android maturity rating policy   “Everyone,” “Low Maturity,” “Medium Maturity,” and “High Maturity,” iOS’s policy  “4+,” “9+,” “12+,” and “17+.”  iOS rates each app submitted according to its own policies  Android apps are purely a result of app developers’ self-report.
  • 31. INTRODUCTION  Android rating policy is unclear, and it is difficult for developers to understand the difference between the four maturity-rating levels  Contribution:  We develop a text mining algorithm to automatically predict apps’ actual maturity ratings from app descriptions and user reviews.  By comparing Android ratings with iOS ratings, we illustrate the percentage of Android apps with incorrect maturity ratings and examine the types of apps which tend to be misclassified.  We conduct some preliminary analyses to explore the factors that may lead to untruthful maturity ratings in Android apps.
  • 32. RESEARCH QUESTIONS  Does iOS rating strictly reflect its policy?  Are app ratings reflected in app descriptions and user reviews? If so, can we build an effective text mining approach to predict the true rating of an app?  Do Android developers provide accurate maturity ratings for their own apps? For apps published in both markets, are Android ratings consistent with iOS ratings?  What are the factors that could lead to untruthful maturity ratings in Android apps in comparison to iOS apps?
  • 33. METHODOLOGY  iOS Maturity Rating Policy vs. Implementation
  • 34.  iOS actually downgrades its official maturity policy during implementation.
  • 36. discrepancies • Android does not consider horror content ( C ) as mature content, while iOS does include • Android considers graphic violence ( B3 ) as mature content while iOS directly rejects apps with graphic violence. • Android integrates privacy protection in its maturity rating policy by including the social feature ( I ) and location collection ( J ). However, no corresponding privacyrelated consideration exists in the maturity rating scheme by iOS. • Frequent/intense cartoon violence and fantasy violence ( A2 ) is rated as “Medium Maturity” (i.e., level 3) in Android but as “9+” (i.e., level 2) in iOS. • Frequent/intense simulated gambling ( H2 ) is rated as “High Maturity” (i.e., level 4) in Android but is rates as “12+” (i.e., level 3) in iOS.
  • 37. we can now use iOS actual maturity rating as a baseline to examine the reliability of Android apps’ maturity ratings.
  • 38. Comparing Apps on iOS and Android  For each Android app, we choose up to 150 search results from the iOS App Store. For those showing similar app names, we conducted analysis to determine the closest fit.  their descriptions and developers’ company names  apps’ icons and screenshots
  • 39. ALM—Automatic Label of Maturity Ratings for Mobile Apps  “Android-only” apps  ALM is a semi-supervised learning algorithm, and it processes apps’ descriptions and user reviews to determine maturity ratings. 1. Building seed-lexicons for objectionable content detection 2. Assigning initial weights to seed-terms 3. Classification 4. Expanding seed-lexicons and adjusting weights
  • 40. 1.Building seed-lexicons for objectionable content detection  Apps are organized based on their rating scheme together with their corresponding token, such as A1.txt , A2.txt , B1.txt , and H2.txt .  Human experts read grouped app descriptions and select seed lexicons to detect objectionable content.  grouped into three bigger lexicons denoted as Ti, i∈ 9,12,17 for classifying the maturity rating: 9+, 12+, and 17+
  • 41. 2.Assigning initial weights to seedterms Pi, Ni For each seed-term t, denote its frequency in Pi and Ni as tp and tn
  • 43. 3.Classification  For each app 4 , all terms in its description are selected and categorized as a set A=tk  maturity rating ma
  • 45. EXPERIMENT A total of 1,464 apps were found on iOS App Store and the rest 3,595 apps were classified as Android-only apps.
  • 46. Experiment 1: Predicting Apps’ Maturity Ratings by the ALM algorithm
  • 47. Experiment 2: Overrated and Underrated Android Applications • overrated • underrated
  • 48. Overrated Android Applications  possible reasons  Intelligence  Simulated Gambling  Violence  Mature and Suggestive Themes
  • 50. Experiment 3: Exploring Factors Contributing to Incorrect Ratings  apps’ attributes : popularity, price, and dangerous level of the required permissions .  Developers’ attributes : general privacy awareness, trustworthiness, actual privacy awareness, and child safety awareness .
  • 51.
  • 52.
  • 53. Conclusion  examine the maturity rating policies on both Android and iOS platforms  possible reasons behind the incorrect ratings  ALM algorithm