In this paper we examine the information sharing practices of people living in cities amid armed conflict. We describe the volume and frequency of microblogging activity on Twitter from four cities afflicted by the Mexican Drug War, showing how citizens use social media to alert one another and to comment on the violence that plagues their commu-nities. We then investigate the emergence of civic media “curators,” individuals who act as “war correspondents” by aggregating and disseminating information to large num-bers of people on social media. We conclude by outlining the implications of our observations for the design of civic media systems in wartime.
Temple Law School/ICAS Joint Lecture:
#vivalarevolucíon: New Millennium Political Protests
Slides for John Russell
Speakers:
David H. Slater, Professor of Cultural Anthropology and Japanese Studies and Director of the Institute of Comparative Culture, Sophia University
John Russell, Professor of Anthropology, Gifu University
William Andrews, writer and translator.
Sarajean Rossitto, Nonprofit NGO Consultant
Moderator:
Tina Saunders, Director and Associate Professor of Instruction in Law, Temple University School of Law, Japan Campus
ICAS public lecture series videos are posted on Youtube: https://www.youtube.com/playlist?list=PLAA67B040B82B8AEF
Web sci13 narcotweets-the-rise-fall-citizen-reporterP. Takis Metaxas
Recently, research interest has been growing in the development of online communities sharing news and information curated by “citizen reporters”. Using “Big Data” techniques researchers try to discover influence groups and major events in the lives of such communities. However, the big picture may sometimes miss important stories that are essential to the development and evolution of online communities. In particular, how does one identify and verify events when the important actors are operating anonymously and without sufficient news coverage, as in drug war-torn Mexico? In this paper, we present some techniques that allow us to make sense of the data collected, identify important dates of significant events therein, and direct our limited resources to discover hidden stories that, in our case, affect the lives and safety of prominent citizen reporters. In particular, we describe how focused analysis enabled us to discover an important story in the life of this community involving the reputation of an anonymous leader, and how trust was built in order to verify the validity of that story.
Temple Law School/ICAS Joint Lecture:
#vivalarevolucíon: New Millennium Political Protests
Slides for John Russell
Speakers:
David H. Slater, Professor of Cultural Anthropology and Japanese Studies and Director of the Institute of Comparative Culture, Sophia University
John Russell, Professor of Anthropology, Gifu University
William Andrews, writer and translator.
Sarajean Rossitto, Nonprofit NGO Consultant
Moderator:
Tina Saunders, Director and Associate Professor of Instruction in Law, Temple University School of Law, Japan Campus
ICAS public lecture series videos are posted on Youtube: https://www.youtube.com/playlist?list=PLAA67B040B82B8AEF
Web sci13 narcotweets-the-rise-fall-citizen-reporterP. Takis Metaxas
Recently, research interest has been growing in the development of online communities sharing news and information curated by “citizen reporters”. Using “Big Data” techniques researchers try to discover influence groups and major events in the lives of such communities. However, the big picture may sometimes miss important stories that are essential to the development and evolution of online communities. In particular, how does one identify and verify events when the important actors are operating anonymously and without sufficient news coverage, as in drug war-torn Mexico? In this paper, we present some techniques that allow us to make sense of the data collected, identify important dates of significant events therein, and direct our limited resources to discover hidden stories that, in our case, affect the lives and safety of prominent citizen reporters. In particular, we describe how focused analysis enabled us to discover an important story in the life of this community involving the reputation of an anonymous leader, and how trust was built in order to verify the validity of that story.
Networked Journalism and the Arab SpringRob Jewitt
Slides used in undergraduate media studies module at University of Sunderland
For the YouTube videos on the following slides skip to the following sections:
#34 - 9:00 -11:30
#38 - 9:50-11:30
The rise of the Empowered Public and its impact on the journalist-source relationship. This presentation was originally given by S.I. Newhouse School Professor Dan Pacheco at the Beyond Convergence conference at the University of Nevada, Las Vegas in October, 2013.
The rise of the empowered public and its impact on the journalist-source relationship. This presentation was originally given by S.I. Newhouse School Professor Dan Pacheco at the Beyond Convergence conference at the University of Nevada, Las Vegas
Networked Journalism and the Arab SpringRob Jewitt
Slides used in undergraduate media studies module at University of Sunderland
For the YouTube videos on the following slides skip to the following sections:
#34 - 9:00 -11:30
#38 - 9:50-11:30
The rise of the Empowered Public and its impact on the journalist-source relationship. This presentation was originally given by S.I. Newhouse School Professor Dan Pacheco at the Beyond Convergence conference at the University of Nevada, Las Vegas in October, 2013.
The rise of the empowered public and its impact on the journalist-source relationship. This presentation was originally given by S.I. Newhouse School Professor Dan Pacheco at the Beyond Convergence conference at the University of Nevada, Las Vegas
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
8. “Fearing for their lives
and the safety of their
families, journalists are
adhering to a near-
complete news
blackout, under strict
orders of drug smuggling
organizations and their
enforcers, who dictate via
daily telephone
calls, emails and news
releases what can and
cannot be printed or
aired.”
9. “The news blackout
extends to government
officials. In Nuevo
Laredo, the mayor
mysteriously disappears
for days and refuses to
discuss drug violence.
The military general who
presides over the soldiers
patrolling the city does
not hold news
conferences, issue
statements or answer
questions from the
media.”
10. Internet Users1
17% (yr. 2000) 34% (yr. 2010)
34 million users
Social Media1
61% of Internet users
Twitter2
20% of SM users
5th largest country
1 Asociación Mexicana de Internet, 2011
2
Oxford Internet Institute, 2012
(cc) Lecates on Flickr
11. Weakened Increased
Institutions Violence
Social
Media
Adoption
Based on photo by Eneas on Flickr
12. Outline
1. Context
2. Information War
3. Tweeting the War
4. Citizen News Curators
5. Summary
24. Interviews
“Angela” “Claudia”
Followers: 25K Followers: 30K
Tweets: 35K Tweets: 60K
Hours/day: 15 Hours/day: “many”
Age: early 20‟s Age: ?
Photo: mr. toaster on Flickr Photo:CarbonNYC on Flickr
(in Spanish)
25. How did you get started with Twitter?
“Angela” “Claudia”
“It was through a “…by chance. I heard
friend. She said: on the radio about how
„you have to go to celebrities would
Twitter! it‟s so interact with their fans.”
cool!‟” (Joined in (Joined in mid 2009)
late 2009)
Photo: mr. toaster on Flickr Photo:CarbonNYC on Flickr
26. How would you describe your role?
“Angela” “Claudia”
“I‟m a journalist … “My role on Twitter is
It is as if I was a that of yet another
war citizen. [People] tell
correspondent, on me that I‟m like their
social networks, of „angel,‟ for looking
the war we are after them”
living in Mexico.”
Photo: mr. toaster on Flickr Photo:CarbonNYC on Flickr
27. Motivations
“Angela” “Claudia”
“I consider this as “…tweeting is an
a community altruistic
service, even community
though people service.”
might laugh about
it.”
Photo: mr. toaster on Flickr Photo:CarbonNYC on Flickr
28. What are your sources?
“Angela” “Claudia”
“Not all the information “Most of the
comes from Twitter. information is from los
There‟s a lot of people tuiteros, my followers.
who know what I do. In other cases, it‟s the
They have my number reporters on TV, local
and they call me… they news...”
are 100% citizens.”
Photo: mr. toaster on Flickr Photo:CarbonNYC on Flickr
29. Outline
1. Context
2. Information War
3. Tweeting the War
4. Citizen News Curators
5. Summary
30. Summary
• Violence, weak institutions, social
media adoption civic
engagement.
• Citizens form alert networks.
• Information ecosystem.
• Emergence curators ("war
correspondents“).
• Rich opportunities: surfacing latent
hyperlocal communities (CHI ‟13).
Editor's Notes
I’m __fr
I’m going to give you the context. CURATORS…. Characterize the nature of the phenomenon and then INTERVIEWSWe then investigate the emergence of civic media “curators,” individuals who act as “war correspondents” by aggregating and disseminating information to large num-bers of people on social media. We conclude by outlining the implications of our observations for the design of civic media systems in wartime. STUDY we examine the information sharing practices of people living in URBAN WARFARE. We describe the VOLUME and FREQ on SOC MEDIAfrom four cities afflicted by the Mexican Drug War, showing how citizens use social media to alert one another and to comment on the violence that plagues their commu-nities.
People debated on the role of social media as a platform for civic engagement during moments of crisis, acute events. Different latitudes. Different everyday acute events.
Numbers are contested. Some context. Mexican Drug War. Started by President Calderon in 2006. [add image source]
Shootings, grenade attacks and even car bombs. In some Mexican cities violence, crises are part of everyday life
Quite a bit of work on the field of Crisis Informatics. Typically when crises emerge, governments and the media are there to inform us. In the US the government has developed the role of Public Information Officers (PIOs) which has been documented by Palen and others.
MSM
Caveat #1: hard to find ground truth.
In parallel to that, we have seen a dramatic increase in the adoption of Internet technologies in the past years.
example
Caveat #2: Twitter is part of an information ecosystem. What we observe there is part of the story.
Picked because of the high level of violence, use of Twitter, and personal familiarity.City of Boston: 617,594 GreaterBoston area: 4,522,858
Selected one hashtag.16 months.If we assume that each account represents a unique person, our data suggests that 1.48% of people living in the cities analyzed posted some-thing on Twitter about the Mexican Drug War. Especially interesting in light of Twitter’s own estimate that 40% of their active users sign in to “just” “listen”
Interaction > Dissemination 16 months – Seattle with mentions (50.7%) were more common than retweets (15.7%).
The
Who?
Followers: Captured at the moment of the last tweet.Curators: Act as operators. Mostly (selfrepoted) females.
Fictitious names, photos. Contacted several of them. 4 replied. I present here some of the highlights of my conversation with 2.
Angela: Triangulation. ContactsDistributed geographically. Trust: “I can’t recommend anyone after what happened with [name of curator]. I can’t vouch for anybody, because I don’t know who is behind that account.” Claudia:“Not all my followers send me information but I am very thankful to those who take the time to do it
“I can’t recommend anyone” and that “after what happened with @AnonCurator3, I can’t vouch for anybody, because I don’t know who is behind that account. They are anonymous
Formalization of citizen curators. The case of this NGO called CIC.
Beginning of this research, primarily descriiptive Anecdotal evidence to Suggest