Panel at Web Intelligence, Dec 4-6, 2018, Santiago Chile
Funding Acknowledgement: Research supported in part by:
NSF Award#: CNS 1513721 TWC SBE: Medium: Context-Aware Harassment Detection on Social Media.
View represented are those of the speaker/author, and not of the sponsor.
The corresponding video is at https://youtu.be/ztNHKLTHBrA AIISC conducts foundational and translational research in AI. In this talk, we review part of the AIISC's research in Social Good, Social Harm, and Public Health.
This talk was given to the UofSC College on Information and Communication.
Additional project details at http://wiki.aiisc.ai
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
https://dbsec2019.cse.sc.edu/Keynote.html
Abstract: As social media permeates our daily life, there has been a sharp rise in the misuse of social media affecting our society in large. Specifically, harassment and radicalization have become two major problems on social media platforms with significant implications on the well-being of individuals as well as communities. A 2017 Pew Research survey on online harassment found that 66% of adult Internet users have observed online harassment and 41% have personally experienced it. Nearly 18% of Americans have faced severe forms of harassment online such as physical threats, harassment over a sustained period, sexual harassment or stalking. Moreover, malicious organizations (e.g., terrorist groups, white nationalists not classified legally as terrorists but as a group with extreme ideology) have been using social media for sharing their propaganda and misinformation to persuade individuals and eventually recruit them to propagate their ideology. These communications related to harassment and radicalization are complex concerning their language and contextual characteristics, making recognition of such narratives challenging for researchers as well as social media companies. As most of the existing approaches fail to capture fundamental nuances in the language of these communications, two prominent challenges have emerged: ambiguity and sparsity. Sole data level bottom-up analysis has been unsuccessful in revealing the actual meaning of the content. Considering the significant sensitivity of these problems and its implications at individual and community levels, a potential solution requires reliable algorithms for modeling such communications.
Our approach to understanding communications between source and target requires deciphering the unique language, semantic and contextual characteristics, including sentiment, emotion, and intention. This context-aware and knowledge-enhanced computational approach to the analysis of these narratives breaks down this long-running and complex process into contextual building blocks that acknowledge inherent ambiguity and sparsity. Based on prior empirical and qualitative research in social sciences, particularly cognitive psychology, and political science, we model this process using a combination of contextual dimensions -- e.g., for Islamist radicalization: religion, ideology, and hate -- each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible.
Quantified Self Ideology: Personal Data becomes Big DataMelanie Swan
A key contemporary trend emerging in big data science is the quantified self: individuals engaged in the deliberate self-tracking of any kind of biological, physical, behavioral, or transactional information, as n=1 individuals or in groups. The quantified self is one dimension of the bigger trend to integrate and apply a variety of personal information streams including big health data (genome, transcriptome, environmentome, diseasome), quantified self data streams (biosensor, fitness, sleep, food, mood, heart rate, glucose tracking, etc.), traditional data streams (personal and family health history, prescription history) and IOT (Internet of things) activity data streams (smart home, smart car, environmental sensors, community data). This talk looks at how personal data and group data are becoming big data as individuals and communities share, collaborate, and work with large personalized data sets using novel discovery methods such as anomaly detection and exception reporting, longitudinal baseline analysis, episodic triggers, and hierarchical machine learning.
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
We are now living in the information society and global village of which we are bombarded with huge sums of information which is not all relevant to us. It is therefore imperative to be well equipped with information literacy skills so as to curb the information explosion. Simply being exposed to a great deal of information will not make people informed citizens, they need information literacy skills. Information literacy comes as a ‘medicine’ in curing the information exposition. Information seekers can tackle information explosion by employing strategies such as information literacy education, development of information search skills, library education, user orientation, bibliographic user instruction, information fluency and all other information literacy competencies.
Twitris in Action - a review of its many applications Amit Sheth
Twitris is a System for Collective Social Intelligence. It has been used in a large number of and many types (disaster coordination, banding, epidemiology, public health, election/polical, social movement) of applications - often in real-time. This presentation gives a bird-eye review of some of these applications with links to explore them further.
Analysing Social Media Conversations to Understand Public Perceptions of Sani...UN Global Pulse
The United Nations Millennium Campaign and the Water Supply and Sanitation Collaborative Council partnered to deliver a comprehensive advocacy and communication drive on sanitation. Their efforts were in support of the UN Deputy Secretary General’s Call to Action on Sanitation to increase the number of people with access to better sanitation. Global Pulse provided an analysis of social media in order to provide insight on the baseline of public engagement, and explore ways to monitor a new sanitation campaign. Using a custom keyword taxonomy, English language tweets from January 2011 to December 2013 were extracted, sorted into categories and analysed.
Cite as: UN Global Pulse, 'Analysing Social Media Conversations to Understand Public Perceptions of Sanitation', Global Pulse Project Series, no.5, 2014.
The corresponding video is at https://youtu.be/ztNHKLTHBrA AIISC conducts foundational and translational research in AI. In this talk, we review part of the AIISC's research in Social Good, Social Harm, and Public Health.
This talk was given to the UofSC College on Information and Communication.
Additional project details at http://wiki.aiisc.ai
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
https://dbsec2019.cse.sc.edu/Keynote.html
Abstract: As social media permeates our daily life, there has been a sharp rise in the misuse of social media affecting our society in large. Specifically, harassment and radicalization have become two major problems on social media platforms with significant implications on the well-being of individuals as well as communities. A 2017 Pew Research survey on online harassment found that 66% of adult Internet users have observed online harassment and 41% have personally experienced it. Nearly 18% of Americans have faced severe forms of harassment online such as physical threats, harassment over a sustained period, sexual harassment or stalking. Moreover, malicious organizations (e.g., terrorist groups, white nationalists not classified legally as terrorists but as a group with extreme ideology) have been using social media for sharing their propaganda and misinformation to persuade individuals and eventually recruit them to propagate their ideology. These communications related to harassment and radicalization are complex concerning their language and contextual characteristics, making recognition of such narratives challenging for researchers as well as social media companies. As most of the existing approaches fail to capture fundamental nuances in the language of these communications, two prominent challenges have emerged: ambiguity and sparsity. Sole data level bottom-up analysis has been unsuccessful in revealing the actual meaning of the content. Considering the significant sensitivity of these problems and its implications at individual and community levels, a potential solution requires reliable algorithms for modeling such communications.
Our approach to understanding communications between source and target requires deciphering the unique language, semantic and contextual characteristics, including sentiment, emotion, and intention. This context-aware and knowledge-enhanced computational approach to the analysis of these narratives breaks down this long-running and complex process into contextual building blocks that acknowledge inherent ambiguity and sparsity. Based on prior empirical and qualitative research in social sciences, particularly cognitive psychology, and political science, we model this process using a combination of contextual dimensions -- e.g., for Islamist radicalization: religion, ideology, and hate -- each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible.
Quantified Self Ideology: Personal Data becomes Big DataMelanie Swan
A key contemporary trend emerging in big data science is the quantified self: individuals engaged in the deliberate self-tracking of any kind of biological, physical, behavioral, or transactional information, as n=1 individuals or in groups. The quantified self is one dimension of the bigger trend to integrate and apply a variety of personal information streams including big health data (genome, transcriptome, environmentome, diseasome), quantified self data streams (biosensor, fitness, sleep, food, mood, heart rate, glucose tracking, etc.), traditional data streams (personal and family health history, prescription history) and IOT (Internet of things) activity data streams (smart home, smart car, environmental sensors, community data). This talk looks at how personal data and group data are becoming big data as individuals and communities share, collaborate, and work with large personalized data sets using novel discovery methods such as anomaly detection and exception reporting, longitudinal baseline analysis, episodic triggers, and hierarchical machine learning.
Information Literacy: ‘Medicine’ in Improving Ways of Managing Information Ex...inventionjournals
We are now living in the information society and global village of which we are bombarded with huge sums of information which is not all relevant to us. It is therefore imperative to be well equipped with information literacy skills so as to curb the information explosion. Simply being exposed to a great deal of information will not make people informed citizens, they need information literacy skills. Information literacy comes as a ‘medicine’ in curing the information exposition. Information seekers can tackle information explosion by employing strategies such as information literacy education, development of information search skills, library education, user orientation, bibliographic user instruction, information fluency and all other information literacy competencies.
Twitris in Action - a review of its many applications Amit Sheth
Twitris is a System for Collective Social Intelligence. It has been used in a large number of and many types (disaster coordination, banding, epidemiology, public health, election/polical, social movement) of applications - often in real-time. This presentation gives a bird-eye review of some of these applications with links to explore them further.
Analysing Social Media Conversations to Understand Public Perceptions of Sani...UN Global Pulse
The United Nations Millennium Campaign and the Water Supply and Sanitation Collaborative Council partnered to deliver a comprehensive advocacy and communication drive on sanitation. Their efforts were in support of the UN Deputy Secretary General’s Call to Action on Sanitation to increase the number of people with access to better sanitation. Global Pulse provided an analysis of social media in order to provide insight on the baseline of public engagement, and explore ways to monitor a new sanitation campaign. Using a custom keyword taxonomy, English language tweets from January 2011 to December 2013 were extracted, sorted into categories and analysed.
Cite as: UN Global Pulse, 'Analysing Social Media Conversations to Understand Public Perceptions of Sanitation', Global Pulse Project Series, no.5, 2014.
The Internet of Things means not just that computing devices have connectivity to the cloud but that they themselves are connected to each other, and therefore that novel applications can be developed in this rich ecosystem. One area for development is linking quantified self wearable sensors with automotive sensors for applications including Fatigue Detection, Real-time Parking and Assistance, Anger/Stress Reduction, Keyless Authentication, and DIY Diagnostics.
This paper examines digital literacy and how it relates to the philosophical study of ignorance. Ignorance of how digital technologies work (e.g. how users’ online activities can be used to the advantage of platform owners without the users’ knowledge, and how browsing can be confined) is still not well understood from the perspective of user practice.
Based on the following Special Issue of Teaching in Higher Education: https://doi.org/10.1080/13562517.2018.1547276
Talk done at Lancaster University, Edinburgh University, the SRHE conference, Sussex University,
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
Our primarly goal was to detect clusters via gensim libraries in news data consisting ofinformation regarding health and threats. We identified clusters for the periodscorresponding: i) Jannuary 2006 until the end of 2019, as December 2019 is considered thefirst month in which information about CORONVIRUS COVID-19 was made public; ii)between the 1st of Jannuary 2019 and 31st December 2019; and iii) between the 31st ofDecember 2019 and the 14th of April 2020. We conducted experiments using naturallanguage on open source intelligence data offered generously by brica.de, a providerspecialized in Business Risk Intelligence & Cyberthreat Awareness.
Big Data for Development: Opportunities and Challenges, Summary SlidedeckUN Global Pulse
Summary points from UN Global Pulse White Paper "Big Data for Development: Opportunities & Challenges." See: http://www.unglobalpulse.org/BigDataforDevelopment
In emerging markets, eight out of ten small businesses cannot access the loans they need to grow. USAID’s Development Credit Authority (DCA) uses risk-sharing agreements to mobilize local private capital to fill this financing gap. The goal of this collaboration between UN Global Pulse and USAID is to explore how big data could support the work of USAID’s Development Credit Authority. Kenya has become an established tech leader in Africa in recent years – generating greater volumes of digital data as a result. The goal of this study is to explore what new sources of digital data, and methods for analysis, could be helpful in answering the question: “What barriers to accessing loans do small businesses in Kenya face?” Accordingly, this report paints a picture of the big data landscape in Kenya, shows preliminary findings, and lays the groundwork for further investigation.
Global Pulse: Mining Indonesian Tweets to Understand Food Price Crises copyUN Global Pulse
Sudden increases in the price of staple foodstuffs like rice can push whole families below the poverty line and cause regional economic instability; these changes can happen rapidly but food price statistics are generally published only monthly or even less frequently.
This project, in collaboration with the Indonesian Ministry of Development Planning, UNICEF and WFP in Indonesia seeks to use social media analysis to provide real-time information from the population that could enable faster responses to food price increases in the form of social protection policies. Global Pulse analysed tweet volumes relevant to food and fuel between March 2011 and April 2013 and found a significant correlation, suggesting that even potential (rather than realised) fuel price rises affect people’s perceptions of food security. Researchers also found a relationship between retrospective official food inflation statistics and the number of tweets referencing food price increases.
http://www.unglobalpulse.org/social-media-social-protection-indonesia
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackCOMRADES project
Leon Derczynski - University of Sheffield,
Kenny Meesters - TU Delft, Kalina Bontcheva - University of Sheffield, Diana Maynard- University of Sheffield
WiPe Paper – Social Media Studies
Proceedings of the 15th ISCRAM Conference – Rochester, NY, USA May 2018
Augmented Personalized Health: using AI techniques on semantically integrated...Amit Sheth
Keynote @ 2018 AAAI Joint Workshop on Health Intelligence (W3PHIAI 2018), 2 February 2018, New Orleans, LA [Video: https://youtu.be/GujvoWRa0O8]
Related article: https://ieeexplore.ieee.org/document/8355891/
Abstract
Healthcare as we know it is in the process of going through a massive change - from episodic to continuous, from disease-focused to wellness and quality of life focused, from clinic centric to anywhere a patient is, from clinician controlled to patient empowered, and from being driven by limited data to 360-degree, multimodal personal-public-population physical-cyber-social big data-driven. While the ability to create and capture data is already here, the upcoming innovations will be in converting this big data into smart data through contextual and personalized processing such that patients and clinicians can make better decisions and take timely actions for augmented personalized health. In this talk, we will discuss how use of AI techniques on semantically integrated patient-generated health data (PGHD), environmental data, clinical data, and public social data is exploited to achieve a range of augmented health management strategies that include self-monitoring, self-appraisal, self-management, intervention, and Disease Progression Tracking and Prediction. We will review examples and outcomes from a number of applications, some involving patient evaluations, including asthma in children, bariatric surgery/obesity, mental health/depression, that are part of the Kno.e.sis kHealth personalized digital health initiative.
Background: Background: http://bit.ly/k-APH, http://bit.ly/kAsthma, http://j.mp/PARCtalk
"Big Data for Development: Opportunities and Challenges" UN Global Pulse
This White Paper is the culmination of UN Global Pulse’s research, collaborations, and consultations with experts to begin a dialogue around Big Data for Development. See: http://www.unglobalpulse.org/BigDataforDevWhitePaper
The Future of the Internet
Experts and stakeholders say the Internet will enhance our
intelligence – not make us stupid. It will also change the functions of
reading and writing and be built around still‐unanticipated gadgetry
and applications. The battle over control of the internet will rage on
and debates about online anonymity will persist.
Janna Quitney Anderson, Elon University
Lee Rainie, Pew Internet & American Life Project
February 19, 2010
Pew Research Center’s Internet & American Life Project
An initiative of the Pew Research Center
1615 L St., NW – Suite 700
Washington, D.C. 20036
202‐419‐4500 | pewinternet.org
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
Public Health Crisis Analytics for Gender ViolenceHemant Purohit
Research-progress talk on the use of data analytics methods for one of the major public health crisis in the world Gender-based Violence and the campaign engagement in the initiatives of Non-profit organizations.
A Systematic Survey on Detection of Extremism in Social MediaRSIS International
Extremism is an uncommon feature of a person or a group. These extreme features pertain to beliefs, attitudes, feelings, actions, or strategies, etc. Extremist activities happen on various platforms on the Internet. These platforms are constantly being utilized to spread extremist agenda, influence people and create virtual organizations and communities. Automatic detection of such a level of extremism in social media is a technically challenging problem that has recently gained popularity in the research community. This paper provides a systematic, critical and detailed literature review of the state of the art techniques used in automatic detection of extremism of different forms and in different types of social media. The survey outcome is systematically presented using several dimensions like machine learning techniques used to detect extremism, features and datasets employed in research studies, emerging trends in extremism, limitation of existing work and possible prospects in future. Several findings from the survey have been identified as potential directions for future work. Specifically to mention, spatial-temporal features have not been fully utilized to detect extremism. Such features, if systematically used, can play a very vital role in tracing the location as well as time of promoting extremists activities.
THE SURVEY OF SENTIMENT AND OPINION MINING FOR BEHAVIOR ANALYSIS OF SOCIAL MEDIAIJCSES Journal
Nowadays, internet has changed the world into a global village. Social Media has reduced the gaps among
the individuals. Previously communication was a time consuming and expensive task between the people.
Social Media has earned fame because it is a cheaper and faster communication provider. Besides, social
media has allowed us to reduce the gaps of physical distance, it also generates and preserves huge amount
of data. The data are very valuable and it presents association degree between people and their opinions.The comprehensive analysis of the methods which are used on user behavior prediction is presented in this paper. This comparison will provide a detailed information, pros and cons in the domain of sentiment and
opinion mining.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
The Internet of Things means not just that computing devices have connectivity to the cloud but that they themselves are connected to each other, and therefore that novel applications can be developed in this rich ecosystem. One area for development is linking quantified self wearable sensors with automotive sensors for applications including Fatigue Detection, Real-time Parking and Assistance, Anger/Stress Reduction, Keyless Authentication, and DIY Diagnostics.
This paper examines digital literacy and how it relates to the philosophical study of ignorance. Ignorance of how digital technologies work (e.g. how users’ online activities can be used to the advantage of platform owners without the users’ knowledge, and how browsing can be confined) is still not well understood from the perspective of user practice.
Based on the following Special Issue of Teaching in Higher Education: https://doi.org/10.1080/13562517.2018.1547276
Talk done at Lancaster University, Edinburgh University, the SRHE conference, Sussex University,
Clustering analysis on news from health OSINT data regarding CORONAVIRUS-COVI...ALexandruDaia1
Our primarly goal was to detect clusters via gensim libraries in news data consisting ofinformation regarding health and threats. We identified clusters for the periodscorresponding: i) Jannuary 2006 until the end of 2019, as December 2019 is considered thefirst month in which information about CORONVIRUS COVID-19 was made public; ii)between the 1st of Jannuary 2019 and 31st December 2019; and iii) between the 31st ofDecember 2019 and the 14th of April 2020. We conducted experiments using naturallanguage on open source intelligence data offered generously by brica.de, a providerspecialized in Business Risk Intelligence & Cyberthreat Awareness.
Big Data for Development: Opportunities and Challenges, Summary SlidedeckUN Global Pulse
Summary points from UN Global Pulse White Paper "Big Data for Development: Opportunities & Challenges." See: http://www.unglobalpulse.org/BigDataforDevelopment
In emerging markets, eight out of ten small businesses cannot access the loans they need to grow. USAID’s Development Credit Authority (DCA) uses risk-sharing agreements to mobilize local private capital to fill this financing gap. The goal of this collaboration between UN Global Pulse and USAID is to explore how big data could support the work of USAID’s Development Credit Authority. Kenya has become an established tech leader in Africa in recent years – generating greater volumes of digital data as a result. The goal of this study is to explore what new sources of digital data, and methods for analysis, could be helpful in answering the question: “What barriers to accessing loans do small businesses in Kenya face?” Accordingly, this report paints a picture of the big data landscape in Kenya, shows preliminary findings, and lays the groundwork for further investigation.
Global Pulse: Mining Indonesian Tweets to Understand Food Price Crises copyUN Global Pulse
Sudden increases in the price of staple foodstuffs like rice can push whole families below the poverty line and cause regional economic instability; these changes can happen rapidly but food price statistics are generally published only monthly or even less frequently.
This project, in collaboration with the Indonesian Ministry of Development Planning, UNICEF and WFP in Indonesia seeks to use social media analysis to provide real-time information from the population that could enable faster responses to food price increases in the form of social protection policies. Global Pulse analysed tweet volumes relevant to food and fuel between March 2011 and April 2013 and found a significant correlation, suggesting that even potential (rather than realised) fuel price rises affect people’s perceptions of food security. Researchers also found a relationship between retrospective official food inflation statistics and the number of tweets referencing food price increases.
http://www.unglobalpulse.org/social-media-social-protection-indonesia
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackCOMRADES project
Leon Derczynski - University of Sheffield,
Kenny Meesters - TU Delft, Kalina Bontcheva - University of Sheffield, Diana Maynard- University of Sheffield
WiPe Paper – Social Media Studies
Proceedings of the 15th ISCRAM Conference – Rochester, NY, USA May 2018
Augmented Personalized Health: using AI techniques on semantically integrated...Amit Sheth
Keynote @ 2018 AAAI Joint Workshop on Health Intelligence (W3PHIAI 2018), 2 February 2018, New Orleans, LA [Video: https://youtu.be/GujvoWRa0O8]
Related article: https://ieeexplore.ieee.org/document/8355891/
Abstract
Healthcare as we know it is in the process of going through a massive change - from episodic to continuous, from disease-focused to wellness and quality of life focused, from clinic centric to anywhere a patient is, from clinician controlled to patient empowered, and from being driven by limited data to 360-degree, multimodal personal-public-population physical-cyber-social big data-driven. While the ability to create and capture data is already here, the upcoming innovations will be in converting this big data into smart data through contextual and personalized processing such that patients and clinicians can make better decisions and take timely actions for augmented personalized health. In this talk, we will discuss how use of AI techniques on semantically integrated patient-generated health data (PGHD), environmental data, clinical data, and public social data is exploited to achieve a range of augmented health management strategies that include self-monitoring, self-appraisal, self-management, intervention, and Disease Progression Tracking and Prediction. We will review examples and outcomes from a number of applications, some involving patient evaluations, including asthma in children, bariatric surgery/obesity, mental health/depression, that are part of the Kno.e.sis kHealth personalized digital health initiative.
Background: Background: http://bit.ly/k-APH, http://bit.ly/kAsthma, http://j.mp/PARCtalk
"Big Data for Development: Opportunities and Challenges" UN Global Pulse
This White Paper is the culmination of UN Global Pulse’s research, collaborations, and consultations with experts to begin a dialogue around Big Data for Development. See: http://www.unglobalpulse.org/BigDataforDevWhitePaper
The Future of the Internet
Experts and stakeholders say the Internet will enhance our
intelligence – not make us stupid. It will also change the functions of
reading and writing and be built around still‐unanticipated gadgetry
and applications. The battle over control of the internet will rage on
and debates about online anonymity will persist.
Janna Quitney Anderson, Elon University
Lee Rainie, Pew Internet & American Life Project
February 19, 2010
Pew Research Center’s Internet & American Life Project
An initiative of the Pew Research Center
1615 L St., NW – Suite 700
Washington, D.C. 20036
202‐419‐4500 | pewinternet.org
Biases in Social Media Research (NoBias EU project)Miriam Fernandez
Biases that emerge in Social Media Research. Talk presented at the NoBias EU project. Inspired by Olteanou et al. Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries (2019)
Public Health Crisis Analytics for Gender ViolenceHemant Purohit
Research-progress talk on the use of data analytics methods for one of the major public health crisis in the world Gender-based Violence and the campaign engagement in the initiatives of Non-profit organizations.
A Systematic Survey on Detection of Extremism in Social MediaRSIS International
Extremism is an uncommon feature of a person or a group. These extreme features pertain to beliefs, attitudes, feelings, actions, or strategies, etc. Extremist activities happen on various platforms on the Internet. These platforms are constantly being utilized to spread extremist agenda, influence people and create virtual organizations and communities. Automatic detection of such a level of extremism in social media is a technically challenging problem that has recently gained popularity in the research community. This paper provides a systematic, critical and detailed literature review of the state of the art techniques used in automatic detection of extremism of different forms and in different types of social media. The survey outcome is systematically presented using several dimensions like machine learning techniques used to detect extremism, features and datasets employed in research studies, emerging trends in extremism, limitation of existing work and possible prospects in future. Several findings from the survey have been identified as potential directions for future work. Specifically to mention, spatial-temporal features have not been fully utilized to detect extremism. Such features, if systematically used, can play a very vital role in tracing the location as well as time of promoting extremists activities.
THE SURVEY OF SENTIMENT AND OPINION MINING FOR BEHAVIOR ANALYSIS OF SOCIAL MEDIAIJCSES Journal
Nowadays, internet has changed the world into a global village. Social Media has reduced the gaps among
the individuals. Previously communication was a time consuming and expensive task between the people.
Social Media has earned fame because it is a cheaper and faster communication provider. Besides, social
media has allowed us to reduce the gaps of physical distance, it also generates and preserves huge amount
of data. The data are very valuable and it presents association degree between people and their opinions.The comprehensive analysis of the methods which are used on user behavior prediction is presented in this paper. This comparison will provide a detailed information, pros and cons in the domain of sentiment and
opinion mining.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
Applications of data science in social media.pptxlyudmilabaruah
Data science has become one of the fastest growing fields across industries. Data science plays a crucial role in social media. From personalized content recommendations to proactive spam detection, data science fuels a transformative era, shaping a more engaging, secure, and individualized social media landscape. The slides in this presentation therefore aim to help you in understanding the applications of data science in social media.
Law;
Social Media;
Internet;
Cyber crime;
Cyber crime against women
Women In Digital world;
Cyber crime laws;
Digital Awarness;
legal framework;
Communication Interface;
Social media platforms;
tools of conducting cybercrime;
types of cybercrime agaist women;
Data recovery softwares;
IPC for cybercrime;
Case studies on cybercrime;
Security features; IT Act 2000
EPIDEMIC OUTBREAK PREDICTION USING ARTIFICIAL INTELLIGENCEijcsit
Intelligent Models for predicting diseases whether building a model to help the doctor or even preventing its spread in an area globally, is increasing day by day. Here we present a noble approach to predict the disease prone area using the power of Text Analysis and Machine Learning. Epidemic Search model using the power of the social network data analysis and then using this data to provide a probability score of the spread and to analyse the areas whether going to suffer from any epidemic spread-out, is the main focus of this work. We have tried to analyse and showcase how the model with different kinds of pre-processing and algorithms predict the output. We have used the combination of words-n grams, word embeddings and TFIDF with different data mining and deep learning algorithms like SVM, Naïve Bayes and RNN-LSTM. Naïve Bayes with TF-IDF performed better in comparison to others.
Intelligent Models for predicting diseases whether building a model to help the doctor or even preventing its spread in an area globally, is increasing day by day. Here we present a noble approach to predict the disease prone area using the power of Text Analysis and Machine Learning. Epidemic Search model using the power of the social network data analysis and then using this data to provide a probability score of the spread and to analyse the areas whether going to suffer from any epidemic spread-out, is the main focus of this work. We have tried to analyse and showcase how the model with different kinds of pre-processing and algorithms predict the output. We have used the combination of words-n grams, word embeddings and TFIDF with different data mining and deep learning algorithms like SVM, Naïve Bayes and RNN-LSTM. Naïve Bayes with TF-IDF performed better in comparison to others.
Artificial intelligence in social media.ChetnaGoyal16
AI in social media involves the utilization of algorithms and computational models that simulate human intelligence. These algorithms are able to analyze patterns, detect trends, and make predictions because they have been trained on vast amounts of data.
Check out Jeetech Academy if you are looking to take an Artificial intelligence course in Delhi, as they are one of the best AI institute in Delhi.
https://jeetechacademy.com/artificial-intelligence-course/
Identifying social media influencers through social media network analysis: A...Miguel del Fresno
Social media influencers (SMIs) can be defined as a new type of independent players who shape audience attitudes through the use of social media channels in competition and coexistence with professional media. SMIs can be identified by their high-ranking position in a network as the most important or central nodes; a position that allows them to exert a growing influence in shaping social perceptions of organizations and brands. Although existing studies have identified the ideal characteristics of CEOs and spokespersons in their relations with mass media, as well as the key psychological characteristics of SMIs in relation to their audiences, there are currently no studies that identify SMIs in social media using Social Network Analysis (SNA). SNA has been recognized as a powerful tool for representing social network structures and understanding models for information dissemination. This study presents a social media network analysis (SMNA) on Twitter of a global brand. The results reveal the existence of three types of SMIs. This methodology permits the optimization of public relations, marketing and communications efforts to create effective outreach strategies.
Similar to Computational Social Science as the Ultimate Web Intelligence (20)
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Media as a Mind Controlling Strategy In Old and Modern Era
Computational Social Science as the Ultimate Web Intelligence
1. Computational Social Science
as the Ultimate Web Intelligence
Kno.e.sis Projects at the Intersection of Big Data, AI, Social Good and Health
Panel at Web Intelligence 2018
Prof. Amit Sheth
LexisNexis Ohio Eminent Scholar
Executive Director, Kno.e.sis - Ohio Center of Excellence in
Knowledge-enabled Computing & BioHealth Innovation
Presentation template by SlidesCarnival
Photographs by Unsplash
Icons by thenounproject
2. Big Data | Social Media | AI
2
Harnessing Twitter ‘Big Data’ for
Automatic Emotion Identification
2.5 M Tweets with Machine
Learning algorithms
Trends
Emotions
eDrugTrends - Identify emerging trends in
cannabis and synthetic cannabinoid use in the
U.S.
Web Forum Data & Tweets with
NLP, ML & Semantic Web
Technologies
Intents
Sentiments
Hazards SEES - Cross-modal aggregation
of Multi-modal & Multi-disciplinary
Data to support human efforts in disaster
management
Extracting Diverse Sentiment Expressions
with Target-Dependent Polarity from
Twitter
Opinions
400 000 Tweets with an
Optimization Model
People
Places
Times
3. Gender-Based Violence in
140 Characters or Fewer: A
#BigData Case Study of
Twitter
14 million tweets
collected from Twitter
over a period of 10
months
3
1. Gender-based violence in 140 characters or fewer: A #BigData case study of Twitter, Hemant Purohit, Tanvi Banerjee, Andrew Hampton, Valerie L. Shalin, Nayanesh Bhandutia, and Amit
Sheth, First Monday, Volume 21, Number 1 - 4 January 2016
4. Outcomes of Analysis
◎ Trends of GBV tweets across 5 countries; USA,
India, Philippines, Nigeria, South Africa.
4
◎ Three thematic groups of GBV tweets: physical
violence, sexual violence, and harmful practices.
◎ Nigeria has the highest percentage of tweets with URLs in
comparison to other countries.
◎ Numerous explanations;
○ Literacy,
○ Credibility of the public press
○ Possibility that reliance on external resources somehow reduces
the threat of being identified as the responsible party.
5. Context-Aware
Harassment Detection
on Social Media
24 000 tweets collected
Supervised ML methods
used
5
1. Mohammadreza Rezvan, Saeedeh Shekarpour, Lakshika Balasuriya, Krishnaprasad Thirunarayan, Valerie L. Shalin, Amit Sheth. A Quality Type-aware Annotated Corpus and
Lexicon for Harassment Research. Web Science, WebSci 2018, Amsterdam, The Netherlands, May 27-30, 2018
2. Mohammadreza Rezvan, Saeedeh Shekarpour, Thirunarayan, K., Valerie L. Shalin, Sheth, A. (2018). Analyzing and learning the languagefor different types of harassment
Knoesis wiki for Context-Aware Harassment Detection on Social
Media
6. Outcomes and Insights
Lexicon
Covering different types of harassment content
● Sexual
● Political
● Racial
Tweets
24 000 non-redundant annotated
tweets with 3000 are labeled as
harassing
Features
Combination of features resulted in best
accuracy
○ TFIDF
○ word2vec
○ paragraph2vec
○ LIWC vector
ML Methods
Gradient Boosting Machine (GBM)
outperformed SVM, KNN and NB
6
● Intellectuel
● Appearance - related
● General
7. 7
1. Gaur, Manas, Ugur Kursuncu, Amanuel Alambo, Amit Sheth, Raminta Daniulaityte, Krishnaprasad Thirunarayan, and Jyotishman Pathak. "Let Me Tell You About Your
Mental Health!: Contextualized Classification of Reddit Posts to DSM-5 for Web-based Intervention." In Proceedings of the 27th ACM CIKM 2018.
Patient
ClinicianEMR
Insight
DSM-5 & Drug Abuse
Ontology
Improved
Healthcare
Classification of Reddit
Content to DSM-5 for
Web-based
Intervention
3 Million Posts from 270K
Reddit Users collected From
2005-2015 with zero shot
learning
Provide clinicians, insights of their patients
Knoesis wiki for Modeling Social Behavior for Healthcare
Utilization in Depression
8. Outcomes & Insights
9
Our sophisticated methods have
reduced the false alarm rate to 3%
- 5% by incorporating domain
knowledge and slang terms in
social media data
9. Views: People - Content - Network
Information in tweets by a user displays
an intent based on the user type:
Personal accounts share opinions, Retail
accounts promote related products for
sale, Media accounts disseminate
information.
Proper incorporation
of each view is
essential to
better represent
characteristics
of users.
User Modeling in Marijuana-related Communications
11
Multimodality
- The information shared in different
formats contributes to the meaning:
Text, Image, Emoji, Interactions
- Translation of image and emoji to textual
representation using state-of-the-art tools
such as EmojiNet.
People: user description, emoji,
profile pictures.
Content: text, emoji
Network: interactions with other
users: retweets and mentions.
🏈
😉
🍔
1. Ugur Kursuncu, Manas Gaur, Usha Lokala, Anurag Illendula, Krishnaprasad Thirunarayan, Raminta Daniulaityte, Amit Sheth, and I. Budak Arpinar. "" What's ur type?"
Contextualized Classification of User Types in Marijuana-related Communications using Compositional Multiview Embedding." In Proceedings of IEEE International
Conference on Web Intelligence, 2018
Knoesis wiki for eDrugTrends
10. Outcomes & Insights
◎ Incorporation of multimodal data,
specifically profile pictures and network
interactions, significantly contributes into
the classification of users.
◎ Multimodality significantly improves the
classification performance in the case of
imbalanced dataset, e.g., profile pictures
of users.
◎ Compositional of embeddings of views
(e.g., person, content, network) provide
more coherent representation of users.
12
Features Personal Media Retail
1 Tweet + Desc 0.95 0.42 0.73
2 w/ Composition 0.94 0.18 0.71
3 w/ Metadata 0.94 0.17 0.72
4 w/ Image 0.97 0.72 0.87
5 w/ Network 0.98 0.73 0.91
F-Scores for each user type
11. Fusing Visual, Textual and
Connectivity Clues for Studying
Mental Health
Knoesis wiki for Modeling Social Behavior for Healthcare Utilization in Depression
Develop a multimodal framework and
employing statistical techniques for
fusing heterogeneous sets of features
obtained by processing visual, textual
and user interaction data to identify
depressive behavior and demographic
inference.
13
1. Amir Hossein Yazdavar, Mohammad Saied Mahdavinejad, Goonmeet Bajaj, Krishnaprasad Thirunarayan, Jyotishman Pathak and Amit Sheth. Fusing Visual, Textual and
Connectivity Clues for Studying Mental Health in Population. In: 30th International Conference on World Wide Web (Submitted WWW-2019)
◎ How well do the content of posted images (colors,
aesthetic and facial presentation) reflect depressive
behavior?
◎ Does the choice of profile picture show any psychological
traits of depressed online persona? Are they reliable
enough to represent the demographic information such as
age and gender?
◎ Are there any underlying common themes among
depressed individuals generated using multimodal
content that can be used to detect depression reliably?
12. Outcomes & Insights
14
Characterizing Linguistic Patterns in two aspects:
Depressive-behavior and Age Distribution
Gender Biases
and Depressive
Behavior
Association (Chi-
square test: color-
code:
(blue:association),
(red: repulsion),
size: amount of
each cell’s
contribution)
The age
distribution for
depressed and
control users
in ground-truth
dataset
13. Outcomes & Insights
15
The explanation of the log-odds prediction of outcome (0.31) for
a sample user (y-axis shows the outcome probability (depressed
or control), the bar labels indicate the log-odds impact of each
feature)
Ranking Features obtained from Different Modalities with
Boruta Algorithm
14. Create value from data that supports action
Big Data & AI
16
What can we do that
is unique?
Emotions
Sentiments
Intentions Derive Insights
Scale to identify important & relevant
issues to human kind
Floods Earthquake
Wildfires Tsunami
Derive insights from data
Do more exercises
Reduce sugar intake
Increase water intake
More at: http://knoesis.org/projects, http://bit.ly/Kapproach
Opinions - "Time for dabs": Analyzing Twitter data on butane hash oil use.
Sharing behavior analysis. Social media provide the opportunity to distribute information, potentially reflecting both the senders’ judgment of information importance, and reliance on the voice of others. Sharing functions as an amplification of these voices, often through the voices of influential celebrities. We analyze two types of sharing behavior in the social media community surrounding GBV events: direct content resharing as a retweet (RT), and indirect sharing via references to external resources, such as news, blogs, articles, and multimedia, using URLs, etc.
the low retweeting frequency in Nigeria is particularly remarkable (see Table 5). One might hypothesize that a low literacy country such as Nigeria, in which senders are less able to compose messages, would have the highest retweet ratio. The adjacent analysis of the proportion of URL references with respect to the total corpus suggests a different sociocultural phenomenon at work concerning the identifiability of the responsible party. For GBV tweets containing URLs, Nigeria has the highest percentage of tweets with URLs in comparison to other countries. Numerous explanations can be tested, including literacy, credibility of the public press, and the possibility that reliance on external resources somehow reduces the threat of being identified as the responsible party.
Goal - understanding individuals mental health situation
Provide clinicias insights of his/ pataients
Not all the Reddit content types (Main Posts, Comments, and Replies) are informative.
Identification of Features that represent users on Reddit:
Vertical Linguistic Features (e.g. Inter-Subreddit Similarity)
Horizontal Linguistic Features (e.g. Subordinate Conjunction)
Fine-Grained Features (e.g. Readability scores)
Word Embedding with/without modulation
Coherence-based topic selection that associate subreddit to DSM-5
Enrichment of DAO ontology with DSM-5 lexicon and Slang Terms : DSM-5 Knowledge Hierarchy
DAO - we created
A sophisticated method allowed us to hugly reduce the false alarm rate -
Explain the optimization effort in one sentence
25% reduction in the false alarm rate (2- 5%) while the other methods have higher false alarm rates ()
Takeaway;
Incorporation of domain knowledge and
slang terms in social media data
1)Analysis of content of posted images in terms of colors,
aesthetic and facial presentation and their associations with
depressive behavior;
2)Uncovering the underlying relationships between the visual
and contextual content of likely depressed profiles obtained
using demographic inference process which can facilitate
community-level management of depression
Top left: Our findings from social media are consistent with the findings in the medical literature as according to the third National Health and Nutrition Examination Survey [29] more women than men were given a diagnosis of depression.
Bottom Left:
shows that young people aged below 24 tend to be more depressed suggesting that either likely depressed-user population is younger,
or youngsters are more likely to disclose their age say with the
intention of connecting to their peers (social homophily
Right: The waterfall charts represent how the probability of being de-
pressed changes with the addition of each feature variable.
Left: illustrates feature importance obtained by Boruta algorithm.