Talk given at the American Academy of Health Behavior conference in San Antonio Texas on exploring and elevating healthy behaviors with social technologies.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
Here are our Slides from the Data Conference last Thursday. They highlight the public data tools we have developed using demographic, financial, and performance data.
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
Opening talk at Singapore Symposium on Sentiment Analysis (S3A), February 6, 2015, Singapore. http://s3a.sentic.net/#s3a2015
Abstract
With the rapid rise in the popularity of social media, and near ubiquitous mobile access, the sharing of observations and opinions has become common-place. This has given us an unprecedented access to the pulse of a populace and the ability to perform analytics on social data to support a variety of socially intelligent applications -- be it for brand tracking and management, crisis coordination, organizing revolutions or promoting social development in underdeveloped and developing countries.
I will review: 1) understanding and analysis of informal text, esp. microblogs (e.g., issues of cultural entity extraction and role of semantic/background knowledge enhanced techniques), and 2) how we built Twitris, a comprehensive social media analytics (social intelligence) platform.
I will describe the analysis capabilities along three dimensions: spatio-temporal-thematic, people-content-network, and sentiment-emption-intent. I will couple technical insights with identification of computational techniques and real-world examples using live demos of Twitris (http://twitris2.knoesis.org).
Context-Aware Harassment Detection on Social Media
is an inter-disciplinary project among the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), the Department of Psychology, and Center for Urban and Public Affairs (CUPA) at Wright State University. The aim of this project is to develop comprehensive and reliable context-aware techniques (using machine learning, text mining, natural language processing, and social network analysis) to glean information about the people involved and their interconnected network of relationships, and to determine and evaluate potential harassment and harassers. An interdisciplinary team of computer scientists, social scientists, urban and public affairs professionals, educators, and the participation of college and high schools students in the research will ensure wide impact of scientific research on the support for safe social interactions.
Value proposition of open government data - presentation to International Open Government Data Conference by Alexander Howard, Government 2.0 Correspondent, O'Reilly Media
The proposed research topic is whether parents', teachers', and mental health professionals' digital wisdom and self-efficacy predict participation in cyber deviance dialogue. This topic is important to family psychology because cyber transgression is a new issue affecting responsible adults. While laws have been made, adults vary in cyber knowledge and responsibility for teaching children cyber ethics is unclear. The research problem is that the literature does not examine how families, schools, and communities can collaborate on cyber safety education or adults' self-efficacy in teaching children these topics, despite technology changing communication and some cyber issues originating at home.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
Here are our Slides from the Data Conference last Thursday. They highlight the public data tools we have developed using demographic, financial, and performance data.
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
Opening talk at Singapore Symposium on Sentiment Analysis (S3A), February 6, 2015, Singapore. http://s3a.sentic.net/#s3a2015
Abstract
With the rapid rise in the popularity of social media, and near ubiquitous mobile access, the sharing of observations and opinions has become common-place. This has given us an unprecedented access to the pulse of a populace and the ability to perform analytics on social data to support a variety of socially intelligent applications -- be it for brand tracking and management, crisis coordination, organizing revolutions or promoting social development in underdeveloped and developing countries.
I will review: 1) understanding and analysis of informal text, esp. microblogs (e.g., issues of cultural entity extraction and role of semantic/background knowledge enhanced techniques), and 2) how we built Twitris, a comprehensive social media analytics (social intelligence) platform.
I will describe the analysis capabilities along three dimensions: spatio-temporal-thematic, people-content-network, and sentiment-emption-intent. I will couple technical insights with identification of computational techniques and real-world examples using live demos of Twitris (http://twitris2.knoesis.org).
Context-Aware Harassment Detection on Social Media
is an inter-disciplinary project among the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), the Department of Psychology, and Center for Urban and Public Affairs (CUPA) at Wright State University. The aim of this project is to develop comprehensive and reliable context-aware techniques (using machine learning, text mining, natural language processing, and social network analysis) to glean information about the people involved and their interconnected network of relationships, and to determine and evaluate potential harassment and harassers. An interdisciplinary team of computer scientists, social scientists, urban and public affairs professionals, educators, and the participation of college and high schools students in the research will ensure wide impact of scientific research on the support for safe social interactions.
Value proposition of open government data - presentation to International Open Government Data Conference by Alexander Howard, Government 2.0 Correspondent, O'Reilly Media
The proposed research topic is whether parents', teachers', and mental health professionals' digital wisdom and self-efficacy predict participation in cyber deviance dialogue. This topic is important to family psychology because cyber transgression is a new issue affecting responsible adults. While laws have been made, adults vary in cyber knowledge and responsibility for teaching children cyber ethics is unclear. The research problem is that the literature does not examine how families, schools, and communities can collaborate on cyber safety education or adults' self-efficacy in teaching children these topics, despite technology changing communication and some cyber issues originating at home.
Smart Data - How you and I will exploit Big Data for personalized digital hea...Amit Sheth
Amit Sheth's keynote at IEEE BigData 2014, Oct 29, 2014.
Abstract from:
http://cci.drexel.edu/bigdata/bigdata2014/keynotespeech.htm
Big Data has captured a lot of interest in industry, with the emphasis on the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity, and their applications to drive value for businesses. Recently, there is rapid growth in situations where a big data challenge relates to making individually relevant decisions. A key example is personalized digital health that related to taking better decisions about our health, fitness, and well-being. Consider for instance, understanding the reasons for and avoiding an asthma attack based on Big Data in the form of personal health signals (e.g., physiological data measured by devices/sensors or Internet of Things around humans, on the humans, and inside/within the humans), public health signals (e.g., information coming from the healthcare system such as hospital admissions), and population health signals (such as Tweets by people related to asthma occurrences and allergens, Web services providing pollen and smog information). However, no individual has the ability to process all these data without the help of appropriate technology, and each human has different set of relevant data!
In this talk, I will describe Smart Data that is realized by extracting value from Big Data, to benefit not just large companies but each individual. If my child is an asthma patient, for all the data relevant to my child with the four V-challenges, what I care about is simply, “How is her current health, and what are the risk of having an asthma attack in her current situation (now and today), especially if that risk has changed?” As I will show, Smart Data that gives such personalized and actionable information will need to utilize metadata, use domain specific knowledge, employ semantics and intelligent processing, and go beyond traditional reliance on ML and NLP. I will motivate the need for a synergistic combination of techniques similar to the close interworking of the top brain and the bottom brain in the cognitive models.
For harnessing volume, I will discuss the concept of Semantic Perception, that is, how to convert massive amounts of data into information, meaning, and insight useful for human decision-making. For dealing with Variety, I will discuss experience in using agreement represented in the form of ontologies, domain models, or vocabularies, to support semantic interoperability and integration. For Velocity, I will discuss somewhat more recent work on Continuous Semantics, which seeks to use dynamically created models of new objects, concepts, and relationships, using them to better understand new cues in the data that capture rapidly evolving events and situations.
Smart Data applications in development at Kno.e.sis come from the domains of personalized health, energy, disaster response, and smart city.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
This document summarizes a project investigating the use of big data to advance social science knowledge. It introduces the project leaders and discusses data sources and scope. It then focuses on defining big data, discussing how digital data represents real-world objects and phenomena, and the opportunities and limits this presents. Challenges of using big data to gauge public opinion are also examined, such as issues of representativeness, reliability, and replicability. The document concludes by listing project papers on this topic.
The document provides an overview of funding and active projects at Kno.e.sis as of December 2015. Key details include total extramural funds exceeding $8.3 million with the majority obtained that year from competitive NSF and NIH sources. Active projects focus on areas such as context-aware harassment detection on social media, monitoring drug trends on social media, disaster management using social and physical sensing, and modeling social behavior for healthcare utilization in depression. The summary highlights student and faculty involvement and accomplishments across multiple funded projects.
This document summarizes a project on social and physical sensing enabled decision support for disaster management. The project involves a collaboration between Kno.e.sis at Wright State University and Ohio State University. It aims to extract relevant information from citizen sensed data, develop adaptive models of hurricane storm surge coupled with citizen and remote sensed data, and provide tools to assist first responders by integrating data from multiple sources. The project will analyze multimodal data and develop methodologies to predict consequences of infrastructure damage. It is supported by the National Science Foundation.
Sensors, Signals and Sense-making in Human-Energy RelationshipsMartha Russell
This document discusses sensors, signals, and sense-making in human-energy relationships. It addresses the complex issues involved which require interdisciplinary and cross-sector collaboration. Humans must be considered at every stage of technology design, development, and implementation. The document references various studies and datasets on analyzing energy-related conversations on social media to better understand changing consumer energy behavior. It also discusses networks of energy semantics and transforming business ecosystems through shared visions and coalitions. Improving decision making is addressed, including reducing bias and balancing human and automated decision systems.
Kno.e.sis Approach to Impactful Research & Training for Exceptional CareersAmit Sheth
Abstract
Kno.e.sis (http://knoesis.org) is a world-class research center that uses semantic, cognitive, and perceptual computing for gathering insights from physical/IoT, cyber/Web, and social and enterprise (e.g., clinical) big data. We innovate and employ semantic web, machine learning, NLP/IR, data mining, network science and highly scalable computing techniques. Our highly interdisciplinary research impacts health and clinical applications, biomedical and translational research, epidemiology, cognitive science, social good, policy, development, etc. A majority of our $12+ million in active funds come from the NSF and NIH. In this talk, I will provide an overview of some of our major research projects.
Kno.e.sis is highly successful in its primary mission of exceptional student outcomes: our students have exceptional publication and real-world impact and our PhDs compete with their counterparts from top 10 schools for initial jobs in research universities, top industry research labs, and highly competitive companies. A key reason for Kno.e.sis' success is its unique work culture involving teamwork to solve complex problems. Practically all our work involves real-world challenges, real-world data, interdisciplinary collaborators, path-breaking research to solve challenges, real-world deployments, real-world use, and measurable real-world impact.
In this talk, I will also seek to discuss our choice of research topics and our unique ecosystem that prepares our students for exceptional careers.
Introduction to Computational Social ScienceTalha OZ
This document provides an introduction to computational social science through summaries of key concepts and examples. It discusses three main challenges in computational social science: computational modeling of complex social phenomena; analysis of large social data sets from sources like cell phones and social media; and virtual lab-style social experiments. It also summarizes approaches like agent-based modeling, where autonomous agents interact and adapt according to rules, and contrasts this with traditional modeling approaches. Examples of computational social science topics and tools are given, such as social network analysis, geospatial analysis, and machine learning. The document advocates for agent-based modeling to flexibly capture social dynamics in a way that mathematical models cannot.
This document summarizes several research projects related to big data and social science knowledge. It discusses projects that analyzed large social media platforms like Facebook, Twitter, and Wikipedia to study information diffusion and social influences. It also discusses challenges like securing access to commercial data and ensuring replicability of findings. Examples demonstrate how big data can provide novel insights but are limited by the objects studied and incomplete representation of populations. The document discusses debates around the implications of big data for privacy, prediction, exclusion, and manipulation. It argues that knowledge depends on how research technologies advance knowledge within ethical and legal frameworks.
This document provides an agenda and background information for a Meet 'N' Greet social event on social computing. The agenda includes a welcome, getting to know each other through brief presentations, and discussing next steps and ongoing activities. The background explains the goals of building an interdisciplinary community and collaboration around social computing research across various University of Minnesota departments and disciplines. Brief biographies of committee members are also included, describing their relevant research interests.
Uma visão geral sobre Reality Mining e pesquisas que foram e estão sendo desenvolvidas neste contexto. O conteúdo dos slides foram extraídos dos estudos e experimentos do MIT Media Lab (http://hd.media.mit.edu/) dirigido pelo Prof. Alex Pentland
SDAL addresses social science in new ways that will transform how we understand the world. Among our goals: creating smart and resilient cities, combatting homelessness, understanding the spread of disease and developing effective public health responses, identifying innovation drivers, and meeting the demand for educated graduates in the field.
In this introductory lecture titled, "conceptualising and measuring human anxiety on the Internet" the audience is explained what new or interesting the dissertation has to offer and how it is connected to the human-computer interaction fields and to the society in general.
This document discusses several issues and controversies surrounding the use of big data in social sciences. It summarizes the Facebook emotional contagion experiment in 2014, noting criticisms around informed consent and replication. It also discusses the failure of Google Flu Trends and debates around various Facebook studies. Key themes discussed are the epistemological implications of data-driven science, relationships between knowledge and power, and the need for robust and replicable methodologies when using big data in social research.
Reality mining aims to map an organization's cognitive infrastructure by capturing detailed data on human networks using sensors. It analyzes conversations, topics, locations and relationships between individuals to infer expertise, social networks and how communication may change. This could help with applications like knowledge management, team formation and understanding global influences in an organization. However, it also raises privacy concerns that would need to be addressed.
Social sciences have not kept up with modern digital society and big data opportunities. Social physics seeks to understand how information flows translate to behavior changes, using big data from various sources about human interactions and communications. It views social learning as the dominant way behaviors change, through exploring new ideas in social networks and engaging with ideas through norms, examples, and social pressure. Understanding these exploration and engagement processes could provide insights into societal changes.
Data-driven decision-making, including greater accuracy, precision, efficiency, and responsibility in the use of data.
Fuel rapid innovation through faster iterative learning – fail fast, learn faster, execute smarter.
Online Communities in Citizen Science & BirdCamsAndrea Wiggins
This document discusses online citizen science communities and bird cams. It describes how citizen science involves members of the public engaging in real-world scientific research through crowdsourcing and collaboration. It then focuses on how bird cams, which livestream nests and feeders, have emerged as online communities where people can observe and discuss bird activity in real-time. While most viewers never chat, many read discussions. Bird cams present unexpected outcomes like self-organizing social groups and emotional engagement. Sustainability relies on donations, merchandise, and fundraising by chat participants.
Public Libraries and Academic Libraries: Digital Partners?"James Neal
The growth and development of technology, computers, software, and the internet have changed the ways in which libraries function, operate, and are being used by the communities they serve. Public libraries have been playing a bit of catch-up in many ways related to the growth of digital services due to the fact that public libraries are also still serving users whose information needs include more traditional resources. Is there a common ground in mission and scope that public libraries and academic libraries serve together? In what ways are these services complementary and what are the ways in which each of these institutions can learn from and share with one another? Audio available: http://scholarslab.org/podcasts/podcast-james-neal/
This document discusses key tools and techniques for effective stormwater sampling projects. It emphasizes the importance of planning, preparing properly, and maintaining sample integrity. The presentation covers determining sampling requirements, selecting laboratories, using proper sampling equipment and techniques, managing samples, reviewing results, and documenting the process. The overall goal is to help project managers and field staff successfully plan, execute, and learn from their stormwater sampling efforts.
The Supportive Behaviors of Older Social Network Site UsersFred Stutzman
Fred Stutzman, Valeda Stull, Cheryl Thompson
This paper outlines a new multi-wave study of older adult users of social network sites. The goal of the study is to develop a grounded understanding of the phenomenon of older user social network site adoption, to identify and investigate ways in which the social network site facilitates access to supportive resources, and to evaluate the outcomes of access to supportive resources in social network sites. The paper draws on a preliminary analysis of 15 semi- structured interviews with older, late-adopting social network site users to present emergent themes. Reconnection is identified as a salient use motivator among older users of social network sites. We then explore the social network sites as a location of social support for older users; Emotional and informational support are readily provisioned on social network sites, whereas instrumental support is not commonly requested or provisioned. The role of cross- contextual disclosure and technological alternatives are briefly explored as potential explanatory variables.
Smart Data - How you and I will exploit Big Data for personalized digital hea...Amit Sheth
Amit Sheth's keynote at IEEE BigData 2014, Oct 29, 2014.
Abstract from:
http://cci.drexel.edu/bigdata/bigdata2014/keynotespeech.htm
Big Data has captured a lot of interest in industry, with the emphasis on the challenges of the four Vs of Big Data: Volume, Variety, Velocity, and Veracity, and their applications to drive value for businesses. Recently, there is rapid growth in situations where a big data challenge relates to making individually relevant decisions. A key example is personalized digital health that related to taking better decisions about our health, fitness, and well-being. Consider for instance, understanding the reasons for and avoiding an asthma attack based on Big Data in the form of personal health signals (e.g., physiological data measured by devices/sensors or Internet of Things around humans, on the humans, and inside/within the humans), public health signals (e.g., information coming from the healthcare system such as hospital admissions), and population health signals (such as Tweets by people related to asthma occurrences and allergens, Web services providing pollen and smog information). However, no individual has the ability to process all these data without the help of appropriate technology, and each human has different set of relevant data!
In this talk, I will describe Smart Data that is realized by extracting value from Big Data, to benefit not just large companies but each individual. If my child is an asthma patient, for all the data relevant to my child with the four V-challenges, what I care about is simply, “How is her current health, and what are the risk of having an asthma attack in her current situation (now and today), especially if that risk has changed?” As I will show, Smart Data that gives such personalized and actionable information will need to utilize metadata, use domain specific knowledge, employ semantics and intelligent processing, and go beyond traditional reliance on ML and NLP. I will motivate the need for a synergistic combination of techniques similar to the close interworking of the top brain and the bottom brain in the cognitive models.
For harnessing volume, I will discuss the concept of Semantic Perception, that is, how to convert massive amounts of data into information, meaning, and insight useful for human decision-making. For dealing with Variety, I will discuss experience in using agreement represented in the form of ontologies, domain models, or vocabularies, to support semantic interoperability and integration. For Velocity, I will discuss somewhat more recent work on Continuous Semantics, which seeks to use dynamically created models of new objects, concepts, and relationships, using them to better understand new cues in the data that capture rapidly evolving events and situations.
Smart Data applications in development at Kno.e.sis come from the domains of personalized health, energy, disaster response, and smart city.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
This document summarizes a project investigating the use of big data to advance social science knowledge. It introduces the project leaders and discusses data sources and scope. It then focuses on defining big data, discussing how digital data represents real-world objects and phenomena, and the opportunities and limits this presents. Challenges of using big data to gauge public opinion are also examined, such as issues of representativeness, reliability, and replicability. The document concludes by listing project papers on this topic.
The document provides an overview of funding and active projects at Kno.e.sis as of December 2015. Key details include total extramural funds exceeding $8.3 million with the majority obtained that year from competitive NSF and NIH sources. Active projects focus on areas such as context-aware harassment detection on social media, monitoring drug trends on social media, disaster management using social and physical sensing, and modeling social behavior for healthcare utilization in depression. The summary highlights student and faculty involvement and accomplishments across multiple funded projects.
This document summarizes a project on social and physical sensing enabled decision support for disaster management. The project involves a collaboration between Kno.e.sis at Wright State University and Ohio State University. It aims to extract relevant information from citizen sensed data, develop adaptive models of hurricane storm surge coupled with citizen and remote sensed data, and provide tools to assist first responders by integrating data from multiple sources. The project will analyze multimodal data and develop methodologies to predict consequences of infrastructure damage. It is supported by the National Science Foundation.
Sensors, Signals and Sense-making in Human-Energy RelationshipsMartha Russell
This document discusses sensors, signals, and sense-making in human-energy relationships. It addresses the complex issues involved which require interdisciplinary and cross-sector collaboration. Humans must be considered at every stage of technology design, development, and implementation. The document references various studies and datasets on analyzing energy-related conversations on social media to better understand changing consumer energy behavior. It also discusses networks of energy semantics and transforming business ecosystems through shared visions and coalitions. Improving decision making is addressed, including reducing bias and balancing human and automated decision systems.
Kno.e.sis Approach to Impactful Research & Training for Exceptional CareersAmit Sheth
Abstract
Kno.e.sis (http://knoesis.org) is a world-class research center that uses semantic, cognitive, and perceptual computing for gathering insights from physical/IoT, cyber/Web, and social and enterprise (e.g., clinical) big data. We innovate and employ semantic web, machine learning, NLP/IR, data mining, network science and highly scalable computing techniques. Our highly interdisciplinary research impacts health and clinical applications, biomedical and translational research, epidemiology, cognitive science, social good, policy, development, etc. A majority of our $12+ million in active funds come from the NSF and NIH. In this talk, I will provide an overview of some of our major research projects.
Kno.e.sis is highly successful in its primary mission of exceptional student outcomes: our students have exceptional publication and real-world impact and our PhDs compete with their counterparts from top 10 schools for initial jobs in research universities, top industry research labs, and highly competitive companies. A key reason for Kno.e.sis' success is its unique work culture involving teamwork to solve complex problems. Practically all our work involves real-world challenges, real-world data, interdisciplinary collaborators, path-breaking research to solve challenges, real-world deployments, real-world use, and measurable real-world impact.
In this talk, I will also seek to discuss our choice of research topics and our unique ecosystem that prepares our students for exceptional careers.
Introduction to Computational Social ScienceTalha OZ
This document provides an introduction to computational social science through summaries of key concepts and examples. It discusses three main challenges in computational social science: computational modeling of complex social phenomena; analysis of large social data sets from sources like cell phones and social media; and virtual lab-style social experiments. It also summarizes approaches like agent-based modeling, where autonomous agents interact and adapt according to rules, and contrasts this with traditional modeling approaches. Examples of computational social science topics and tools are given, such as social network analysis, geospatial analysis, and machine learning. The document advocates for agent-based modeling to flexibly capture social dynamics in a way that mathematical models cannot.
This document summarizes several research projects related to big data and social science knowledge. It discusses projects that analyzed large social media platforms like Facebook, Twitter, and Wikipedia to study information diffusion and social influences. It also discusses challenges like securing access to commercial data and ensuring replicability of findings. Examples demonstrate how big data can provide novel insights but are limited by the objects studied and incomplete representation of populations. The document discusses debates around the implications of big data for privacy, prediction, exclusion, and manipulation. It argues that knowledge depends on how research technologies advance knowledge within ethical and legal frameworks.
This document provides an agenda and background information for a Meet 'N' Greet social event on social computing. The agenda includes a welcome, getting to know each other through brief presentations, and discussing next steps and ongoing activities. The background explains the goals of building an interdisciplinary community and collaboration around social computing research across various University of Minnesota departments and disciplines. Brief biographies of committee members are also included, describing their relevant research interests.
Uma visão geral sobre Reality Mining e pesquisas que foram e estão sendo desenvolvidas neste contexto. O conteúdo dos slides foram extraídos dos estudos e experimentos do MIT Media Lab (http://hd.media.mit.edu/) dirigido pelo Prof. Alex Pentland
SDAL addresses social science in new ways that will transform how we understand the world. Among our goals: creating smart and resilient cities, combatting homelessness, understanding the spread of disease and developing effective public health responses, identifying innovation drivers, and meeting the demand for educated graduates in the field.
In this introductory lecture titled, "conceptualising and measuring human anxiety on the Internet" the audience is explained what new or interesting the dissertation has to offer and how it is connected to the human-computer interaction fields and to the society in general.
This document discusses several issues and controversies surrounding the use of big data in social sciences. It summarizes the Facebook emotional contagion experiment in 2014, noting criticisms around informed consent and replication. It also discusses the failure of Google Flu Trends and debates around various Facebook studies. Key themes discussed are the epistemological implications of data-driven science, relationships between knowledge and power, and the need for robust and replicable methodologies when using big data in social research.
Reality mining aims to map an organization's cognitive infrastructure by capturing detailed data on human networks using sensors. It analyzes conversations, topics, locations and relationships between individuals to infer expertise, social networks and how communication may change. This could help with applications like knowledge management, team formation and understanding global influences in an organization. However, it also raises privacy concerns that would need to be addressed.
Social sciences have not kept up with modern digital society and big data opportunities. Social physics seeks to understand how information flows translate to behavior changes, using big data from various sources about human interactions and communications. It views social learning as the dominant way behaviors change, through exploring new ideas in social networks and engaging with ideas through norms, examples, and social pressure. Understanding these exploration and engagement processes could provide insights into societal changes.
Data-driven decision-making, including greater accuracy, precision, efficiency, and responsibility in the use of data.
Fuel rapid innovation through faster iterative learning – fail fast, learn faster, execute smarter.
Online Communities in Citizen Science & BirdCamsAndrea Wiggins
This document discusses online citizen science communities and bird cams. It describes how citizen science involves members of the public engaging in real-world scientific research through crowdsourcing and collaboration. It then focuses on how bird cams, which livestream nests and feeders, have emerged as online communities where people can observe and discuss bird activity in real-time. While most viewers never chat, many read discussions. Bird cams present unexpected outcomes like self-organizing social groups and emotional engagement. Sustainability relies on donations, merchandise, and fundraising by chat participants.
Public Libraries and Academic Libraries: Digital Partners?"James Neal
The growth and development of technology, computers, software, and the internet have changed the ways in which libraries function, operate, and are being used by the communities they serve. Public libraries have been playing a bit of catch-up in many ways related to the growth of digital services due to the fact that public libraries are also still serving users whose information needs include more traditional resources. Is there a common ground in mission and scope that public libraries and academic libraries serve together? In what ways are these services complementary and what are the ways in which each of these institutions can learn from and share with one another? Audio available: http://scholarslab.org/podcasts/podcast-james-neal/
This document discusses key tools and techniques for effective stormwater sampling projects. It emphasizes the importance of planning, preparing properly, and maintaining sample integrity. The presentation covers determining sampling requirements, selecting laboratories, using proper sampling equipment and techniques, managing samples, reviewing results, and documenting the process. The overall goal is to help project managers and field staff successfully plan, execute, and learn from their stormwater sampling efforts.
The Supportive Behaviors of Older Social Network Site UsersFred Stutzman
Fred Stutzman, Valeda Stull, Cheryl Thompson
This paper outlines a new multi-wave study of older adult users of social network sites. The goal of the study is to develop a grounded understanding of the phenomenon of older user social network site adoption, to identify and investigate ways in which the social network site facilitates access to supportive resources, and to evaluate the outcomes of access to supportive resources in social network sites. The paper draws on a preliminary analysis of 15 semi- structured interviews with older, late-adopting social network site users to present emergent themes. Reconnection is identified as a salient use motivator among older users of social network sites. We then explore the social network sites as a location of social support for older users; Emotional and informational support are readily provisioned on social network sites, whereas instrumental support is not commonly requested or provisioned. The role of cross- contextual disclosure and technological alternatives are briefly explored as potential explanatory variables.
This document summarizes a study of substance abuse, sexual behaviors, HIV/STD/HCV testing, and prevention service utilization among injection drug users in Dallas, Texas from 2005-2006. The study used respondent-driven sampling to obtain prevalence estimates among 597 injection drug users. Key findings include: most participants had unprotected sex and used drugs or alcohol before sex, though few were tested recently for STDs; using substances before sex was linked to riskier behaviors but not prevention service use; and effective prevention strategies are still needed to promote safer behaviors.
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
The popularity of online networks provides an opportunity to study the characteristics of online social network graphs is important, both to improve current systems and to design new application of online social networks. Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistently effective on different queries for different users, and under different search contexts. In this paper, we study performance of information collection in a dynamic social network. By analyzing the results, we reveal that personalized search has significant improvement over common web search.
The mixing time of thee sampling process strongly depends on the characteristics of the graph.
Preso on social network analysis for rtp analytics unconferenceBruce Conner
Selected highlights of Coursera Social Networking course, taught by Prof. Lada Adamic of the Univ. of Michigan. Presented at the annual Annual RTP Analytics Unconference, May 4, 2013
Users of social media sites often download third-party applications that can compromise security and privacy. Many users do not check applications for viruses before installing them. Hackers have created fake applications on platforms like Apple's App Store, Facebook, and Twitter to steal user information like account credentials and payment details. Common hacking techniques seen on social media include phishing scams and Trojan viruses distributed through malicious applications or links. While social media offers opportunities for connection, users must be aware of security risks from downloading untrusted applications and sharing private information online.
Joint Commission defines Disruptive Behavior as “conduct by a health care professional that intimidates others working in the organization to the extent that quality and safety are compromised”.
Research has found that disruptive behavior not only impacts the morale and staffing of an organization but can lead to medical errors and breakdowns in the quality of care, treatment, and services delivered.
Team Learning and Knowledge Creation PhD research presentation June 2013Peter Cauwelier
This document outlines a research study that examines the relationship between team psychological safety, team learning behavior, and team knowledge creation in Thai and French engineering teams. The study aims to evaluate how psychological safety impacts knowledge created, stored, and reused at the team level. It proposes a conceptual framework and hypotheses, and describes a mixed methods research design involving questionnaires, interviews and observations of team challenges to measure the variables. Limitations include the small sample size and focus on one organization and country pair.
7. Drivers’ safety behavior research using in-vehicle technologiesOren_Musicant
The document discusses research using in-vehicle sensor technologies to study drivers' safety behaviors. It summarizes several studies that examined the relationship between undesirable driving events recorded by sensors (e.g. hard braking, swerving) and crash risk. The studies found unsafe drivers engaged in risky behaviors like hard braking and swerving more frequently. Feedback on events helped reduce risky behaviors in novice drivers. Additional analysis looked at how event frequency varied by time of day, day of week, and driver characteristics.
The document discusses performance-based safety measurement and management. It provides examples of leading and trailing indicators that can be used to measure safety performance. Leading indicators measure proactive elements of a safety system like training, inspections, audits. Trailing indicators measure outcomes like injuries and accidents. A balanced set of metrics is recommended to fully evaluate safety. Establishing clear objectives, regular monitoring and using data to drive improvement are key aspects of an effective performance-based safety management system.
This document provides an overview of positive behavior management strategies for children with special needs who exhibit challenging behaviors. It discusses using a systematic approach focused on teaching appropriate behaviors through reinforcement rather than punishment. Key elements include conducting a functional behavior assessment to understand why behaviors occur, establishing preventative practices like visual schedules and clear rules, using praise and rewards to increase positive behaviors, implementing strategies like time-out contingently when issues arise, and developing behavior support plans with prevention, replacement skills and response strategies. The document emphasizes the importance of optimism and an emphasis on ability when addressing behavioral needs.
Daniel Miriti received a Certificate of Completion from Baker Hughes for successfully completing Behavior Based Safety training on May 2, 2014. The certificate was generated by Baker Hughes' Learning Management System to recognize Daniel Miriti's training achievement.
Social Networks & HIV Risk Behavior Using Respondent-Driven SamplingStephane Labossiere
This document summarizes a study that used Respondent-Driven Sampling (RDS) to recruit a diverse sample of men who have sex with men (MSM) across different social networks in New York City. The researchers recruited initial participants, or "seeds," from six social networks: bars/clubs, internet/mobile apps, bathhouses/sex clubs, colleges, professional organizations, and community centers. They screened 393 men at bars/clubs and enrolled 223 eligible participants. Preliminary results found that most participants reported their primary residence as Manhattan and sex with men only in the past year. Participants reported professional organizations as the most important venue for meeting other men, followed by the internet/mobile apps and bars/clubs, with
The document discusses techniques for behavior management in classroom settings. It describes four key techniques: extinction, which removes reinforcement for undesired behaviors; positive reinforcement, which provides rewards to increase desirable behaviors; counter conditioning, which replaces undesired responses with new responses; and social imitation, where learning occurs through observing others. The document provides examples of how each technique can be applied in classroom settings to shape student behavior and maintain discipline.
2012 kdd-com soc:adaptive transfer of user behaviors over composite social ne...thsszj
This document proposes ComSoc, a relational topic model that adaptively transfers user behavior data across composite social networks to improve sparse user behavior prediction. ComSoc selects relevant social networks for each user and generates topics and behaviors. Experiments on real-world datasets from Tencent and Douban show ComSoc improves prediction accuracy over single network and naively combined network models by up to 3%. A distributed MapReduce implementation enables efficient inference at large scale.
Cognitive Behavior Modification was developed by Donald Meichenbaum, who believed that an individual's behavior is influenced by cognitive events and that changing those events can change behavior. It combines cognitive and behavioral principles to shape desired behaviors. The purpose is to teach self-monitoring, problem solving, and self-control to address issues like anxiety, depression, and social skills deficits. An example is using a problem-solving scale and diary to help a student with Asperger's improve his social greetings.
Psychology is the science of behavior and here we show the PTAS Method as a resource to improve behavior safety at work. Dr. Lopez-Mena working in it since 1982.
10 Native Customer Behaviors And Your Social Business StrategyGerry Moran
Native customer behaviors can help social business strategies. Understanding customer goals, behaviors, and how they use social media can help businesses leverage social platforms to engage customers. Behaviors like searching online for information, watching videos, voicing opinions, helping others, consuming content, socializing and networking, and buying behaviors can all be co-opted by businesses through their social strategies. By understanding these behaviors, businesses can connect with customers on their terms through social channels simply and in ways that accelerate information sharing and customer engagement.
How Leadership Commitment and a Systematic Approach Spread ImprovementKaiNexus
Hosted by KaiNexus, presented by Karen Kiel-Rosser and Ron Smith of Mary Greeley Medical Center.
Does your organization struggle with engaging everybody in daily continuous improvement? Is it difficult to figure out how to combine formal improvement events, projects, and "WorkOuts" while engaging all employees to bring forward their ideas? Are you unsure how to spread improvement methodologies across departments?
In this webinar, you will learn:
How MGMC has combined Lean tools and methodologies with a "managing for daily improvement" approach
How leadership and technology enable and support successful improvement methodologies
MGMC's vision for leaders getting everybody engaged in improvement
How MGMC has systematically (and successfully) spread continuous improvement methodologies across the hospital over the past 12 months
Why it's important to engage leaders and to educate them about improvement and the role they need to play
Mary Greeley Medical Center (MGMC), a 220 bed acute care facility in Ames, Iowa, has received "Gold" level recognition in the Iowa Recognition for Performance Excellence (IRPE) program, the top honor in the IRPE program (the state level Malcolm Baldrige award).
Slides from #SMWCPH event Social Media Analytics: Concepts, Models, Methods, and Tools. For more information on the slides, please contact Professor Ravi Vatrapu at Copenhagen Business School. #smwcbsdata
Web Observatories, e-Research and the Importance of Collaboration. WST 2014 Webinar series, 20th March 2014
See Web Science Trust http://webscience.org/
The machine in the ghost: a socio-technical perspective...Cliff Lampe
This document discusses sociotechnical systems and the challenges of collaboration between researchers studying these systems and practitioners. It defines sociotechnical systems as the interrelation between technological and human systems. It argues that truly understanding these systems requires combining the theories and techniques of multiple fields including social science, computer science, and engaging with practitioners. However, bringing these different groups together is difficult due to differences in culture, goals, and incentives between academics and practitioners. It provides some strategies for encouraging collaboration, such as phenomena-based research, workshops, funding incentives, and mixed academic/practitioner events and project partnerships.
This document discusses how changes in technology present both opportunities and threats for reference services. It notes that users now access information anytime, anywhere through mobile devices and social media. While search engines and online question answering services could threaten reference services, they could also be opportunities if librarians adapt. The document suggests librarians conduct environmental scans to understand trends, identify new roles like developing digital experiences, and emphasize skills like change management and collaboration in LIS education to ensure continued relevance in a changing information landscape. The constant is that reference services must continually evolve while maintaining core values of helping users.
Research Using Behavioral Big Data: A Tour and Why Mechanical Engineers Shoul...Galit Shmueli
Keynote address by Galit Shmueli at 2016 Israeli Conference on Mechanical Engineering (ICME), Technion, Israel (Nov 23, 2016). http://icme2016.net.technion.ac.il/
Big Data for the Social Sciences - David De Roure - Jisc Digital Festival 2014Jisc
The analysis of government data, data held by business, the web, social science survey data will support new research directions and findings. Big Data is one of David Willetts’ 8 great technologies, and in order to secure the UK’s competitive advantage new investments have been made by the Economic Social Science Research Council ( ESRC) in Big Data, for example the Business Datasafe and Understanding Populations investments. In this session the benefits of the use of Big Data in social science , and the ESRCs Big Data strategy will be explained by Professor David De Roure.of the Oxford e-Research Centre and advisor to the ESRC.
This is a brief a brief review of current multi-disciplinary and collaborative projects at Kno.e.sis led by Prof. Amit Sheth. They cover research in big social data, IoT, semantic web, semantic sensor web, health informatics, personalized digital health, social data for social good, smart city, crisis informatics, digital data for material genome initiative, etc. Dec 2015 edition.
This document discusses technology-mediated social participation (TMSP) and opportunities for research in this area. It defines TMSP and provides examples. The document outlines two main goals for TMSP research: to improve the world and develop generalizable knowledge. It identifies opportunities to develop new theories and technologies to support and analyze TMSP systems. Methods are proposed to study TMSP, examine extraordinary socio-technical systems, and test novel interventions through field studies.
The document discusses three potential divides that may emerge in big data research: 1) between developed and developing countries, 2) between academic and commercial sector researchers, and 3) between researchers with strong computational skills versus those with less computational skills. It provides examples of methods used in different country/region contexts and notes a critique of big data research around issues like changing definitions of knowledge, misleading claims of objectivity/accuracy, and new digital divides around data access.
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
This document discusses social computing, including its theoretical underpinnings, infrastructure, applications, and research issues. Social computing is a new paradigm that facilitates collaboration and social interactions using computing technology. It draws from fields like social informatics, human computer interaction, and social and psychological theories. Major application areas include online communities, intelligent interactive entertainment, and business/public sector systems. Key research issues involve representing social information and knowledge, modeling social behavior at individual and group levels, and analyzing and predicting social systems. Agent-based modeling and simulation are important approaches used in social computing.
This document provides a review of techniques, tools, and platforms for analyzing social media data. It discusses the types of social media data and formats available, as well as tools for accessing, cleaning, analyzing, and visualizing social media data. Some key challenges of social media research are the restricted access to comprehensive data sources, lack of tools for in-depth analysis without programming, and need for large data storage and computing facilities to support research at scale. The document provides a methodology and critique of current approaches and outlines requirements to better support social media research.
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
Researching Social Media – Big Data and Social Media Analysis, presentation for the Social Media for Researchers: A Sheffield Universities Social Media Symposium, 23 September 2014
Big data provides opportunities for social science research by enabling new ways to answer existing questions and allowing entirely new questions to be asked. Large and diverse datasets can be analyzed from various sources like social media, sensors, and citizen science. This allows researchers to study big populations and questions in real time. Challenges include interdisciplinary collaboration, ensuring data and tools are open and reusable, and developing infrastructure to support analysis of large and diverse datasets.
RUNNING HEAD: BIG DATA IN SOCIAL MEDIA 1
BIG DATA IN SOCIAL MEDIA 3
Big Data in Social Media
By definition, Big Data can simply be termed as voluminous data. In more specific definitions, it can be termed as that which is large, complex and fast and a s a result, is not in a position to be processed using the typical traditional methods of data processing. The volume, variety, velocity, variability and veracity are used in the categorizing of data as big data. With the development in technology, and the continued incorporation of these technological sources into our day to day lives, the collected data through the Internet of Things among other information systems has resulted in big data (Ivanov, 2018). One such areas where Big data is found is in the social media platforms. As opposed to the olden days, currently, more and more people and companies are using social media daily to achieve their specific objectives and goals, it is estimated that social media platforms like Facebook produce data as big as 500+ terabytes in a s ingle day!
Most of these data in the social media are as a result of the videos, photos, messages and comments being shared across the media platforms. Not only do individuals use social media to keep in touch, but companies also use it in a concept called social media marketing. Through the media, and using big data analytics, companies are able to map out consumer behavior through what they like and what they share (Nicora, 2019). They use these platforms to reach their target audiences and at the same time use them to get feedback from their clients. As a result, the amount of data from social media platforms is not only voluminous, it is also heterogenous in the sense that it contains both nominal and numeral values from different places, it is variable in that it has unpredictable flow, it is fast because it is collected in real time. This qualifies the data to be Big Data and requires big data analytics to process.
References
Ivanov I. (2018) What is Big Data Analytics on Social Media? Iocowise. Retrieved from https://locowise.com/blog/what-is-big-data-analytics-on-social-media
Nicora R. (2019) How is big data impacting social media? Medium. Retrieved from https://medium.com/dative-io/how-is-big-data-impacting-social-media-df31aa3f66f6
1
4
Title
Student Name
Ashford University
GEN103: Information Literacy
Instructor Name
Month Day, Year
Title
Research Question:
Replace these instructions with your research question. Incorporate any feedback your instructor provided on your week 1 assignment. To learn how to view the comments on your papers watch the Waypoint: Accessing Assignment Feedback video.
Thesis Statement:
Replace these instructions with your thesis statement. Refer to the Writing Center’.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
The document discusses technology-mediated social participation and outlines the goals and challenges of the Summer Social Webshop. It summarizes that the Webshop aims to (1) clarify national priorities, (2) develop research questions around social participation, and (3) promote novel research methodologies to influence national policy and increase educational opportunities. It also notes key challenges include malicious attacks, privacy violations, lack of trust, and failure to be universally accessible.
Brief presentation on challenges I've found during my research on/through social media. Part of a larger panel on Digital and Social Media for Research as part of UBC's Year of Research in Education.
Big Data and ethics meetup : slides presentation michael ekstrandIntoTheMinds
Those are the slides of the speech given by Prof. Michael Ekstrand at the Meetup on Big Data and Ethics at DigitYser (Brussels) on 15 June 2017. For more info visit http://www.intotheminds.com/blog/en/big-data-and-ethics-first-sucessful-meetup-at-digityser-in-brussels/
Social Media Metrics for the Cultural Heritage sectorHU-Crossmedialab
1. The document discusses the development of a prototype social media monitor to provide Dutch museums better insight into the effects of their social media usage.
2. The monitor collects publicly available data from Facebook, Twitter, and Flickr for Dutch museums registered in the Netherlands Museum Register.
3. Developing their own custom monitor allows the researchers to experiment and customize the tool to better understand social media metrics for the cultural heritage sector, though it is acknowledged the monitor is only a prototype.
Similar to Exploring and Elevating Healthy Behaviors with Social Technologies (AAHB Conference), March 2015 (20)
Interactive glosses provide annotations alongside text to help increase vocabulary acquisition, reading comprehension, and reduce frustration for English learners. Research shows that glosses with first language translations are more effective than second language definitions alone. Glosses work best for texts with more than 5% unfamiliar words and benefit most when combined with comprehension questions and explicit vocabulary study. A variety of glossing tools exist as browser extensions, immersive readers, and integrated K-12 learning solutions to augment English texts with these interactive annotations.
This document discusses analyzing social media networks using NodeXL. It defines social media and lists common types. It then covers key concepts in social network analysis including nodes, edges, metrics like centrality and density. NodeXL is introduced as a tool for visualizing and analyzing social networks from data collected from sources like personal emails, Twitter, forums and YouTube. Examples of social network analyses using NodeXL are provided such as mapping corporate email communication and identifying influencers on Twitter.
This document discusses analyzing social media networks using NodeXL. It defines social media and lists common types. It then provides an overview of social network analysis, including key concepts like nodes, edges, centrality measures, and network metrics. Various applications of social network analysis are presented, such as mapping email networks and events on Twitter. Finally, NodeXL is introduced as a tool for visualizing and analyzing social networks.
This document proposes a framework for designing reusable Alternate Reality Games (ARGs). It introduces ARGs and discusses challenges to reusability. The researchers conducted interviews with ARG experts and analyzed examples to develop a framework with three types of reuse: replayable, adaptable, and extensible. They then outline design strategies for each type, such as cyclical storytelling to allow replayability or location-based structures to enable adaptation. The document concludes by discussing implications and opportunities for future work, such as identifying design patterns and testing the framework.
Infrastructure for Supporting Computational Social ScienceDerek Hansen
This document discusses the need for infrastructure research to support computational social science. It notes current limitations with relying solely on corporate or third-party tools for data access and analysis. Specifically, these tools are not designed for research needs, duplication of effort is required, APIs are limited and changing, and maintaining third-party tools is challenging. The document proposes a large-scale collaborative solution involving data handling and processing, human-computer interaction, and legal/social considerations to better enable social science research. Collaboration with groups like CASCI and DSST is suggested.
This document summarizes a study on quality control mechanisms for crowdsourcing at FamilySearch Indexing. It finds that experienced workers are faster and more accurate than novices. Peer review is nearly as effective as arbitration at maintaining quality, while being more efficient. For some fields, context or language skills are needed. Overall, peer review with expert routing shows promise as an effective quality control method.
Dr. Derek Hansen received a BA in Economics from BYU and a Ph.D in Information from the University of Michigan. He is currently an Assistant Professor at the University of Maryland iSchool and enjoys Ultimate Frisbee, racquet sports, chess, and guitar in his free time. The University of Maryland iSchool is now hiring.
The PLACE approach (Prototyping Location Activities and Collective Experience)Derek Hansen
The PLACE approach is a framework for low-fidelity prototyping of location-based social games that addresses challenges such as representing location, activities, and social experience. It involves users physically moving in the real world and completing prescribed and self-chosen activities using field pointers and a Wizard of Oz approach. Initial tests are done on a small scale, with findings informing later larger-scale sessions to iteratively refine the design. The goal is to authentically prototype key experiences like varied locations, motivations for different activities, and collective gameplay.
University of Utah Biomedical Informatics Seminar SlidesDerek Hansen
This document summarizes a presentation given by Derek Hansen on social participation in Health 2.0. It discusses opportunities and challenges with technology-mediated social participation, and gives examples like socio-technical systems. It also outlines research opportunities like developing tools to study social health data, examining systems from other domains, and testing novel interventions. The presentation notes computing conferences that welcome Health 2.0 work and ends with an invitation for questions and discussion.
Slides from a presentation I gave to the BYU Computer Science faculty and research students in March, 2012. Summarizes my own work on Technology-Mediated Social Participation. Follow hyperlinks on images to get to various papers (in second half of presentation).
Improving Family Search Indexing Efficiency and QualityDerek Hansen
The document compares the traditional A-B-Arbitrate indexing quality control model to a proposed Peer Review model. It analyzes historical data on indexer agreement rates and task times. A field experiment was conducted using a truth set of 2,000 1930 Census records to directly compare the quality and efficiency of the two models. Preliminary results from the experiment and implications for improving indexing are discussed.
This document discusses using veiled viral marketing via social media to disseminate information about stigmatized illnesses. It describes how anonymity allows people to share information about sensitive topics more freely but can also enable unwanted behavior. The study presented tested sending veiled versus unveiled invitations on social media to inform people about HPV and found a relatively high acceptance rate, even for veiled invitations sent via email. However, veiled marketing also presents potential problems like spam and stress that require solutions to implement it responsibly. Further research is needed to understand why veiled invitations are accepted and test this approach with other health topics.
Odd Leaf Out (IEEE Social Computing 2011)Derek Hansen
Describes paper presented at IEEE Social Computing 2011 conference on novel "serious game" called Odd Leaf Out to identify errors in classified image sets. See http://www.cs.umd.edu/localphp/hcil/tech-reports-search.php?number=2011-17 for the paper.
EventGraphs are network graphs that illustrate the social structure of discussions around events on social media. This document discusses EventGraphs, including how they are created in NodeXL and analyzed to understand the social structure and important discussants in event conversations. It provides examples of EventGraphs for conferences and discusses future work such as automated query expansion and integrating sentiment analysis.
This is a presentation that describes at a high level some of the work we've been performing related to NodeXL and it's use to understand social media networks.
The document discusses different types of social media tools including blogs, wikis, threaded conversations, social networking sites, and social sharing tools. It describes the key features and goals of each tool. For example, blogs aim to support time-sensitive content and reactions from readers, wikis allow community-authored content to be edited by many, and social networking sites help people connect and maintain social relationships. The document also covers considerations for using social media and predicts continued innovation in new forms of social interaction using mobile devices.
Slides from a presentation I gave at the ASIST annual conference based on the paper titled "Virtual Community Maintenance with a Collaborative Repository" (see http://www.si.umich.edu/~presnick/papers/asist07/hansen.pdf for a preprint).
8 Surprising Reasons To Meditate 40 Minutes A Day That Can Change Your Life.pptxHolistified Wellness
We’re talking about Vedic Meditation, a form of meditation that has been around for at least 5,000 years. Back then, the people who lived in the Indus Valley, now known as India and Pakistan, practised meditation as a fundamental part of daily life. This knowledge that has given us yoga and Ayurveda, was known as Veda, hence the name Vedic. And though there are some written records, the practice has been passed down verbally from generation to generation.
DECLARATION OF HELSINKI - History and principlesanaghabharat01
This SlideShare presentation provides a comprehensive overview of the Declaration of Helsinki, a foundational document outlining ethical guidelines for conducting medical research involving human subjects.
Clinic ^%[+27633867063*Abortion Pills For Sale In Tembisa Central19various
Clinic ^%[+27633867063*Abortion Pills For Sale In Tembisa Central Clinic ^%[+27633867063*Abortion Pills For Sale In Tembisa CentralClinic ^%[+27633867063*Abortion Pills For Sale In Tembisa CentralClinic ^%[+27633867063*Abortion Pills For Sale In Tembisa CentralClinic ^%[+27633867063*Abortion Pills For Sale In Tembisa Central
Histololgy of Female Reproductive System.pptxAyeshaZaid1
Dive into an in-depth exploration of the histological structure of female reproductive system with this comprehensive lecture. Presented by Dr. Ayesha Irfan, Assistant Professor of Anatomy, this presentation covers the Gross anatomy and functional histology of the female reproductive organs. Ideal for students, educators, and anyone interested in medical science, this lecture provides clear explanations, detailed diagrams, and valuable insights into female reproductive system. Enhance your knowledge and understanding of this essential aspect of human biology.
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxwalterHu5
In some case, your chronic prostatitis may be related to over-masturbation. Generally, natural medicine Diuretic and Anti-inflammatory Pill can help mee get a cure.
Promoting Wellbeing - Applied Social Psychology - Psychology SuperNotesPsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
- Video recording of this lecture in English language: https://youtu.be/Pt1nA32sdHQ
- Video recording of this lecture in Arabic language: https://youtu.be/uFdc9F0rlP0
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
Exploring and Elevating Healthy Behaviors with Social Technologies (AAHB Conference), March 2015
1. Exploring and Elevating Healthy
Behaviors with Social Technologies
AAHB Conference, March 2015
Derek L. Hansen
Abell Professor of Innovation
School of Technology, BYU
dlhansen@byu.edu
@shakmatt
2.
3. Technology-mediated social
participation (TMSP)
“The goal is to create new architectures
for the online public spaces that energize
the population to contribute to vital
community and national priorities” - IEEE
Computer, Nov. 2010
15. Historical note: how methodology
impacts findings
WWW
WWW
WWW
WWW
WWW
WWW WWW
W
W
W
W
W
W
W
W
W
WWW
WWW
WWW
WWW
WWW
WWW
W
W
W
W
W
W
W
W
W
Focus on Content Focus on Search Process,
Usability, & Success
24. Relevant Technology Trends
• Merging of online and offline
– Internet of things, wearables, augmented reality,
context-aware devices, beacons
• Gaming
– Mobile games, social games, virtual reality
• Data mining and analysis across channels
• Other
– Mobile Payments, crowdfunding, tools for casual
programmers
25. Questions & Discussion
Derek L. Hansen
Abell Professor of Innovation
School of Technology, BYU
dlhansen@byu.edu
@shakmatt
Editor's Notes
Introduction. Received PhD from University of Michigan’s School of Information. Am currently at Brigham Young University’s School of Technology’s Information Technology program. See https://scholar.google.com/citations?user=IpLkSvEAAAAJ&hl=en for publications.
I am also affiliated with the Computational Health Science group at BYU: see http://dml.cs.byu.edu/chs/people.php
My research focuses on the analysis and design of novel social technologies aimed at improving some domain of interest. My home research community is Human Computer Interaction & CSCW, though my work often relates to consumer health informatics, citizen science, and educational games.
See special issue of IEEE Computer, Nov. 2010 focused on Technology-Mediated Social Participation. The chapter authored by Brad Hesse, Derek Hansen, Thomas Finholt, Sean Munson, Wendy Kellogg, and John Thomas on health 2.0 is particularly relevant: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3046402/
The use of social media is staggering and completely unprecedented in the history of the world. For example, more than 1.39 Billion monthly active Facebook users and 1.9 billion mobile active users. 20 minutes average time spent on Facebook visit. See https://zephoria.com/social-media/top-15-valuable-facebook-statistics/ for more stats. All this has happened in just a decade!
Given this world we live in, what is possible? We need to rethink our research methodologies and strategies.
Image credits: http://laalex.deviantart.com/art/Vector-Social-Icons-on-Caps-258636799
An good example of how things have changed is the difference between the early studies (conducted in the 1960s) by Stanley Milgram and the more recent studies conducted by Facebook researchers that attempt to measure the average social distance between people (i.e., the “degrees of separation) based on hundreds of millions of people. It turns out we are even more connected than we originally imagined. See https://www.facebook.com/notes/facebook-data-team/anatomy-of-facebook/10150388519243859 (where image is from) for details.
Notice that Milgram’s methods were appropriate – and the best he could do – in his time. Now, new methods are needed that can leverage the data that is collected.
Currently the best options for collecting data include:
Working directly with those who hold the data (e.g., sabbatical at facebook research) – this can be hard to gain access though.
Those who can code themselves can work with data source APIs directly, or they can work with 3rd party companies who aggregate data (see top row). Aggregators can be expensive though (and are targeting a business market, not researchers) and apis of social media sources change frequently and not all companies have apis (or apis for the data you want).
Those who can’t code themselves can use existing social media monitoring software (though they may cost money and they are designed for business users, not researchers) or free research-oriented software (but these often lack funding resulting in less polished products)
Data is performance.
Only a small percentage contribute, and they are not typically like the other participants.
The ethics of studying users online behavior is still murky and fraught with danger
Participants of most social media sites are not representative of the larger population
More generally, there is a risk of overgeneralization of findings.
Image credits:
- http://commons.wikimedia.org/wiki/File:Bend_and_Snap,_contemporary_dance_performance_at_Nazareth_College_Arts_Center,_Rochester,_New_York_-_20090925.jpg
http://go-digital.net/blog/2012/05/90-9-1-or-1-9-90-rule-of-social-media-participation/
http://www.beevolve.com/twitter-statistics/
http://upload.wikimedia.org/wikipedia/commons/7/77/Lightmatter_lab_mice.jpg
There is a growing need for “data scientists” who are conversant in the various analytic and visualization techniques that help make sense of large datasets.
Image: http://upload.wikimedia.org/wikipedia/commons/4/44/DataScienceDisciplines.png
Note that there is great power when these things methods are used together.
See http://www.jmir.org/2013/4/e62/ for full paper.
Tweaking and Tweeting: Exploring Twitter for Nonmedical use of psychostimulant Drug (Adderall) Among College Students.
Carl Hanson, Scott Burton, Christophe Giraud-Carrier, Josh West, Michael Barnes, Bret Hansen
1) Image based on Jen Golbeck’s paper: http://dl.acm.org/citation.cfm?id=1979614
Personality values were predicted to ~90% accuracy based on Facebook data. The data included structural information (e.g., number of friends), textual data (e.g., swearwords used), and other usage statistics.
2) Table based on Munmun De Choudhury and colleagues at Microsoft Research paper http://dl.acm.org/citation.cfm?id=2466447 that predicts depression based on Twitter activity up to just over 70% accuracy.
This work by Marc Smith, Lee Rainie, Itai Himelboim, and Ben Shneiderman for the Pew Internet and American Life project.
See http://www.pewinternet.org/2014/02/20/mapping-twitter-topic-networks-from-polarized-crowds-to-community-clusters/
From forthcoming article in Journal of Health Communication titled “Stigma's Effect on Social Interaction and Social Media Activity” by Vanessa Boudewyns 1, Itai Himelboim, Derek L. Hansen, and Brian G. Southwell.
The paper found that stigmatized illnesses were discussed less on Twitter than non-stigmatized illnesses when controlling for their popularity (as estimated by number of google searches) and funding (based on NIH funding). Such methods could be used to help identify health topics that are stigmatized and measure how the stigmatization of an illness changes over time (e.g., HIV is an interesting case study – though unique in that it has had so much funding).
Original studies conducted primarily in medical schools used approximately the following methodology (left-hand side): (1) Choose health topic, (2) select subset of webpages on topic (e.g., ones that show up highly in search engine results), (3) have experts review sites for accuracy and completeness – giving each site a + or – score (with inter-rater reliability reported), (4) report findings/conclusions (“look how much bad content there is!”)
Other studies conducted more recently from an “information seeking” perspective (e.g., JASIST) use the following methodology (right-hand side): (1) choose health topic and create common search tasks on topic, (2) choose subset of people (e.g., adolescents, older adults…), (3) systematically observe them searching (with “think aloud” protocol”), (4) code search process, content viewed, and success of searches, (5) report findings/conclusions (“people are more critical of content than we assumed, but some of them sure don’t know how to create good search terms or use browsers effectively”)
The first type of study made information provision on the Web seemed hopelessly flawed, yet studies of the 2nd type showed that many people used strategies to compare content from different sites (e.g., to find inaccuracies) or verified with doctors so that information seeking was more successful. Also, importantly, studies of the 2nd type showed what problems and contexts users were engaged in when seeking for information, which led to useful ideas for interventions and training – as opposed to studies of the first type which seemed to always suggest more accurate content on the Web.
See http://www.jmir.org/2003/4/e25/ for an example of the 2nd type focused on adolescents. For one focused on older adults see http://dl.acm.org/citation.cfm?id=2132176.2132220
This is a picture of Douglas Englebart, an early technology pioneer. In a time when many people thought of computers as replacements for humans (i.e., they were focused on automating tasks), Englebart thought of computers as tools that could augment the human intellect.
The use of social media is staggering and completely unprecedented in the history of the world. For example, more than 1.39 Billion monthly active Facebook users and 1.9 billion mobile active users. 20 minutes average time spent on Facebook visit. See https://zephoria.com/social-media/top-15-valuable-facebook-statistics/ for more stats. All this has happened in just a decade!
Given this world we live in, what is possible? We need to rethink our research methodologies and strategies.
Image credits: http://laalex.deviantart.com/art/Vector-Social-Icons-on-Caps-258636799
See Lawrence Lessig’s book “Code and Other Laws of Cyberspace” – version 2.0: http://codev2.cc/download+remix/Lessig-Codev2.pdf
The “Architecture” disk is the key here – it’s the one that is so dramatically different when so much of our communications and interactions are mediated by technology. While we can design all of these things, it is the design of the architecture that is so new.
Edwin Hutchin’s classic paper explores the idea of treating a cockpit as a unit of analysis from a cognitive psychology standpoint – one that includes both human and technological components to perform computation and memory tasks. However, as most of cognitive psychology work, it focuses on one individual and not emergent properties on a social level. What would/does a socio-technical social system look like and how can we analyze them? Lostpedia provides one example of a socio-technical system engaged in “sensemaking by the masses”.
Derek Hansen and Christianne Johnson, “Veiled Viral Marketing: disseminating information on stigmatized illnesses via social networking sites.
See http://dl.acm.org/citation.cfm?id=2110393 for details.
One other lesson to take away is to focus on unique constructs that can be applied across different platforms, not things that may be outdated within a few years.
Thought dated now, my dissertation work examined the symbiotic relationship between threaded conversation (in the form of email lists or discussion forums) and wiki repositories (i.e., collaboratively authored documents). At the time no medical support communities used them, but some tech-savvy communities did such as css-discuss. After understanding what made it work for technical support, I translated the design principles into the medical support community context and developed a custom wiki for them to use to augment their community repositories. 10 years later they are still using it in valuable ways.
See http://nodexl.codeplex.com/ for NodeXL – a free Social Network Analysis tool.
Book on NodeXL by Derek Hansen, Ben Shneiderman, and Marc Smith is available at: http://www.amazon.com/Analyzing-Social-Media-Networks-NodeXL/dp/0123822297
In addition to the tool, we have developed novel visualization techniques (http://hcil2.cs.umd.edu/trs/2011-24/2011-24.pdf) and methods for analyzing data ( https://www.cs.umd.edu/~ben/papers/Hansen2011EventGraphs.pdf or presentation here http://www.slideshare.net/shakmatt/eventgraphs-talk-at-hcil2011 )
We need mid-level design-based theory that translates theory developed in lab settings and translates it into specific products. A sort of “translational” research – but for design.
I am currently working with a graduate student to develop a set of mobile, social games that will leverage step counting devices like Fitbit (or the built-in Android or iPhone step counters).
Image credit: https://c2.staticflickr.com/4/3540/3301550694_d2615042cb.jpg
See the following articles reviewing mobile apps and the types of behavior change principles they apply (most suggest that they don’t apply very many):
http://mhealth.jmir.org/2015/1/e20/
http://www.ajpmonline.org/article/S0749-3797(14)00614-X/abstract
http://www.ijbnpa.org/content/11/1/97
http://www.ajpmonline.org/article/S0749-3797(14)00040-3/abstract
http://www.tandfonline.com/doi/abs/10.1080/15398285.2013.756343#.VQQteRDF8nQ