SlideShare a Scribd company logo
1 of 21
Clare Llewellyn
University of Edinburgh
Argumentation on the web - always vulgar
and often convincing?
User Generated Content
Various Conversations
Various Conversations
Main points of discussion:

RM is bad / old / Australian / has power over politicians / owns newspapers

RM does / doesn’t understand the internet

Free content is good / bad

The joke belongs to Tim Vine or Stuart Francis

Wider context discussion – PIPA / SOPA, Levenson Enquiry, phone hacking, TVShack
The Problem
Can we somehow structure this data so we can read it
and add to it at the most relevant point?
Solutions?
Argumentation
A participant makes a claim that represents their position
The participant backs up that claim with evidence
A counter claim challenges the position
The composer of the original claim may evaluate their position.
Claim
Counter Claim
Evidence
Counter Evidence
Evaluation
Macro / Micro Argumentation
Micro-level:
Simple claim
Qualified claim
Grounded claim
Grounded and qualified claim
Non-argumentative moves
Macro-level:
Argument
Counter argument
Integration (reply)
Non-argumentative moves
Weinberger and Fischer (2006)
Methodology*
* Adapted from Bal & Saint-Dizier (2009) and Mochales & Moens (2009, 2011)
1. Identify discussions on different topics
2. Identify spans of text that represent the core points in the discussion
3. Classify into a structure so as to define the relationships between spans of text
4. Present this information to users
Data Sets
Hand annotated corpus of tweets from the London Riots (7729)
www.analysingsocialmedia.org
Comments from the Guardian newspaper (partially hand annotated for topic)
Tweets with the #OR2012 (5416)
• Extract individual discussion
• Unsupervised clustering – very objective
• Selection of algorithm
Unigram / Bigram Frequency
Incremental Clustering
K-means
Topic modelling
Possible tools
NLTK (nltk.org)
Weka (www.cs.waikato.ac.nz/ml/weka/)
Mallet (mallet.cs.umass.edu)
Twitter Workbench (www.analysingsocialmedia.org/projects)
1. Topic Identification
Example Clusters
Topic Modelling Incremental Clustering
Are you doing what a human would do?
Results for comments data:
Evaluation
2. Text Span Identification
Define a set of rules that allows the extraction of macro level argumentation
Annotated text you can use machine learning
Non-annotated you can define rules – is there something specific in the
language that indicates claim / counter claim
Claim
Counter Claim
Rules production
Method:
Rules are a generalisation from a large amount of data (14000 quotes)
Use Words / POS / Negation / Symbols
Use the rules to find this patterns where not explicitly mentioned in text
Examples:
– Before:
• @USERNAME:
– After:
• i don't
• i think you
• PRP VBP RB (Personal Pronoun, Verb singular present, Adverb)
– Both
• START X i 'm not
Tools:
LTT- TTT2 www.ltg.ed.ac.uk/software/
3. Classify into a structure
Method
Based on Rose et al. (2008)
Use supervised machine learning to classify tweets into an argument structure
Using TagHelper tool kit (based on Weka)
– www.cs.cmu.edu/~cprose/TagHelper.html
– LightSide lightsidelabs.com
– Decide on a machine learning algorithm
– Define feature sets
– Train and test
Data Set Tweets
Coded with the classification system:
1. Claim without evidence
2. Claim with evidence
3. Counter-claim without evidence
4. Counter-claim with evidence
5. Implicit request for verification
6. Explicit request for verification
7. Comment
8. Other
Classification – Feature Selection
Features
Unigrams
+ line length
+ POS Bigrams
+ bigrams
+ punctuation
+ stemming
+ no stemming
+ rare words
+ line length, punctuation and rare words
+ no stop list
Algorithms
Support Vector Machine
Decision Tree
Naive Bayes
QUESTIONS?
Clare Llewellyn
University of Edinburgh
c.a.llewellyn@sms.ed.ac.uk

More Related Content

Similar to Clare llewellyn Lasiuk July 5th 2013

The Process of Qualitative Research Methods
The Process of Qualitative Research MethodsThe Process of Qualitative Research Methods
The Process of Qualitative Research Methods
evamaealvarado
 
M-Assessment_D-NDave
M-Assessment_D-NDaveM-Assessment_D-NDave
M-Assessment_D-NDave
David Sugden
 
Ppt feb 7 2014 ss cc research skills
Ppt feb 7 2014 ss cc research skillsPpt feb 7 2014 ss cc research skills
Ppt feb 7 2014 ss cc research skills
primarysource
 
Dbms Cluster 4
Dbms Cluster 4Dbms Cluster 4
Dbms Cluster 4
out2sea5
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
ernestc3
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
cockekeshia
 
E-Mail as Evidence
E-Mail as EvidenceE-Mail as Evidence
E-Mail as Evidence
Dan Michaluk
 

Similar to Clare llewellyn Lasiuk July 5th 2013 (20)

Natural Language Processing, Techniques, Current Trends and Applications in I...
Natural Language Processing, Techniques, Current Trends and Applications in I...Natural Language Processing, Techniques, Current Trends and Applications in I...
Natural Language Processing, Techniques, Current Trends and Applications in I...
 
m-Assessment_Brum_DaveNDanny
m-Assessment_Brum_DaveNDannym-Assessment_Brum_DaveNDanny
m-Assessment_Brum_DaveNDanny
 
The Process of Qualitative Research Methods
The Process of Qualitative Research MethodsThe Process of Qualitative Research Methods
The Process of Qualitative Research Methods
 
Data Science - Experiments
Data Science - ExperimentsData Science - Experiments
Data Science - Experiments
 
M-Assessment_D-NDave
M-Assessment_D-NDaveM-Assessment_D-NDave
M-Assessment_D-NDave
 
Text analysis-semantic-search
Text analysis-semantic-searchText analysis-semantic-search
Text analysis-semantic-search
 
Ppt feb 7 2014 ss cc research skills
Ppt feb 7 2014 ss cc research skillsPpt feb 7 2014 ss cc research skills
Ppt feb 7 2014 ss cc research skills
 
An informatics perspective on argumentation mining - SICSA 2014-07-09
An informatics perspective on argumentation mining - SICSA 2014-07-09An informatics perspective on argumentation mining - SICSA 2014-07-09
An informatics perspective on argumentation mining - SICSA 2014-07-09
 
Data Science Workshop - day 1
Data Science Workshop - day 1Data Science Workshop - day 1
Data Science Workshop - day 1
 
Dbms Cluster 4
Dbms Cluster 4Dbms Cluster 4
Dbms Cluster 4
 
Hypothesis quick overview 2011-10-19
Hypothesis  quick overview 2011-10-19Hypothesis  quick overview 2011-10-19
Hypothesis quick overview 2011-10-19
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
 
Towards Automatic Analysis of Online Discussions among Hong Kong Students
Towards Automatic Analysis of Online Discussions among Hong Kong StudentsTowards Automatic Analysis of Online Discussions among Hong Kong Students
Towards Automatic Analysis of Online Discussions among Hong Kong Students
 
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...3rd Workshop onSocial  Information Retrieval for Technology-Enhanced Learnin...
3rd Workshop on Social Information Retrieval for Technology-Enhanced Learnin...
 
Sirtel Workshop
Sirtel WorkshopSirtel Workshop
Sirtel Workshop
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Foundations presentation siguccs management
Foundations presentation   siguccs managementFoundations presentation   siguccs management
Foundations presentation siguccs management
 
Coiro Online Inquiry Tool 2018
Coiro Online Inquiry Tool 2018Coiro Online Inquiry Tool 2018
Coiro Online Inquiry Tool 2018
 
E-Mail as Evidence
E-Mail as EvidenceE-Mail as Evidence
E-Mail as Evidence
 
Watson DevCon 2016 - From Jeopardy! to the Future
Watson DevCon 2016 - From Jeopardy! to the FutureWatson DevCon 2016 - From Jeopardy! to the Future
Watson DevCon 2016 - From Jeopardy! to the Future
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Clare llewellyn Lasiuk July 5th 2013

  • 1. Clare Llewellyn University of Edinburgh Argumentation on the web - always vulgar and often convincing?
  • 3.
  • 5. Various Conversations Main points of discussion:  RM is bad / old / Australian / has power over politicians / owns newspapers  RM does / doesn’t understand the internet  Free content is good / bad  The joke belongs to Tim Vine or Stuart Francis  Wider context discussion – PIPA / SOPA, Levenson Enquiry, phone hacking, TVShack
  • 6. The Problem Can we somehow structure this data so we can read it and add to it at the most relevant point?
  • 8. Argumentation A participant makes a claim that represents their position The participant backs up that claim with evidence A counter claim challenges the position The composer of the original claim may evaluate their position.
  • 10. Macro / Micro Argumentation Micro-level: Simple claim Qualified claim Grounded claim Grounded and qualified claim Non-argumentative moves Macro-level: Argument Counter argument Integration (reply) Non-argumentative moves Weinberger and Fischer (2006)
  • 11. Methodology* * Adapted from Bal & Saint-Dizier (2009) and Mochales & Moens (2009, 2011) 1. Identify discussions on different topics 2. Identify spans of text that represent the core points in the discussion 3. Classify into a structure so as to define the relationships between spans of text 4. Present this information to users
  • 12. Data Sets Hand annotated corpus of tweets from the London Riots (7729) www.analysingsocialmedia.org Comments from the Guardian newspaper (partially hand annotated for topic) Tweets with the #OR2012 (5416)
  • 13. • Extract individual discussion • Unsupervised clustering – very objective • Selection of algorithm Unigram / Bigram Frequency Incremental Clustering K-means Topic modelling Possible tools NLTK (nltk.org) Weka (www.cs.waikato.ac.nz/ml/weka/) Mallet (mallet.cs.umass.edu) Twitter Workbench (www.analysingsocialmedia.org/projects) 1. Topic Identification
  • 14. Example Clusters Topic Modelling Incremental Clustering
  • 15. Are you doing what a human would do? Results for comments data: Evaluation
  • 16. 2. Text Span Identification Define a set of rules that allows the extraction of macro level argumentation Annotated text you can use machine learning Non-annotated you can define rules – is there something specific in the language that indicates claim / counter claim Claim Counter Claim
  • 17. Rules production Method: Rules are a generalisation from a large amount of data (14000 quotes) Use Words / POS / Negation / Symbols Use the rules to find this patterns where not explicitly mentioned in text Examples: – Before: • @USERNAME: – After: • i don't • i think you • PRP VBP RB (Personal Pronoun, Verb singular present, Adverb) – Both • START X i 'm not Tools: LTT- TTT2 www.ltg.ed.ac.uk/software/
  • 18. 3. Classify into a structure Method Based on Rose et al. (2008) Use supervised machine learning to classify tweets into an argument structure Using TagHelper tool kit (based on Weka) – www.cs.cmu.edu/~cprose/TagHelper.html – LightSide lightsidelabs.com – Decide on a machine learning algorithm – Define feature sets – Train and test
  • 19. Data Set Tweets Coded with the classification system: 1. Claim without evidence 2. Claim with evidence 3. Counter-claim without evidence 4. Counter-claim with evidence 5. Implicit request for verification 6. Explicit request for verification 7. Comment 8. Other
  • 20. Classification – Feature Selection Features Unigrams + line length + POS Bigrams + bigrams + punctuation + stemming + no stemming + rare words + line length, punctuation and rare words + no stop list Algorithms Support Vector Machine Decision Tree Naive Bayes
  • 21. QUESTIONS? Clare Llewellyn University of Edinburgh c.a.llewellyn@sms.ed.ac.uk