The London Eye was on fire during the 2011 England riots! Or was it? Social media are rife with lies and deception, half-truths and facts. But irrespective of a meme’s truthfulness, the rapid spread of rumours through social networks and other online media can have immediate and far-reaching consequences. In such cases, large amounts of user-generated content need to be analysed quickly, yet it is very challenging to carry out such complex analyses in real time. This talk will provide an overview of datasets and methods for automatic rumour detection, as developed by the PHEME FP7 project (http://pheme.eu). It will also discuss their practical application in journalistic practice and conclude with outstanding challenges.
The document is a collection of images and snippets of text on various topics including the history and vision behind the World Wide Web, examples of interactive online experiences, collaborations, and the power of openness and storytelling. Key points discussed are Tim Berners-Lee's vision for a universal space for sharing information globally, the potential for computers to help analyze online interactions and connections, and how openness can lead to unexpected outcomes.
The document discusses the open and collaborative nature of the web. It describes how hyperlinks can point to anything, personal or public, and how the universality of the web allows for unexpected connections and sharing of information. The dream behind the web is for it to become an embodiment of how people work, play and socialize by making interactions online. Computers could then be used to analyze online interactions and help people understand how they fit in and work together. The document advocates for openness to facilitate unexpected outcomes and sharing.
Enquire Within Upon Everything: True Stories of the Wondrous WebAlan Levine
Keynote presentation for the eLearning Consortium of Colorado 2014 conference -- their 25th year of the conference; the firs took place a month after Tim Berners-Lee got approval for his World Wide Web project.
A Victorian era book represented the best technology of its time to organize, via a crude hypertext system, a collection of world knowledge. In the hands of a young boy growing up in the 1960s, it inspired a spirit of magic, wonder, and the vision of an open portal to the world of information. As an adult, he invented the World Wide Web. Tim Berners-Lee's original vision was of "the Web being so generally used that it became a realistic mirror of the ways in which we work and play and socialize. That was that once the state of our interactions was on line, we could then use computers to help us analyse it, make sense of what we are doing, where we individually fit in, and how we can better work together."
As an open, connected space, the web remains a near infinite place we ought to revel that same wonder. Our educational careers begin in kindergarten, knowing intrinsically the value of sharing. Somewhere between there and graduate school, we lose track of this simple concept, be it worrying about theft of intellectual property or questioning the value of what we do. The open ecology of an Enquire Within Upon Everything web can undermine this limiting attitude and rekindle that sense of wonder. It's all about creating more potential serendipity. Let's celebrate the True Stories of what happens when educators share something openly on the web.
Links and more at http://go.cogdog.it/elcc2014
This document provides links to sign up for blogging platforms. The first link is for registering a blog on bloggen.be. The second link allows users to sign up for a WordPress blog on wordpress.com. Both links allow users to create their own blog online.
The document discusses social media and its implications for mental health. It defines social media as being social and allowing for the creation of multi-directional relationships, as well as being media through which content is distributed electronically. It notes that with social media, people are no longer isolated, boundaries between public and private life have blurred, and things happen online 24/7. The document provides examples of social media tools and discusses how social media enables dialogue and information sharing. It also covers privacy concerns and properties of information flow on social networks like reciprocity, durability, traceability, and scalability.
Social media can provide opportunities for marketing, PR, and customer service, but also poses risks if not managed properly. While it allows low-cost engagement with customers, it also exposes businesses to threats like account hijacking, phishing scams, and accidental sharing of inappropriate content. To mitigate risks, businesses should develop social media policies, monitor their accounts, use secure passwords and apps, and educate employees on privacy and appropriate usage.
This document provides guidance on using Twitter for libraries. It recommends starting with a strategy that identifies the purpose and goals of the library's Twitter presence. Key aspects include following relevant users, using hashtags to expand conversations, responding to questions, and amplifying community voices rather than just promoting the library. Tools and tips are provided for setting up accounts, tracking engagement, and integrating Twitter into the library's website and other online activities. Resources for further reading on using Twitter for libraries are also included.
The document discusses the PHEME project, which focuses on verifying the veracity (truthfulness) of information on social media as the "fourth challenge of big data" beyond volume, velocity, and variety. It aims to help analyze rumors and their trustworthiness by developing techniques like rumor detection and classification, modeling how claims spread across networks over time, and creating visualization tools. The goal is to help journalists and healthcare by providing open-source social intelligence and helping evaluate unreliable health-related claims patients may encounter online.
The document is a collection of images and snippets of text on various topics including the history and vision behind the World Wide Web, examples of interactive online experiences, collaborations, and the power of openness and storytelling. Key points discussed are Tim Berners-Lee's vision for a universal space for sharing information globally, the potential for computers to help analyze online interactions and connections, and how openness can lead to unexpected outcomes.
The document discusses the open and collaborative nature of the web. It describes how hyperlinks can point to anything, personal or public, and how the universality of the web allows for unexpected connections and sharing of information. The dream behind the web is for it to become an embodiment of how people work, play and socialize by making interactions online. Computers could then be used to analyze online interactions and help people understand how they fit in and work together. The document advocates for openness to facilitate unexpected outcomes and sharing.
Enquire Within Upon Everything: True Stories of the Wondrous WebAlan Levine
Keynote presentation for the eLearning Consortium of Colorado 2014 conference -- their 25th year of the conference; the firs took place a month after Tim Berners-Lee got approval for his World Wide Web project.
A Victorian era book represented the best technology of its time to organize, via a crude hypertext system, a collection of world knowledge. In the hands of a young boy growing up in the 1960s, it inspired a spirit of magic, wonder, and the vision of an open portal to the world of information. As an adult, he invented the World Wide Web. Tim Berners-Lee's original vision was of "the Web being so generally used that it became a realistic mirror of the ways in which we work and play and socialize. That was that once the state of our interactions was on line, we could then use computers to help us analyse it, make sense of what we are doing, where we individually fit in, and how we can better work together."
As an open, connected space, the web remains a near infinite place we ought to revel that same wonder. Our educational careers begin in kindergarten, knowing intrinsically the value of sharing. Somewhere between there and graduate school, we lose track of this simple concept, be it worrying about theft of intellectual property or questioning the value of what we do. The open ecology of an Enquire Within Upon Everything web can undermine this limiting attitude and rekindle that sense of wonder. It's all about creating more potential serendipity. Let's celebrate the True Stories of what happens when educators share something openly on the web.
Links and more at http://go.cogdog.it/elcc2014
This document provides links to sign up for blogging platforms. The first link is for registering a blog on bloggen.be. The second link allows users to sign up for a WordPress blog on wordpress.com. Both links allow users to create their own blog online.
The document discusses social media and its implications for mental health. It defines social media as being social and allowing for the creation of multi-directional relationships, as well as being media through which content is distributed electronically. It notes that with social media, people are no longer isolated, boundaries between public and private life have blurred, and things happen online 24/7. The document provides examples of social media tools and discusses how social media enables dialogue and information sharing. It also covers privacy concerns and properties of information flow on social networks like reciprocity, durability, traceability, and scalability.
Social media can provide opportunities for marketing, PR, and customer service, but also poses risks if not managed properly. While it allows low-cost engagement with customers, it also exposes businesses to threats like account hijacking, phishing scams, and accidental sharing of inappropriate content. To mitigate risks, businesses should develop social media policies, monitor their accounts, use secure passwords and apps, and educate employees on privacy and appropriate usage.
This document provides guidance on using Twitter for libraries. It recommends starting with a strategy that identifies the purpose and goals of the library's Twitter presence. Key aspects include following relevant users, using hashtags to expand conversations, responding to questions, and amplifying community voices rather than just promoting the library. Tools and tips are provided for setting up accounts, tracking engagement, and integrating Twitter into the library's website and other online activities. Resources for further reading on using Twitter for libraries are also included.
The document discusses the PHEME project, which focuses on verifying the veracity (truthfulness) of information on social media as the "fourth challenge of big data" beyond volume, velocity, and variety. It aims to help analyze rumors and their trustworthiness by developing techniques like rumor detection and classification, modeling how claims spread across networks over time, and creating visualization tools. The goal is to help journalists and healthcare by providing open-source social intelligence and helping evaluate unreliable health-related claims patients may encounter online.
Presentation / invited talk by Kalina Bontcheva at Digilience 2019, Oct 2019Weverify
Presentation "WEVERIFY: ASSISTIVE AI TOOLS FOR ANALYSING FALSE CONTENT, DISINFORMATION FLOWS, AND ONLINE INFLUENCE CAMPAIGNS". By Kalina Bontcheva. Oct 2019.
How to cope with new communication formatscleenknecht
The way we communicate changed dramatically over the last 15 years. We must try to overcome our scepticism and fears by learning to see the value these innovations bring.Instead of being dismissive of this changing world, you should look how you could use it in our business model...
This document provides tips for using digital and social media to promote and organize events. It outlines six key steps: 1) Establish your online presence and channels before the event, 2) Spread the word about the event using those channels and promote discussion, 3) Encourage interaction and live sharing during the event, 4) Maintain momentum after the event by continuing discussion and sharing highlights, 5) Measure the effectiveness of your efforts using available analytics, and 6) Apply lessons learned to improve future events.
This document provides an agenda and overview for an online workshop about using digital platforms like Twitter and Facebook for journalists. It discusses Ten News' three-phase digital strategy, opportunities for extending stories online, best practices for social media use, and tips for sharing photos and video. Contact information is provided for Valerio Veo and Rhiannon Elston from Ten News' digital media team to help journalists integrate digital and social media into their work.
This panel will explore how tapping your own personal Alpha Bitch can be a good thing.
Panelists: Genevieve Bell, Intel, Cathy Brooks, Social Media Hour, Elisa Camahort Page, BlogHer, and Heather Harde, TechCrunch
The document discusses using video for activism and social causes. It covers topics like how WITNESS uses video to document human rights issues, Free Range Studio's video campaigns, and how the widespread adoption of broadband and mobile devices has increased video sharing online. Questions are asked about determining goals for video, the importance of storytelling over production value, and including interactivity and calls to action in online video. Nonprofit examples are provided like the Hub, advocacy videos, and viral videos created by charities.
Hands on verification training for journalists Weverify
This document provides information about tools and resources for verifying digital media. It describes image and video verification plugins for Chrome and Firefox that allow users to analyze photos, videos and their metadata. It also introduces a tool for analyzing the spread and veracity of online rumors by examining tweets and replies. Demo links and examples are provided to illustrate how the tools work. Contact information is given for organizations involved in the projects.
1) Traditional media like newspapers have declined as people get more information online and through social media.
2) Social media allows for fast, direct, and transparent word-of-mouth communication through technology platforms like Facebook and Twitter.
3) During emergencies, government agencies should engage on social media to provide timely information and build trust with transparency.
Engage and Inspire Language Teachers and Learners with Twitter #InspireTESLfaithmarcel
This document provides an overview of using Twitter to engage and inspire language teachers and learners. It discusses foundations and statistics of Twitter, pedagogical applications, and practical tips and strategies. The presentation covers how to set up an account, engage learners, follow influential tweeters, use hashtags to join discussions, and find inspiration from other educators on using Twitter in the classroom.
The document discusses social media strategies and tools. It defines social media as online platforms that allow for two-way communication, user contributions, and sharing of multimedia content. Some key social media tools mentioned include blogs, Twitter, photo sharing sites, and wikis. The document explores how nonprofits can use social media for purposes like listening, participating in conversations, storytelling, community building, and fundraising. Proper use of social media involves listening first before participating and following basic rules.
Detection and resolution of rumours in social mediaObedullahFahad
This document provides a survey of research on the detection and resolution of rumors on social media. It discusses characteristics of rumors, how they spread on social media, challenges they pose, and approaches that have been studied for rumor detection, tracking, stance classification, and veracity classification. Key points include defining rumors and their temporal characteristics, how early studies differed from current social media analysis, challenges rumors pose in domains like news, crises, public opinion and stock markets, and machine learning approaches that have been applied to these rumor analysis tasks.
Social media: Choosing the Most Successful ToolsWeb2LLP
Web2LLP Workshop, Coventry, 8 November 2013
Using Social Media to Foster Collaborative Work in Multi-Disciplinary Cross-Border Projects
Auhtors: Jun Song and Sally Reynolds
Leslie Bradshaw // Online News Association // 9.13.08Leslie Bradshaw
In September 2008, I spent the morning training and learning from about 40 journalists at the Online News Association's annual conference. Topic du jour? How to use Twitter to live blog (as a journalist/reporter). At times, I fancy myself as both and have had a few great successes (WHCD, ISEF, et al.) Check it out and enjoy!
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
Jim Cahill discusses the debate around social media use for businesses. He argues that companies should use social media to connect with customers and demonstrate their expertise. Cahill outlines Emerson's social media strategy of using blogs, Twitter, Facebook and LinkedIn to promote thought leadership, build communities around their brands, and increase their search engine visibility in order to drive more business opportunities. While social media requires resources and comes with legal risks, Cahill believes the ability to connect directly with potential customers outweighs these challenges.
The document introduces Hypothes.is, an open-source project to enable community-moderated annotation of online information at the sentence level across different media types, without the consent of content owners. It aims to improve the credibility of information by allowing expert analysis to be overlaid on text and assessed over time. The founders have experience building early web applications and believe previous attempts at peer review failed due to issues like closed systems and lack of long-term sustainability.
Social media trends for 2014. Focus on closed / secret social network such as Snapchat. Also changes to the Facebook sortering structure, changes to Facebook reach.
The document discusses how media is shifting from traditional print to online formats and how social media is becoming an important part of the conversation. It provides an overview of different social media platforms like Twitter, Facebook, YouTube and their uses. It also offers tips on using social media for organizations, choosing the right platforms, and using social media during a crisis to engage with the public and share information.
The document discusses the rise of platforms as an important new business model and the strategic differences between platforms and traditional products. It notes that platform firms are becoming increasingly important to the economy and that network effects allow platforms to draw more value from outside contributions. Effective platform strategies focus on optimizing transactions and user value rather than protecting barriers, with competition occurring across multiple layers.
Using Playlists to Increase YouTube Watch TimeSocioCosmos
Discover how to use playlists to keep viewers engaged and increase your watch time.
https://www.sociocosmos.com/product-category/youtube/youtube-comments/
More Related Content
Similar to Detection and Resolution of Rumours in Social Media
Presentation / invited talk by Kalina Bontcheva at Digilience 2019, Oct 2019Weverify
Presentation "WEVERIFY: ASSISTIVE AI TOOLS FOR ANALYSING FALSE CONTENT, DISINFORMATION FLOWS, AND ONLINE INFLUENCE CAMPAIGNS". By Kalina Bontcheva. Oct 2019.
How to cope with new communication formatscleenknecht
The way we communicate changed dramatically over the last 15 years. We must try to overcome our scepticism and fears by learning to see the value these innovations bring.Instead of being dismissive of this changing world, you should look how you could use it in our business model...
This document provides tips for using digital and social media to promote and organize events. It outlines six key steps: 1) Establish your online presence and channels before the event, 2) Spread the word about the event using those channels and promote discussion, 3) Encourage interaction and live sharing during the event, 4) Maintain momentum after the event by continuing discussion and sharing highlights, 5) Measure the effectiveness of your efforts using available analytics, and 6) Apply lessons learned to improve future events.
This document provides an agenda and overview for an online workshop about using digital platforms like Twitter and Facebook for journalists. It discusses Ten News' three-phase digital strategy, opportunities for extending stories online, best practices for social media use, and tips for sharing photos and video. Contact information is provided for Valerio Veo and Rhiannon Elston from Ten News' digital media team to help journalists integrate digital and social media into their work.
This panel will explore how tapping your own personal Alpha Bitch can be a good thing.
Panelists: Genevieve Bell, Intel, Cathy Brooks, Social Media Hour, Elisa Camahort Page, BlogHer, and Heather Harde, TechCrunch
The document discusses using video for activism and social causes. It covers topics like how WITNESS uses video to document human rights issues, Free Range Studio's video campaigns, and how the widespread adoption of broadband and mobile devices has increased video sharing online. Questions are asked about determining goals for video, the importance of storytelling over production value, and including interactivity and calls to action in online video. Nonprofit examples are provided like the Hub, advocacy videos, and viral videos created by charities.
Hands on verification training for journalists Weverify
This document provides information about tools and resources for verifying digital media. It describes image and video verification plugins for Chrome and Firefox that allow users to analyze photos, videos and their metadata. It also introduces a tool for analyzing the spread and veracity of online rumors by examining tweets and replies. Demo links and examples are provided to illustrate how the tools work. Contact information is given for organizations involved in the projects.
1) Traditional media like newspapers have declined as people get more information online and through social media.
2) Social media allows for fast, direct, and transparent word-of-mouth communication through technology platforms like Facebook and Twitter.
3) During emergencies, government agencies should engage on social media to provide timely information and build trust with transparency.
Engage and Inspire Language Teachers and Learners with Twitter #InspireTESLfaithmarcel
This document provides an overview of using Twitter to engage and inspire language teachers and learners. It discusses foundations and statistics of Twitter, pedagogical applications, and practical tips and strategies. The presentation covers how to set up an account, engage learners, follow influential tweeters, use hashtags to join discussions, and find inspiration from other educators on using Twitter in the classroom.
The document discusses social media strategies and tools. It defines social media as online platforms that allow for two-way communication, user contributions, and sharing of multimedia content. Some key social media tools mentioned include blogs, Twitter, photo sharing sites, and wikis. The document explores how nonprofits can use social media for purposes like listening, participating in conversations, storytelling, community building, and fundraising. Proper use of social media involves listening first before participating and following basic rules.
Detection and resolution of rumours in social mediaObedullahFahad
This document provides a survey of research on the detection and resolution of rumors on social media. It discusses characteristics of rumors, how they spread on social media, challenges they pose, and approaches that have been studied for rumor detection, tracking, stance classification, and veracity classification. Key points include defining rumors and their temporal characteristics, how early studies differed from current social media analysis, challenges rumors pose in domains like news, crises, public opinion and stock markets, and machine learning approaches that have been applied to these rumor analysis tasks.
Social media: Choosing the Most Successful ToolsWeb2LLP
Web2LLP Workshop, Coventry, 8 November 2013
Using Social Media to Foster Collaborative Work in Multi-Disciplinary Cross-Border Projects
Auhtors: Jun Song and Sally Reynolds
Leslie Bradshaw // Online News Association // 9.13.08Leslie Bradshaw
In September 2008, I spent the morning training and learning from about 40 journalists at the Online News Association's annual conference. Topic du jour? How to use Twitter to live blog (as a journalist/reporter). At times, I fancy myself as both and have had a few great successes (WHCD, ISEF, et al.) Check it out and enjoy!
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
Jim Cahill discusses the debate around social media use for businesses. He argues that companies should use social media to connect with customers and demonstrate their expertise. Cahill outlines Emerson's social media strategy of using blogs, Twitter, Facebook and LinkedIn to promote thought leadership, build communities around their brands, and increase their search engine visibility in order to drive more business opportunities. While social media requires resources and comes with legal risks, Cahill believes the ability to connect directly with potential customers outweighs these challenges.
The document introduces Hypothes.is, an open-source project to enable community-moderated annotation of online information at the sentence level across different media types, without the consent of content owners. It aims to improve the credibility of information by allowing expert analysis to be overlaid on text and assessed over time. The founders have experience building early web applications and believe previous attempts at peer review failed due to issues like closed systems and lack of long-term sustainability.
Social media trends for 2014. Focus on closed / secret social network such as Snapchat. Also changes to the Facebook sortering structure, changes to Facebook reach.
The document discusses how media is shifting from traditional print to online formats and how social media is becoming an important part of the conversation. It provides an overview of different social media platforms like Twitter, Facebook, YouTube and their uses. It also offers tips on using social media for organizations, choosing the right platforms, and using social media during a crisis to engage with the public and share information.
The document discusses the rise of platforms as an important new business model and the strategic differences between platforms and traditional products. It notes that platform firms are becoming increasingly important to the economy and that network effects allow platforms to draw more value from outside contributions. Effective platform strategies focus on optimizing transactions and user value rather than protecting barriers, with competition occurring across multiple layers.
Similar to Detection and Resolution of Rumours in Social Media (20)
Using Playlists to Increase YouTube Watch TimeSocioCosmos
Discover how to use playlists to keep viewers engaged and increase your watch time.
https://www.sociocosmos.com/product-category/youtube/youtube-comments/
Discover essential SEO Google tools to boost your website's performance, from Google Analytics and Search Console to Keyword Planner and Page Speed Insights.
Learn more: https://elysiandigitalservices.com/seo-google-tools/
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...AJHSSR Journal
ABSTRACT: Salman Rushdie’s novels are humorous books about serious times. His cosmopolitanism and
hybrid identity allowed him access to multiple cultures, religions, languages, dialects, and various modes of
writing. His style is often classified as magic realism, blending the imaginary with the real. He draws
inspiration from both English literature and Indian classical sources. Throughout his works, there is a lineage of
‘bastards of history’, a carnival of shameful characters scrolling all along his works. Rushdie intertwines fiction
with reality, incorporating intertextual references to Western literature in his texts, and frequently employing
mythology to explore history. This paper focuses on Rushdie’s three novels: Midnight’s Children, Shame, and
Haroun and the Sea of Stories, analyzing his postmodern storytelling techniques that aim to explore human
vices and follies while offering socio-political criticism.
KEYWORDS : Magic Realism, Rushdie, Satire, Storytelling, Transfictional Identities
Facebook Fan Page Profits to boost your profits today!Rohit Gupta
Discover how to turn your Facebook Fan Page into a powerful tool for generating profits! Whether you're an entrepreneur, marketer, or small business owner, learn proven strategies to engage your audience, increase followers, and monetize your fan page effectively. From content creation and engagement tactics to advertising and conversion optimization, unlock the secrets to maximizing your business's success on Facebook. Start leveraging your fan page to boost your profits today!
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESAJHSSR Journal
ABSTRACT: Illegal logging poses significant environmental, economic, and social challenges worldwide. This
research explores the problems associated with illegal logging in the present and future, shedding light on the
multifaceted nature of this issue and the accompanying challenges faced by governments, organizations, and
communities. The study employs a comprehensive literature review to analyze the current state of illegal
logging, its causes, and its consequences. It examines the environmental impact of deforestation, including
biodiversity loss, habitat degradation, and climate change. The researchers identify the challenges faced in
combating illegal logging in the present and anticipate future obstacles. It considers illegal logging networks'
complex and elusive nature, the limited enforcement capacity, and the need for international cooperation and
coordination. The study also examines the adoption and effectiveness of policies, regulations, and technological
advancements in curbing illegal logging practices in Davao City.
Keywords -Problems and Challenges, Cultural Disruptions, Anticipate future problems.
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...AJHSSR Journal
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
KALYAN MATKA | MATKA RESULT | KALYAN MATKA TIPS | SATTA MATKA | MATKA.COM | MATKA PANA JODI TODAY | BATTA SATKA | MATKA PATTI JODI NUMBER | MATKA RESULTS | MATKA CHART | MATKA JODI | SATTA COM | FULL RATE GAME | MATKA GAME | MATKA WAPKA | ALL MATKA RESULT LIVE ONLINE | MATKA RESULT | KALYAN MATKA RESULT | DPBOSS MATKA 143 | MAIN MATKA-❾❸❹❽❺❾❼❾❾⓿
9861615390 Satta Matka | Satta Matka Results | Kalyan Matka Tips | Free Matka Results | SattaMatka | Satta Matka Tips | Satta Matka Guessing | Satta Matka Number | Satta Matka 143 | Online All Satta Matka Result | Satta Matka Guessing | Satta Matka Chart | Satta Matka King | Satta Matka Trick | Satta Matka Tips | Satta Matka Number | Satta Matka Software | Matka Chart | Matka Result | Satta Matka Guessing | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips | Satta Matka | Matka Tips | Satta King | Satta Game | Satta Result | Matka Result | Satta Matka Result | Satta Matka | Kalyan Matka | Kalyan Matka Tips | Matka Result | Satta Matka Result | Satta Matka Tips
Welcome to our captivating YouTube channel, where the past comes alive with intriguing history, fascinating fun facts, and inspiring motivational content. Join us on a journey through time as we unravel the mysteries of the past, share delightful nuggets of knowledge, and ignite the spark of motivation within you. Get ready to explore the depths of history, uncover hidden gems of information, and embark on a quest for personal growth and inspiration. Subscribe now for a blend of education, entertainment, and empowerment that will leave you enlightened and uplifted after every video.
2. PHEME http://www.pheme.eu
Veracity: the 4th
V of Big Data
I coined the term phemes
memes are thematic motifs that spread through social
media in ways analogous to genetic traits
phemes add truthfulness and deception to the mix
named after ancient Greek Pheme,“embodiment of
fame and notoriety, her favour being notability, her wrath
being scandalous rumours"
2
Focus on a fourth crucial challenge: veracity
http://en.wikipedia.org/wiki/Pheme
3. PHEME http://www.pheme.eu
What is a Rumour?
Our definition
“a circulating story of questionable veracity, which is
apparently credible but hard to verify, and produces
sufficient skepticism and/or anxiety”
3
7. PHEME http://www.pheme.eu
Rumour analysis: The Challenges
Journalists do it mostly manually
Rumour analysis is challenging
Some rumours could take days, weeks or even months
to die out (or even never!)
Ill-meaning humans can currently outsmart computers
(and humans) and appear genuine
Role of conversational threads in rumour analysis
Tweet-rot and deletions
Real-time analysis of temporally dynamic phemes
8. PHEME http://www.pheme.eu
What: High Level Goal
Create a computational framework for
automatic discovery and verification of
rumours, at scale and fast
Draw on:
NLP: what’s said
web science: a priori knowledge from Linked Data
social science: who spread it, why and how
information visualisation: visual analytics
9. PHEME http://www.pheme.eu
Content verification
● A number of projects focussed on detecting
inaccurate reports, which has recently been
relabelled as “fake news”.
● Most projects deal with what is known as
“fact-checking”, comparing sources to validate
reports, with an assumption that other
sources exist.
10. PHEME http://www.pheme.eu
Work by others on rumours
▪ Emergent.info - the most
similar project to PHEME -
tracking unverified reports
for debunking/confirmation
▪ The project has however
been discontinued
▪ Owing to the project being
totally manual and lacking
automation, maintenance
was not viable
11. PHEME http://www.pheme.eu
Work by others on rumours
▪ Other projects on rumours largely focussed on
visualisation, tracking rumours input by the user:
17. PHEME http://www.pheme.eu
Dataset Overview
Data collection and sampling
Twitter public stream
Retweet threshold to establish salience
Journalists identified rumourous source tweets
and grouped them into stories
19. PHEME http://www.pheme.eu
Analysis Stages
1)Rumour detection: identify pieces of
information that need to be verified.
2)Rumour stance classification: classify public
stance towards the rumour.
3)Veracity classification: determine if a
rumour is true, false, or remains unverified.
21. PHEME http://www.pheme.eu
Rumour detection
▪Classification problem
– Tweet level
– Classes: rumour or non-rumour
▪Why
– Identify tweets reporting unverified information.
– Necessary for subsequent stance and veracity
classification.
– “Michael Brown was involved in a robbery before
being shot by police” -> needs context
22. PHEME http://www.pheme.eu
Rumour detection: Results
A. Zubiaga, M. Liakata, R. Procter . Exploiting Context for Rumour Detection in Social Media. International
Conference on Social Informatics, 109-123. 2017.
23. PHEME http://www.pheme.eu
Rumour Stance classification
▪Classification Problem
– Tweet level
– Classes: support, deny, question, comment
▪Why
– Show journalists the unfolding online debates on a
given pheme
– Aid veracity classification
25. PHEME http://www.pheme.eu
Rumour Stance & Veracity
▪ Manual Analysis [Mendoza et al. 2010]
▪ True rumours: 95% “support”, 4% “questioning” and
only 0.4% were “denies”
→ True rumours are largely supported by other
Twitter users
▪ False rumours: 38% “denies” and 17% “questioning”
→ Stance is an important factor for verification step
26. PHEME http://www.pheme.eu
Features: Stance Classification
▪ Syntactic: #negations, POS
▪ Lexical: e.g. bag of words, key words
▪ Lexicon: word embeddings, brown clusters
▪ Indicator: e.g. “this is nonsense”, “is a hoax”
▪ User metadata: e.g. verified, #followers/followees
▪ Semantic: e.g. emoticons, sentiment, NEs
▪ Message metadata: e.g. length of the post, URL
▪ Content formatting: e.g. capital words ratio
▪ Punctuation: e.g. ?, …, !
A. Aker, L. Derczynski, K. Bontcheva. Simple Open Stance Classification for Rumour Analysis. Recent Advances in
Natural Language Processing, 2017.
27. PHEME http://www.pheme.eu
USFD on RumourEval Data
▪ Applying traditional ML
▪ Focus on “problem specific” features
– Capturing Surprise, Doubt, Certainty and Support towards
rumourous tweets
– Similarity to initial tweet
▪ Random Forest (best performing traditional ML) with
features reported by related work yields to 76.54 accuracy
▪ Adding “problem specific” features yields 79.02 accuracy
(LSTM 78.4).
A. Aker, L. Derczynski, K. Bontcheva. Simple Open Stance Classification for Rumour Analysis. Recent Advances in
Natural Language Processing, 2017.
28. PHEME http://www.pheme.eu
Stance Classification: Findings
▪ Supporting tweets are more likely to include links.
▪ i.e. provide evidence
▪ Looking at the temporal dimension, S/D/Q tend to occur in
early stages of a rumour, and then mostly comments later
▪ We’ve looked at persistence, finding that supporting users
tend to post more tweets, i.e., further insisting
https://gate.ac.uk/wiki/pheme-stance.html
30. PHEME http://www.pheme.eu
Features
▪Features similar to stance classification
▪NB: those features need to be computed for
the entire rumour instead of individual posts
▪E.g. adding feature values over all posts within
the rumour and performing normalisation.
▪ Stance of individual posts is an important feature
A. Aker, L. Derczynski, K. Bontcheva. Simple Open Stance Classification for Rumour Analysis. Recent Advances in
Natural Language Processing, 2017.
34. PHEME http://www.pheme.eu
Acknowledgements
Project partially supported by the European Union/EU under the
Information and Communication Technologies (ICT) theme of
the 7th Framework Programme
for R&D (FP7), grant PHEME (611233)”
34
This document does not represent the opinion of the European Community, and the European Community is not responsible for any use
that might be made of its content
Editor's Notes
Phemes are
As soon as a news story broke and the journalists informed us about the event being of interest, we set up the data collection process for that event, tracking the main hashtags and keywords pertaining to the event as a whole. Twitter's public stream was accessed through the 'statuses/filter' endpoint4, making use of the 'track' parameter to specify the keywords. Note that while we may have missed the very early tweets about an event for launching the collection slightly after the news breaks, we still keep collecting subsequent retweets to those early tweets, which makes it much more likely to retrieve the most retweeted tweets from the very first minutes.
Once the tweets below the source tweet are scraped, the script performs the following two steps to make sure that the whole conversation started by the source tweet is retrieved: (1) The script also checks if there are more pages with responses (since Twitter pages the responses), and (2) the script then retrieves, recursively, the responses to all those responding tweets, which enables retrieval of nested interactions. This process gives us the tweet IDs of all the tweets responding to the source tweet, with which we can form the whole tree. To collect all the metadata for those tweets, we then access the Twitter API using the tweet IDs; specifically, we use the 'statuses/lookup’ endpoint6, which provides all the metadata for up to 100 tweets at once.