These are 1-min pitch slides for the final projects in the Social Web course in 2013. stay tuned for the new presentations in 2014: http://thesocialweb2014.wordpress.com
This document contains profile information for a person named John F. Kennedy, including basic details like birthday and hometown, as well as photos, interests, and statuses posted over time. It lists activities, music, movies and other favorites, along with networks and relationship status. Photos include profile pictures as well as albums documenting the person's life. Statuses posted by friends and enemies are also documented on the profile wall.
The document discusses and analyzes 3 music videos: Fall Out Boy's "The Mighty Fall", Ed Sheeran's "A Team", and Rihanna's "We Found Love". For Fall Out Boy, the author likes that the video does not directly relate to the lyrics and allows experimentation. They discuss how Ed Sheeran's "A Team" uses black and white imagery as a metaphor for the love story in the lyrics. Finally, they note Rihanna's "We Found Love" uses effects like jump cuts and montages to abstractly capture the positive and negative aspects of relationships mentioned in the song.
The document discusses 3 music videos that the author likes and provides reasons for each. For Fall Out Boy, the videos are interesting because they are random and abstract, using effects like fire. For Ed Sheeran's "A Team", the black and white video tells the story from the lyrics about a homeless person. For Rihanna's "We Found Love", the video has effects that make you want to rewatch as it shows a couple having fun then troubles through different effects, making it abstract.
The document analyzes social media usage of popular porn stars on platforms like Facebook, Twitter, and Instagram. It finds that Mia Khalifa and Lisa Ann have the most followers overall, while officialgianna and miakhalifa1 are the most popular Instagram accounts. The analysis also examines types of posts and language used by porn stars and their fans on social media. It concludes by promoting the social media analytics platform Sotrender.
The PEGI (Pan European Game Information) system provides age ratings for video games sold in Europe, aiming to help parents make informed choices. It uses a single, unified rating scale from PEGI 3 to PEGI 18 that considers factors like violence, language, and sexual content. In 2005, the discovery of hidden sexually explicit content in Grand Theft Auto: San Andreas, dubbed the "Hot Coffee" mod, sparked controversy and led the game to be re-rated as adults-only in some regions and have future versions patched to remove the content.
This document summarizes several films and their opening title sequences. It analyzes whether the OTS is linear, non-linear, or symbolic and notes interesting or effective elements. Films discussed include True Detective, The Conjuring, The Last of Us, Evil Dead, Bad Santa, Silent Hill, The Walking Dead, Zombieland, The Thing, The Fall, and Dexter. For Dexter, it notes the OTS is linear and subtly references the main character as a serial killer, establishing the psychological subgenre and Miami setting. It explores how the OTS challenges conventions and represents the main character as a normal man to contrast his true nature.
How does your media product represent particular social groups?emihowlett
This document compares and contrasts two characters - Craig McDermott from a film opening and Mr. Harvey from The Lovely Bones. Both characters are psychopaths. While Craig has been a victim of trauma, Mr. Harvey has killed and sexually assaulted others. Their costumes appear normal to not draw attention, despite their psychological issues. Shots of Craig were made to appear powerless and vulnerable to gain audience empathy. The music in the film opening was chosen to set the mood for a psychological thriller without revealing too much.
The document summarizes a study on how responsive the top UK retailers are on social media channels like Twitter and Facebook. It finds that while most retailers are present on these channels, they are not actively engaging or responding to customers. Specifically, 50% of questions on Facebook and 75% of questions on Twitter from the study went unanswered. An even higher percentage (89%) of negative comments on Facebook were ignored by retailers.
This document contains profile information for a person named John F. Kennedy, including basic details like birthday and hometown, as well as photos, interests, and statuses posted over time. It lists activities, music, movies and other favorites, along with networks and relationship status. Photos include profile pictures as well as albums documenting the person's life. Statuses posted by friends and enemies are also documented on the profile wall.
The document discusses and analyzes 3 music videos: Fall Out Boy's "The Mighty Fall", Ed Sheeran's "A Team", and Rihanna's "We Found Love". For Fall Out Boy, the author likes that the video does not directly relate to the lyrics and allows experimentation. They discuss how Ed Sheeran's "A Team" uses black and white imagery as a metaphor for the love story in the lyrics. Finally, they note Rihanna's "We Found Love" uses effects like jump cuts and montages to abstractly capture the positive and negative aspects of relationships mentioned in the song.
The document discusses 3 music videos that the author likes and provides reasons for each. For Fall Out Boy, the videos are interesting because they are random and abstract, using effects like fire. For Ed Sheeran's "A Team", the black and white video tells the story from the lyrics about a homeless person. For Rihanna's "We Found Love", the video has effects that make you want to rewatch as it shows a couple having fun then troubles through different effects, making it abstract.
The document analyzes social media usage of popular porn stars on platforms like Facebook, Twitter, and Instagram. It finds that Mia Khalifa and Lisa Ann have the most followers overall, while officialgianna and miakhalifa1 are the most popular Instagram accounts. The analysis also examines types of posts and language used by porn stars and their fans on social media. It concludes by promoting the social media analytics platform Sotrender.
The PEGI (Pan European Game Information) system provides age ratings for video games sold in Europe, aiming to help parents make informed choices. It uses a single, unified rating scale from PEGI 3 to PEGI 18 that considers factors like violence, language, and sexual content. In 2005, the discovery of hidden sexually explicit content in Grand Theft Auto: San Andreas, dubbed the "Hot Coffee" mod, sparked controversy and led the game to be re-rated as adults-only in some regions and have future versions patched to remove the content.
This document summarizes several films and their opening title sequences. It analyzes whether the OTS is linear, non-linear, or symbolic and notes interesting or effective elements. Films discussed include True Detective, The Conjuring, The Last of Us, Evil Dead, Bad Santa, Silent Hill, The Walking Dead, Zombieland, The Thing, The Fall, and Dexter. For Dexter, it notes the OTS is linear and subtly references the main character as a serial killer, establishing the psychological subgenre and Miami setting. It explores how the OTS challenges conventions and represents the main character as a normal man to contrast his true nature.
How does your media product represent particular social groups?emihowlett
This document compares and contrasts two characters - Craig McDermott from a film opening and Mr. Harvey from The Lovely Bones. Both characters are psychopaths. While Craig has been a victim of trauma, Mr. Harvey has killed and sexually assaulted others. Their costumes appear normal to not draw attention, despite their psychological issues. Shots of Craig were made to appear powerless and vulnerable to gain audience empathy. The music in the film opening was chosen to set the mood for a psychological thriller without revealing too much.
The document summarizes a study on how responsive the top UK retailers are on social media channels like Twitter and Facebook. It finds that while most retailers are present on these channels, they are not actively engaging or responding to customers. Specifically, 50% of questions on Facebook and 75% of questions on Twitter from the study went unanswered. An even higher percentage (89%) of negative comments on Facebook were ignored by retailers.
The document contains Pan's profile information on Facebook, including his personal details like birthdate, hometown, relationship status, interests and favorite music/movies/TV shows. It lists his address and phone number as contact information and shows he has posted 7 photos and has 2 photo albums named "The Family" and "The White House" with 5 photos each.
This document outlines the production timeline, narrative, and key details for a short film exploring the seven deadly sins. It includes a list of shots involving characters like a little girl on a swing, a creepy man with a weapon, and a screaming mother. It also notes considerations like the role allocation of actors, potential locations like a park and alleyway, and possible soundtrack music.
Grand Slampoon - A quiz on cartoons (Political, social....)Sanjay KR
This document contains the rules and questions for a quiz on political, social, and sports cartoons. It states that the quiz has 10 questions with some two-part answers and details the scoring system. Sample questions are provided about cartoons depicting world leaders like Putin and Trump, as well as Indian politicians. The final question's cartoon caused controversy and led the cartoonist to flee the country.
TripAdvisor Data Reveals How Visitors from the US and UK Review Iconic SpotsPromptCloud
Every country has its own average personality. We got curious about how these personalities could be reflecting on the reviews left by people from different countries on the world’s popular landmarks and decided to do a thorough analysis.
This document provides a target audience profile for a film production. The target audience is males ages 15-35, as the film will contain adult content rated 15 by the BBFC. It will include themes of violence, crime, and detective work. The target audience enjoys being knowledgeable about films and writing reviews. They likely enjoy crime-focused movies and games like LA Noir or Heavy Rain. They also enjoy reading crime novels and listening to jazz or classical music. The psychographic profile that best fits the target audience is "The Reformer" - they value quality and intellectual entertainment over what is simply new or mainstream.
Faker is considered the best player in League of Legends of all time. He first rose to fame winning his first world championship in 2013 with his team SK Telecom T1, where he solidified his reputation with his exceptional gameplay and champion versatility. Since then he has won multiple world championships but faced defeat in 2017, after which he expressed regret and a commitment to improving. Fans and experts widely recognize Faker as the greatest player in the game's history due to his continued high-level performance, even when his team struggled, and his ability to dominate with many different champions.
The document describes four characters - Blanca Espejo, Miryam Climent, Alvaro Isla, and three extras - being cast in an upcoming film. Blanca Espejo and Alvaro Isla are being cast as the main characters, while Miryam Climent has a secondary role. The document provides each character's name, age, gender, and a brief justification for their casting.
The document discusses several potential negative effects of video games: violence, explicit sexual content, abusive/inappropriate language, addiction, stereotyping and representation, and censorship. It presents arguments both for and against the idea that each of these effects negatively impact players or society. While some effects like graphic violence are concerning to some, the document argues there is no clear evidence games cause real-world harm and alternatives like mental illness are often the root cause of issues. Censorship is debated as both protective of younger audiences but limiting of creative work.
The document analyzes the codes and conventions found in music magazine advertisements for various artists' albums. It identifies several common elements across the advertisements, including displaying the artist's name and album title prominently, including the album cover artwork, listing the record label, release date and format, and providing information on singles, tours and where to purchase tickets or the album. Specific elements vary between advertisements but generally aim to promote the artist, album and ways to engage further.
I carried out a questionnaire as part of my initial research to see what musi...Alex
The document summarizes a questionnaire conducted as part of initial research on music preferences. The questionnaire asked respondents about their gender, favorite music genre and artist, what they like to see in music videos, and where they view music videos. 30 people completed the survey, with an equal number of male and female respondents. Their favorite genres included pop, R&B, indie, rock and dance music.
The document discusses statistics from IMDb about the audiences for a rom-com and action movie. It finds that the rom-com had more female viewers, especially those under 18, showing it targeted girls. Meanwhile, the action movie surprisingly had more female viewers than male, likely because women found the male characters attractive, while men watched more for the story. Both films had most of their audiences being younger, under 18 viewers.
Understanding the Metal Community in Social Media Jim Reynolds
This document summarizes research conducted on social media discussions following the death of Jeff Hanneman, the guitarist of the metal band Slayer. The research found that the news of Hanneman's death in 2013 generated a large global conversation across various social media platforms as fans expressed their sadness. While most discussion was in English, conversations also occurred in Spanish and Portuguese as fans in South America and other regions shared their reactions. The research tracked how the story spread from North America to other parts of the world. It also examined discussions around the potential protest of Hanneman's funeral by the Westboro Baptist Church. The document concludes that the research validated assumptions about the large global impact and community around the band Slayer.
Lecture 1: Social Web Introduction (2014)Lora Aroyo
This is the first lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
This is the second lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 4: How can we MINE, ANALYSE & VISUALISE the Social Web? (2014)Lora Aroyo
This document summarizes a lecture on mining and analyzing data from the social web. It discusses the rise of "big data" from social media platforms, with billions of tweets, Facebook posts, YouTube videos and Flickr photos uploaded each year. It then discusses how this huge amount of user-generated data can provide insights into users, trends, communities and businesses. It also notes challenges in mining and analyzing social web data at web-scale. Finally, it provides examples of how different groups like scientists, historians, and companies are using social media data mining and analysis techniques.
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)Lora Aroyo
This is the third lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 7: How to STUDY the Social Web? (2014)Lora Aroyo
The document discusses how to study the social web from various perspectives. It covers analyzing large datasets to understand phenomena, modeling the web as a graph to understand its structure and growth, and studying how simple micro-level rules give rise to complex macro-level behaviors. Challenges include the web changing faster than our ability to observe it and different parts of society having conflicting needs from the web. Open questions are discussed around whether open access of information is beneficial long-term and how the web impacts society.
Lecture 5: Personalization on the Social Web (2014)Lora Aroyo
This is the fifth lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 6: Watson and the Social Web (2014), Chris WeltyLora Aroyo
The document discusses IBM's Watson computer system and cognitive computing. It provides examples of how Watson was able to defeat human champions on the game show Jeopardy by understanding natural language, and exploring how Watson's abilities could be applied to other domains like healthcare and augmented social interactions between humans and AI. It also discusses some of the technical challenges around scaling Watson to new problems and the importance of community-generated data to help with this.
The document discusses Lora Aroyo's work on crowdsourcing and human annotation. It outlines 7 myths about human annotation that influence how data is collected, and argues that disagreement among annotators is valuable rather than something to reduce. It presents Aroyo's work developing CrowdTruth, which aims to revise theories of truth for annotated data. The document also briefly describes some of Aroyo's projects involving crowdsourcing medical relations, collaborations between CrowdTruth and IBM Watson, and the growth of the CrowdTruth team over time.
The document contains Pan's profile information on Facebook, including his personal details like birthdate, hometown, relationship status, interests and favorite music/movies/TV shows. It lists his address and phone number as contact information and shows he has posted 7 photos and has 2 photo albums named "The Family" and "The White House" with 5 photos each.
This document outlines the production timeline, narrative, and key details for a short film exploring the seven deadly sins. It includes a list of shots involving characters like a little girl on a swing, a creepy man with a weapon, and a screaming mother. It also notes considerations like the role allocation of actors, potential locations like a park and alleyway, and possible soundtrack music.
Grand Slampoon - A quiz on cartoons (Political, social....)Sanjay KR
This document contains the rules and questions for a quiz on political, social, and sports cartoons. It states that the quiz has 10 questions with some two-part answers and details the scoring system. Sample questions are provided about cartoons depicting world leaders like Putin and Trump, as well as Indian politicians. The final question's cartoon caused controversy and led the cartoonist to flee the country.
TripAdvisor Data Reveals How Visitors from the US and UK Review Iconic SpotsPromptCloud
Every country has its own average personality. We got curious about how these personalities could be reflecting on the reviews left by people from different countries on the world’s popular landmarks and decided to do a thorough analysis.
This document provides a target audience profile for a film production. The target audience is males ages 15-35, as the film will contain adult content rated 15 by the BBFC. It will include themes of violence, crime, and detective work. The target audience enjoys being knowledgeable about films and writing reviews. They likely enjoy crime-focused movies and games like LA Noir or Heavy Rain. They also enjoy reading crime novels and listening to jazz or classical music. The psychographic profile that best fits the target audience is "The Reformer" - they value quality and intellectual entertainment over what is simply new or mainstream.
Faker is considered the best player in League of Legends of all time. He first rose to fame winning his first world championship in 2013 with his team SK Telecom T1, where he solidified his reputation with his exceptional gameplay and champion versatility. Since then he has won multiple world championships but faced defeat in 2017, after which he expressed regret and a commitment to improving. Fans and experts widely recognize Faker as the greatest player in the game's history due to his continued high-level performance, even when his team struggled, and his ability to dominate with many different champions.
The document describes four characters - Blanca Espejo, Miryam Climent, Alvaro Isla, and three extras - being cast in an upcoming film. Blanca Espejo and Alvaro Isla are being cast as the main characters, while Miryam Climent has a secondary role. The document provides each character's name, age, gender, and a brief justification for their casting.
The document discusses several potential negative effects of video games: violence, explicit sexual content, abusive/inappropriate language, addiction, stereotyping and representation, and censorship. It presents arguments both for and against the idea that each of these effects negatively impact players or society. While some effects like graphic violence are concerning to some, the document argues there is no clear evidence games cause real-world harm and alternatives like mental illness are often the root cause of issues. Censorship is debated as both protective of younger audiences but limiting of creative work.
The document analyzes the codes and conventions found in music magazine advertisements for various artists' albums. It identifies several common elements across the advertisements, including displaying the artist's name and album title prominently, including the album cover artwork, listing the record label, release date and format, and providing information on singles, tours and where to purchase tickets or the album. Specific elements vary between advertisements but generally aim to promote the artist, album and ways to engage further.
I carried out a questionnaire as part of my initial research to see what musi...Alex
The document summarizes a questionnaire conducted as part of initial research on music preferences. The questionnaire asked respondents about their gender, favorite music genre and artist, what they like to see in music videos, and where they view music videos. 30 people completed the survey, with an equal number of male and female respondents. Their favorite genres included pop, R&B, indie, rock and dance music.
The document discusses statistics from IMDb about the audiences for a rom-com and action movie. It finds that the rom-com had more female viewers, especially those under 18, showing it targeted girls. Meanwhile, the action movie surprisingly had more female viewers than male, likely because women found the male characters attractive, while men watched more for the story. Both films had most of their audiences being younger, under 18 viewers.
Understanding the Metal Community in Social Media Jim Reynolds
This document summarizes research conducted on social media discussions following the death of Jeff Hanneman, the guitarist of the metal band Slayer. The research found that the news of Hanneman's death in 2013 generated a large global conversation across various social media platforms as fans expressed their sadness. While most discussion was in English, conversations also occurred in Spanish and Portuguese as fans in South America and other regions shared their reactions. The research tracked how the story spread from North America to other parts of the world. It also examined discussions around the potential protest of Hanneman's funeral by the Westboro Baptist Church. The document concludes that the research validated assumptions about the large global impact and community around the band Slayer.
Lecture 1: Social Web Introduction (2014)Lora Aroyo
This is the first lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
This is the second lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 4: How can we MINE, ANALYSE & VISUALISE the Social Web? (2014)Lora Aroyo
This document summarizes a lecture on mining and analyzing data from the social web. It discusses the rise of "big data" from social media platforms, with billions of tweets, Facebook posts, YouTube videos and Flickr photos uploaded each year. It then discusses how this huge amount of user-generated data can provide insights into users, trends, communities and businesses. It also notes challenges in mining and analyzing social web data at web-scale. Finally, it provides examples of how different groups like scientists, historians, and companies are using social media data mining and analysis techniques.
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)Lora Aroyo
This is the third lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 7: How to STUDY the Social Web? (2014)Lora Aroyo
The document discusses how to study the social web from various perspectives. It covers analyzing large datasets to understand phenomena, modeling the web as a graph to understand its structure and growth, and studying how simple micro-level rules give rise to complex macro-level behaviors. Challenges include the web changing faster than our ability to observe it and different parts of society having conflicting needs from the web. Open questions are discussed around whether open access of information is beneficial long-term and how the web impacts society.
Lecture 5: Personalization on the Social Web (2014)Lora Aroyo
This is the fifth lecture in the Social Web course (2014) at the VU University Amsterdam. Visit the website for more information: http://thesocialweb2014.wordpress.com/
Lecture 6: Watson and the Social Web (2014), Chris WeltyLora Aroyo
The document discusses IBM's Watson computer system and cognitive computing. It provides examples of how Watson was able to defeat human champions on the game show Jeopardy by understanding natural language, and exploring how Watson's abilities could be applied to other domains like healthcare and augmented social interactions between humans and AI. It also discusses some of the technical challenges around scaling Watson to new problems and the importance of community-generated data to help with this.
The document discusses Lora Aroyo's work on crowdsourcing and human annotation. It outlines 7 myths about human annotation that influence how data is collected, and argues that disagreement among annotators is valuable rather than something to reduce. It presents Aroyo's work developing CrowdTruth, which aims to revise theories of truth for annotated data. The document also briefly describes some of Aroyo's projects involving crowdsourcing medical relations, collaborations between CrowdTruth and IBM Watson, and the growth of the CrowdTruth team over time.
This lecture covers requirements specification and conceptual design techniques for human-computer interaction courses. It focuses on specification techniques for requirements and conceptual UI design. The lecture discusses analyzing user profiles, contexts, and tasks which includes identifying user characteristics, goals, tasks and actions. It provides examples of constructing detailed user profiles including personas, identifying task scenarios and use cases, and analyzing workflows.
The document summarizes Lecture 3 of the Human-Computer Interaction Course 2014 given by Lora Aroyo. It discusses interaction design concepts like design principles, affordances, constraints, mappings, feedback and visibility. It also outlines four psychological principles of user interaction and how they can be applied in design. Specific concepts like consistency, affordances, mappings, feedback and cultural associations are explained in detail along with examples. Design guidelines, standards and principles for optimizing the user experience are also presented.
The document outlines Lora Aroyo's lecture on human-computer interaction for the 2014 course. The lecture covers basic design concepts, examples of good and bad designs, and insights into social dynamics and accessibility. It also discusses lab sessions to practice user needs gathering and design testing, as well as assignments applying knowledge to real use cases. The lecture aims to teach students how to design, select, and evaluate user interaction.
This lecture covers various methods for prototyping and testing user interfaces, including paper prototyping, wireframing, and usability testing techniques like heuristic evaluation and cognitive walkthrough. Low-fidelity prototyping allows for early user feedback, while high-fidelity prototyping tests detailed tasks and processes. The lecture also discusses iterative design, with prototypes refined based on user testing to develop the final design.
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine LearningLora Aroyo
The document introduces CATS4ML, a crowdsourcing challenge to discover blindspots in machine learning models by having participants label images in the Open Images Dataset that are incorrectly labeled by AI. The goal is to crowdsource adverse test sets that can capture biases and improve evaluation of AI. The challenge runs through April 2021 and invites individuals and teams to discover interesting mislabeled images and contribute them for review and inclusion in the test sets. Winning contributions will be promoted at the next CrowdCamp conference.
Harnessing Human Semantics at Scale (updated)Lora Aroyo
The document appears to be a series of tweets and posts by Lora Aroyo discussing data science and crowdsourcing techniques. Some key points discussed include harnessing human semantics at scale through crowdsourcing and nichesourcing, measuring quality and reproducibility of crowdsourced results, and experimenting with different task designs and payment models to assess their impact. Specific examples mentioned include using crowdsourcing to add detailed annotations to museum collections and to find "blindspots" in AI models through a data challenge.
Data excellence: Better data for better AILora Aroyo
The document discusses the importance of data quality and a data lifecycle approach for artificial intelligence. Some key points made include:
- A data lifecycle is needed to guide best practices for data research and development, similar to how a software lifecycle guides software engineering.
- Data quality must be addressed through practices and standards to help avoid unintended AI behaviors that can result from low quality data.
- Disagreement in annotation tasks can provide valuable signals about ambiguity and diversity rather than just being considered noise.
- Achieving high quality, reliable data requires consideration of aspects like validity, fidelity, reproducibility and maintaining data over time - an approach toward "data excellence".
This document summarizes the CHIP project, which aims to use semantic metadata about cultural heritage objects to improve personalized access and recommendations for museum visitors. The CHIP approach involves making metadata and vocabularies available as RDF/OWL, aligning and enriching the data, and using it to build a combined user model for generating virtual and physical museum tours. Experiments show semantic relations can enhance content-based recommendations for novices and experts. Follow-up projects include Agora, deploying the techniques at the Rijksmuseum in Amsterdam.
The Rijksmuseum Collection as Linked DataLora Aroyo
Presentation at ISWC2018: http://iswc2018.semanticweb.org/sessions/the-rijksmuseum-collection-as-linked-data/ of our paper published originally in the Semantic Web Journal: http://www.semantic-web-journal.net/content/rijksmuseum-collection-linked-data-2
Many museums are currently providing online access to their collections. The state of the art research in the last decade shows that it is beneficial for institutions to provide their datasets as Linked Data in order to achieve easy cross-referencing, interlinking and integration. In this paper, we present the Rijksmuseum linked dataset (accessible at http://datahub.io/dataset/rijksmuseum), along with collection and vocabulary statistics, as well as lessons learned from the process of converting the collection to Linked Data. The version of March 2016 contains over 350,000 objects, including detailed descriptions and high-quality images released under a public domain license.
Keynote at International Conference of Art Libraries 2018 @RijksmuseumLora Aroyo
Lora Aroyo presents on data science for smart cultural heritage. Some key points:
- Cultural heritage organizations are traditionally seen as inventories but aim to engage people.
- Bringing collections online increased access but interpretation was still needed for engagement.
- Data should be at the center of processes to evolve with users. There is a spectrum of truth, not just one view.
FAIRview: Responsible Video Summarization @NYCML'18Lora Aroyo
Presentation at the NYC Media Lab (NYCML2018). There is a growing demand for news videos online, with more consumers preferring to watch the news than read or listen to it. On the publisher side, there is a growing effort to use video summarization technology in order to create easy-to-consume previews (trailers) for different types of broadcast programs. How can we measure the quality of video summaries and their potential to misinform? This workshop will inform participants about automatic video summarization algorithms and how to produce more “representative” video summaries. The research presented is from the FAIRview project and is supported by the Digital News Innovation Fund (DNI Fund), which is part of the Google News Initiative.
StorySourcing: Telling Stories with Humans & MachinesLora Aroyo
This document discusses Lora Aroyo's work on using events and narratives to enhance access to cultural heritage collections. It describes early projects that linked cultural objects to events and entities to provide more context and engagement for online users. This led to work modeling historical events and extracting event properties and relationships to generate "proto-narratives". Later projects like DIVE and DIVE+ developed event-centric exploratory search tools and media suites. More recent efforts focus on crowdsourcing event tagging and curating to further engage audiences and remix archival stories. A key challenge discussed is the lack of standardized event vocabularies across cultural heritage communities.
Digital Humanities Benelux 2017: Keynote Lora AroyoLora Aroyo
This document discusses harnessing human semantics at scale through crowdsourcing and nichesourcing. It addresses making crowdsourcing efforts measurable, reproducible, engaging and sustainable. Some key points discussed are identifying crowdsourcing goals, assessing the impact of task and result designs, measuring quality and progress over time, and running continuous campaigns to reproduce and sustain results at scale.
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...Lora Aroyo
Lora Aroyo, Chiel van den Akker, Marnix van Berchum, Lodewijk
Petram, Gerard Kuys, Tommaso Caselli, Jacco van Ossenbruggen, Victor de Boer, Sabrina Sauer, Berber Hagedoorn
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017Lora Aroyo
The process of gathering ground truth data through human annotation is a major bottleneck in the use of information extraction methods. Crowdsourcing-based approaches are gaining popularity in the attempt to solve the issues related to the volume of data and lack of annotators. Typically these practices use inter-annotator agreement as a measure of quality. However, this assumption often creates issues in practice. Previous experiments we performed found that inter-annotator disagreement is usually never captured, either because the number of annotators is too small to capture the full diversity of opinion, or because the crowd data is aggregated with metrics that enforce consensus, such as majority vote. These practices create artificial data that is neither general nor reflects the ambiguity inherent in the data.
To address these issues, we proposed the method for crowdsourcing ground truth by harnessing inter-annotator disagreement. We present an alternative approach for crowdsourcing ground truth data that, instead of enforcing an agreement between annotators, captures the ambiguity inherent in semantic annotation through the use of disagreement-aware metrics for aggregating crowdsourcing responses. Based on this principle, we have implemented the CrowdTruth framework for machine-human computation, that first introduced the disagreement-aware metrics and built a pipeline to process crowdsourcing data with these metrics.
In this paper, we apply the CrowdTruth methodology to collect data over a set of diverse tasks: medical relation extraction, Twitter event identification, news event extraction and sound interpretation. We prove that capturing disagreement is essential for acquiring a high-quality ground truth. We achieve this by comparing the quality of the data aggregated with CrowdTruth metrics with a majority vote, a method which enforces consensus among annotators. By applying our analysis over a set of diverse tasks we show that, even though ambiguity manifests differently depending on the task, our theory of inter-annotator disagreement as a property of ambiguity is generalizable.
My ESWC 2017 keynote: Disrupting the Semantic Comfort ZoneLora Aroyo
Ambiguity in interpreting signs is not a new idea, yet the vast majority of research in machine interpretation of signals such as speech, language, images, video, audio, etc., tend to ignore ambiguity. This is evidenced by the fact that metrics for quality of machine understanding rely on a ground truth, in which each instance (a sentence, a photo, a sound clip, etc) is assigned a discrete label, or set of labels, and the machine’s prediction for that instance is compared to the label to determine if it is correct. This determination yields the familiar precision, recall, accuracy, and f-measure metrics, but clearly presupposes that this determination can be made. CrowdTruth is a form of collective intelligence based on a vector representation that accommodates diverse interpretation perspectives and encourages human annotators to disagree with each other, in order to expose latent elements such as ambiguity and worker quality. In other words, CrowdTruth assumes that when annotators disagree on how to label an example, it is because the example is ambiguous, the worker isn’t doing the right thing, or the task itself is not clear. In previous work on CrowdTruth, the focus was on how the disagreement signals from low quality workers and from unclear tasks can be isolated. Recently, we observed that disagreement can also signal ambiguity. The basic hypothesis is that, if workers disagree on the correct label for an example, then it will be more difficult for a machine to classify that example. The elaborate data analysis to determine if the source of the disagreement is ambiguity supports our intuition that low clarity signals ambiguity, while high clarity sentences quite obviously express one or more of the target relations. In this talk I will share the experiences and lessons learned on the path to understanding diversity in human interpretation and the ways to capture it as ground truth to enable machines to deal with such diversity.
Data Science with Human in the Loop @Faculty of Science #Leiden UniversityLora Aroyo
Software systems are becoming ever more intelligent and more useful, but the way we interact with these machines too often reveals that they don’t actually understand people. Knowledge Representation and Semantic Web focus on the scientific challenges involved in providing human knowledge in machine-readable form. However, we observe that various types of human knowledge cannot yet be captured by machines, especially when dealing with wide ranges of real-world tasks and contexts. The key scientific challenge is to provide an approach to capturing human knowledge in a way that is scalable and adequate to real-world needs. Human Computation has begun to scientifically study how human intelligence at scale can be used to methodologically improve machine-based knowledge and data management. My research is focusing on understanding human computation for improving how machine-based systems can acquire, capture and harness human knowledge and thus become even more intelligent. In this talk I will show how the CrowdTruth framework (http://crowdtruth.org) facilitates data collection, processing and analytics of human computation knowledge.
Some project links:
- http://controcurator.org/
- http://crowdtruth.org/
- http://diveproject.beeldengeluid.nl/
- http://vu-amsterdam-web-media-group.github.io/linkflows/
Europeana GA 2016: Harnessing Crowds, Niches & Professionals in the Digital AgeLora Aroyo
The document discusses harnessing crowds, niches, and professionals in the digital age. The key points are:
- Software is becoming less important as data takes center stage; cultural institutions must know their data and crowds.
- Different crowds have different expertise and abilities; nichesourcing can access specialized knowledge.
- Crowdsourcing initiatives should be part of an overall strategy and integrated into existing systems.
- Novel interactions and user-driven augmentations can empower users and align the digital and physical.
"Video Killed the Radio Star": From MTV to SnapchatLora Aroyo
The document discusses bridging the gap between people and the massive amount of online multimedia content. It proposes decomposing videos and images into smaller fragments and building a media graph to link these fragments based on semantic relationships. Both machine learning and crowdsourcing are used to analyze and enrich media with metadata at scale. The goal is to turn "mute" images and context-free videos into relationship-aware media that allows nonlinear exploration. This would provide a more engaging experience for online audiences.
UR BHatti Academy dedicated to providing the finest IT courses training in the world. Under the guidance of experienced trainer Usman Rasheed Bhatti, we have established ourselves as a professional online training firm offering unparalleled courses in Pakistan. Our academy is a trailblazer in Dijkot, being the first institute to officially provide training to all students at their preferred schedules, led by real-world industry professionals and Google certified staff.
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...AJHSSR Journal
ABSTRACT: Security plays an important role in human life and endeavors. Securing information and
disseminating are critical challenges in the present day. This study aimed at identifying innovative technologies
that aid cybercrimes and can constitute threats to cybersecurity in North Central (Middle Belt) Nigeria covering
its six States and the FCT Abuja. A survey research design was adopted. The researchers employed the use of
Google form in administering the structured questionnaire. The instruments were faced validated by one expert
each from ICT and security. Cronbach Alpha reliability Coefficient was employed and achieved 0.83 level of
coefficient. The population of the study was 200, comprising 100 undergraduate students from computer science
and Computer/Robotics Education, 80 ICT instructors, technologists and lecturers in the University and
Technical Colleges in the Middle Belt Nigeria using innovative technologies for their daily jobs and 20 officers
of the crime agency such as: Independent Corrupt Practices Commission (ICPC) andEconomic and Financial
Crimes Commission (EFCC). Three research purposes and questions as well as the hypothesis guided the study
on Five (5) point Likert scale. Data collected were analyzed using mean and standard deviation for the three
research questions while three hypotheses were tested using t-test at 0.05 level of significance. Major findings
revealed that serious steps are needed to better secure the cybers against cybercrimes. Motivation, types, threats
and strategies for the prevention of cybercrimes were identified. The study recommends that government,
organizations and individuals should place emphasis on moral development, regular training of its employees,
regular update of software, use strong password, back up data and information, produce strong cybersecurity
policy, install antivirus soft and security surveillance (CCTV) in offices in order to safeguard its employees and
properties from being hacked and vandalized.
KEYWORDS: Cybersecurity, cybercrime, cyberattack, cybercriminal, computer virus, Virtual Private Networks
(VPN).
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...AJHSSR Journal
ABSTRACT: Salman Rushdie’s novels are humorous books about serious times. His cosmopolitanism and
hybrid identity allowed him access to multiple cultures, religions, languages, dialects, and various modes of
writing. His style is often classified as magic realism, blending the imaginary with the real. He draws
inspiration from both English literature and Indian classical sources. Throughout his works, there is a lineage of
‘bastards of history’, a carnival of shameful characters scrolling all along his works. Rushdie intertwines fiction
with reality, incorporating intertextual references to Western literature in his texts, and frequently employing
mythology to explore history. This paper focuses on Rushdie’s three novels: Midnight’s Children, Shame, and
Haroun and the Sea of Stories, analyzing his postmodern storytelling techniques that aim to explore human
vices and follies while offering socio-political criticism.
KEYWORDS : Magic Realism, Rushdie, Satire, Storytelling, Transfictional Identities
Using Playlists to Increase YouTube Watch TimeSocioCosmos
Discover how to use playlists to keep viewers engaged and increase your watch time.
https://www.sociocosmos.com/product-category/youtube/youtube-comments/
ChatGPT 4o for social media step by step Guide.pdfalmutabbil
In this comprehensive guide, we'll delve into the exciting world of ChatGPT and explore
its practical applications for social media success. Learn how to craft captivating posts
that resonate with your audience, leverage automation to save precious time, and utilize
ChatGPT's analytical prowess to stay ahead of the curve.
Discover essential SEO Google tools to boost your website's performance, from Google Analytics and Search Console to Keyword Planner and Page Speed Insights.
Learn more: https://elysiandigitalservices.com/seo-google-tools/
4. That red card was SO
unfair!!!:@#pope
Nice one, Pope got
what he deserved:D
Pope did NOT deserve
that...#soccer
That tackle was
nasty. Pope out!
This ref sucks!! Pope
didnt do a thing
Pope, love you!
This game is ours.
Tweets on events during football matches
Classification of tweets
Recommend tweets to user based on club preference
& other interesting info on the match
Monday, February 17, 14
22. Movie Recommender System
! The application recommends movies based on the
age and occupation of users.
! Motivations:
! Predicting user choices based on the choices of other
similar users.
! Users gain knowledge related to major or career by
recommended movies.
! Methods:
! Using the rating of other consumers and clustering to
classify dataset.
Monday, February 17, 14
26. Stefan Perez, Suraj Ho, Andrea Bravo
Did you miss that concert you wanted to attend? Or just want to revive that
amazing gig?
Back to the Concert takes you on a journey of setlists, videos and pictures
COLLECT DATA
Just log in, select a concert and enjoy the videos, pictures and
setlists
OR
Find out which platform is used the most to share the concert
experience with you
PROCESS DATA
VISUALIZE DATA
Ziggo Dome YouTube
Total Instagram
Total YouTube
35%
10%
25%
12%
Ziggo Dome Instagram
30%
22%
8%
Ziggo Dome Facebook
60%
Total Tweets
Ziggo Dome Tweets
Total Facebook
Monday, February 17, 14
34. G22 - Twitter trend statistics
Purpose: Track & measure the distribution
and the reach of Twitter’s daily trends among
users, followers & “influential” profiles
Monday, February 17, 14