SlideShare a Scribd company logo
1 of 53
Is It Time For a Career
Switch?
ABSTRACT



Tenure



what to recommend to a user  when to make appropriate recommendations and its
impact on the item selection in the context of a job recommender system



The proportional hazards model, hierarchical Bayesian framework



estimates the likelihood of a user’s decision to make a job transition at a certain
time, which is denoted as the tenure-based decision probability
CONTRIBUTION


Analyze the problem of finding the right time to make recommendations in the job
domain.



Propose using the proportional hazards model to tackle the problem and extend it with
a hierarchical Bayesian framework.



Evaluate the model with a real-world job application data from LinkedIn
RELATED WORK



Major recommendation approaches: content-based filtering and collaborative
filtering



Timeliness



E.g. software engineer – senior software engineer
Method


HIERARCHICAL PROPORTIONAL HAZARDS MODEL



Review of Proportional Hazards Model



Model Extension with Bayesian Framework





Problem Definition

Parameter Estimation

TENURE-BASED DECISION PROBABILITY
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL
Goal


Predict the probability that a user makes a decision of item jb at current time tb ,given
that she made the last decision of ja at time ta and she did not make the transition
decision up to time tb .
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL


Review of Proportional Hazards Model



Survival function :determines the failure of an event



Failure: as a user making a decision to transit to a new job
HIERARCHICAL PROPORTIONAL
HAZARDS MODEL


Two common approaches to incorporate covariates x in the hazards model:



Cox proportional hazards model :



Accelerated life model :
Weibull distribution is used for p ( y )

θ
:
Model Extension with Bayesian
Framework

Data sparsity
Parameter Estimation
TENURE-BASED DECISION PROBABILITY
TENURE-BASED DECISION PROBABILITY



Push-based Scenario



Pull-based Scenario
EVALUATION OF HAZARDS MODEL



tenure-based decision probability



predicted decision time



covariates
EVALUATION OF HAZARDS MODEL



Evaluation Metrics


Perplexity/Likelihood



Estimated Decision Time
EVALUATION OF HAZARDS MODEL



Models to Compare



H-One :the hazards model that fits a single set of parameters with no
covariates ;m = {∗ → ∗}



H-Source :the hazards model that fits multiple sets of parameters with no
covariates to the tenure data ;m = { a → ∗}



H-SourceDest :m = { a → b }



H-SourceDestCov : incorporates covariates into the hazards model in HSourceDest .
EVALUATION OF HAZARDS MODEL



covariates



1) about the user u : the user’s gender, age, number of connections, number of
jobs that the user has changed, average months that the user changes a job;



2)about the item ja or jb : discretized company size, the company age



3)about the relationship between ja and jb : the ratio of the company size, the ratio of the
company age; whether j a and j b are in the same function, whether they are in the same
industry;



4)about the user’s aspiration of category b : number of job applications from user u in
category b in the last week, last month, last two months, and last three months.
EVALUATION OF RECOMMENDATION
MODEL


In the Push-Based Scenario
In the Pull-Based Scenario
• BasicModel
• Basic+TranProb
• Basic+TranProb+Tenure
• Basic+TranProb+TenureProb
CONCLUSION


Q: When is the right time to make a job recommendation and how do we
use this inference to improve the utility of a job recommender system?



the hierarchical proportional hazards model



real-world job application data : Linkedin
Is This App Safe for Children? A
Comparison Study
of Maturity Ratings on Android
and iOS Applications
ABSTRACT



we develop mechanisms to verify the maturity ratings of mobile apps and investigate
possible reasons behind the incorrect ratings.
INTRODUCTION



Android maturity rating policy




“Everyone,” “Low Maturity,” “Medium Maturity,” and “High Maturity,”

iOS’s policy


“4+,” “9+,” “12+,” and “17+.”



iOS rates each app submitted according to its own policies



Android apps are purely a result of app developers’ self-report.
INTRODUCTION



Android rating policy is unclear, and it is difficult for developers to understand the
difference between the four maturity-rating levels



Contribution:


We develop a text mining algorithm to automatically predict apps’ actual maturity ratings from
app descriptions and user reviews.



By comparing Android ratings with iOS ratings, we illustrate the percentage of Android apps with
incorrect maturity ratings and examine the types of apps which tend to be misclassified.



We conduct some preliminary analyses to explore the factors that may lead to untruthful
maturity ratings in Android apps.
RESEARCH QUESTIONS



Does iOS rating strictly reflect its policy?



Are app ratings reflected in app descriptions and user reviews? If so, can
we build an effective text mining approach to predict the true rating of an
app?



Do Android developers provide accurate maturity ratings for their own
apps? For apps published in both markets, are Android ratings consistent
with iOS ratings?



What are the factors that could lead to untruthful maturity ratings in
Android apps in comparison to iOS apps?
METHODOLOGY



iOS Maturity Rating Policy vs. Implementation


iOS actually downgrades its official maturity policy during implementation.
Android Apps’ Maturity Ratings
discrepancies
• Android does not consider horror content ( C ) as mature content, while iOS does
include
• Android considers graphic violence ( B3 ) as mature content while iOS directly rejects
apps with graphic violence.
• Android integrates privacy protection in its maturity rating policy by including the
social feature ( I ) and location collection ( J ). However, no corresponding privacyrelated consideration exists in the maturity rating scheme by iOS.
• Frequent/intense cartoon violence and fantasy violence ( A2 ) is rated as “Medium
Maturity” (i.e., level 3) in Android but as “9+” (i.e., level 2) in iOS.
• Frequent/intense simulated gambling ( H2 ) is rated as “High Maturity” (i.e., level 4) in
Android but is rates as “12+” (i.e., level 3) in iOS.
we can now use iOS actual maturity rating as a
baseline to examine the reliability of Android apps’
maturity ratings.
Comparing Apps on iOS and Android



For each Android app, we choose
up to 150 search results from the iOS
App Store. For those showing similar
app names, we conducted analysis
to determine the closest fit.



their descriptions and developers’
company names



apps’ icons and screenshots
ALM—Automatic Label of Maturity
Ratings for Mobile Apps


“Android-only” apps



ALM is a semi-supervised learning algorithm, and it processes apps’ descriptions and
user reviews to determine maturity ratings.

1.

Building seed-lexicons for objectionable content detection

2.

Assigning initial weights to seed-terms

3.

Classification

4.

Expanding seed-lexicons and adjusting weights
1.Building seed-lexicons for
objectionable content detection


Apps are organized based on their rating scheme together with their
corresponding token, such as A1.txt , A2.txt , B1.txt , and H2.txt .



Human experts read grouped app descriptions and select seed
lexicons to detect objectionable content.



grouped into three bigger lexicons denoted as Ti, i∈ 9,12,17 for classifying
the maturity rating: 9+, 12+, and 17+
2.Assigning initial weights to seedterms

Pi, Ni
For each seed-term t, denote its frequency in Pi and Ni as tp and tn
2.Assigning initial weights to seedterms
3.Classification



For each app 4 , all terms in its description are selected and categorized
as a set A=tk



maturity rating ma
4.Expanding seed-lexicons and
adjusting weights
EXPERIMENT

A total of 1,464 apps were found on iOS App Store and the rest 3,595 apps were
classified as Android-only apps.
Experiment 1: Predicting Apps’
Maturity Ratings by the ALM algorithm
Experiment 2: Overrated and
Underrated Android Applications

• overrated
• underrated
Overrated Android Applications



possible reasons


Intelligence



Simulated Gambling



Violence



Mature and Suggestive Themes
Underrated Android Applications
Experiment 3: Exploring Factors
Contributing to Incorrect Ratings


apps’ attributes :
popularity, price, and dangerous level of the required permissions .



Developers’ attributes :
general privacy awareness, trustworthiness, actual privacy
awareness, and child safety awareness .
Conclusion


examine the maturity rating policies on both Android and iOS
platforms



possible reasons behind the incorrect ratings



ALM algorithm

More Related Content

Viewers also liked

Questions about questions
Questions about questionsQuestions about questions
Questions about questionsmoresmile
 
Magnet community identification on social networks
Magnet community identification on social networksMagnet community identification on social networks
Magnet community identification on social networksmoresmile
 
Generating event storylines from microblogs
Generating event storylines from microblogsGenerating event storylines from microblogs
Generating event storylines from microblogsmoresmile
 
Presentation-for-broker
Presentation-for-brokerPresentation-for-broker
Presentation-for-brokerDenis Aristov
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogsmoresmile
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities inmoresmile
 
Topical keyphrase extraction from twitter
Topical keyphrase extraction from twitterTopical keyphrase extraction from twitter
Topical keyphrase extraction from twittermoresmile
 
Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Denis Aristov
 
Презентация CarScan24.ru
Презентация CarScan24.ruПрезентация CarScan24.ru
Презентация CarScan24.ruDenis Aristov
 
When relevance is not enough
When relevance is not enoughWhen relevance is not enough
When relevance is not enoughmoresmile
 
Modul pengukuran. aliran fluida.
Modul   pengukuran. aliran fluida.Modul   pengukuran. aliran fluida.
Modul pengukuran. aliran fluida.bacukids
 
Exploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthExploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthmoresmile
 
Accounting principles
Accounting principlesAccounting principles
Accounting principlescantaboop
 
Event summarization using tweets
Event summarization using tweetsEvent summarization using tweets
Event summarization using tweetsmoresmile
 
Doppler effect experiment and applications
Doppler effect experiment and applicationsDoppler effect experiment and applications
Doppler effect experiment and applicationsmarina fayez
 

Viewers also liked (18)

Doppler
DopplerDoppler
Doppler
 
Questions about questions
Questions about questionsQuestions about questions
Questions about questions
 
Magnet community identification on social networks
Magnet community identification on social networksMagnet community identification on social networks
Magnet community identification on social networks
 
Generating event storylines from microblogs
Generating event storylines from microblogsGenerating event storylines from microblogs
Generating event storylines from microblogs
 
HSI_Intro_Short
HSI_Intro_ShortHSI_Intro_Short
HSI_Intro_Short
 
Presentation-for-broker
Presentation-for-brokerPresentation-for-broker
Presentation-for-broker
 
Finding bursty topics from microblogs
Finding bursty topics from microblogsFinding bursty topics from microblogs
Finding bursty topics from microblogs
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities in
 
Topical keyphrase extraction from twitter
Topical keyphrase extraction from twitterTopical keyphrase extraction from twitter
Topical keyphrase extraction from twitter
 
Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru Презентация проекта MegaStrahovka.ru
Презентация проекта MegaStrahovka.ru
 
Презентация CarScan24.ru
Презентация CarScan24.ruПрезентация CarScan24.ru
Презентация CarScan24.ru
 
When relevance is not enough
When relevance is not enoughWhen relevance is not enough
When relevance is not enough
 
Presentation2
Presentation2Presentation2
Presentation2
 
Modul pengukuran. aliran fluida.
Modul   pengukuran. aliran fluida.Modul   pengukuran. aliran fluida.
Modul pengukuran. aliran fluida.
 
Exploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouthExploring social influence via posterior effect of word of-mouth
Exploring social influence via posterior effect of word of-mouth
 
Accounting principles
Accounting principlesAccounting principles
Accounting principles
 
Event summarization using tweets
Event summarization using tweetsEvent summarization using tweets
Event summarization using tweets
 
Doppler effect experiment and applications
Doppler effect experiment and applicationsDoppler effect experiment and applications
Doppler effect experiment and applications
 

Similar to Is it time for a career switch

IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTtsysglobalsolutions
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsVijay Karan
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET Journal
 
An Approach To Sentiment Analysis
An Approach To Sentiment AnalysisAn Approach To Sentiment Analysis
An Approach To Sentiment AnalysisSarah Morrow
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modelingzakieh alizadeh
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsIRJET Journal
 
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...cscpconf
 
Report of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoReport of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoYifan Guo
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...EC-Council
 
SURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISSURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISIRJET Journal
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxlaharisai03
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Xavier Ochoa
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...IRJET Journal
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Reviewinventionjournals
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataIRJET Journal
 

Similar to Is it time for a career switch (20)

IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Knowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 ProjectsKnowledge and Data Engineering IEEE 2015 Projects
Knowledge and Data Engineering IEEE 2015 Projects
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment AnalysisIRJET- Survey of Classification of Business Reviews using Sentiment Analysis
IRJET- Survey of Classification of Business Reviews using Sentiment Analysis
 
An Approach To Sentiment Analysis
An Approach To Sentiment AnalysisAn Approach To Sentiment Analysis
An Approach To Sentiment Analysis
 
Crm updated report
Crm updated reportCrm updated report
Crm updated report
 
Session2-Application Threat Modeling
Session2-Application Threat ModelingSession2-Application Threat Modeling
Session2-Application Threat Modeling
 
Exploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD MetricsExploring the Efficiency of the Program using OOAD Metrics
Exploring the Efficiency of the Program using OOAD Metrics
 
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
A SIMILARITY MEASURE FOR CATEGORIZING THE DEVELOPERS PROFILE IN A SOFTWARE PR...
 
Report of Previous Project by Yifan Guo
Report of Previous Project by Yifan GuoReport of Previous Project by Yifan Guo
Report of Previous Project by Yifan Guo
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
SURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSISSURVEY ON SENTIMENT ANALYSIS
SURVEY ON SENTIMENT ANALYSIS
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
Use of Contextualized Attention Metadata for Ranking and Recommending Learnin...
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 
Practical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A ReviewPractical Guidelines to Improve Defect Prediction Model – A Review
Practical Guidelines to Improve Defect Prediction Model – A Review
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Is it time for a career switch

  • 1. Is It Time For a Career Switch?
  • 2. ABSTRACT  Tenure  what to recommend to a user  when to make appropriate recommendations and its impact on the item selection in the context of a job recommender system  The proportional hazards model, hierarchical Bayesian framework  estimates the likelihood of a user’s decision to make a job transition at a certain time, which is denoted as the tenure-based decision probability
  • 3. CONTRIBUTION  Analyze the problem of finding the right time to make recommendations in the job domain.  Propose using the proportional hazards model to tackle the problem and extend it with a hierarchical Bayesian framework.  Evaluate the model with a real-world job application data from LinkedIn
  • 4. RELATED WORK  Major recommendation approaches: content-based filtering and collaborative filtering  Timeliness  E.g. software engineer – senior software engineer
  • 5. Method  HIERARCHICAL PROPORTIONAL HAZARDS MODEL   Review of Proportional Hazards Model  Model Extension with Bayesian Framework   Problem Definition Parameter Estimation TENURE-BASED DECISION PROBABILITY
  • 8. HIERARCHICAL PROPORTIONAL HAZARDS MODEL Goal  Predict the probability that a user makes a decision of item jb at current time tb ,given that she made the last decision of ja at time ta and she did not make the transition decision up to time tb .
  • 9. HIERARCHICAL PROPORTIONAL HAZARDS MODEL  Review of Proportional Hazards Model  Survival function :determines the failure of an event  Failure: as a user making a decision to transit to a new job
  • 10. HIERARCHICAL PROPORTIONAL HAZARDS MODEL  Two common approaches to incorporate covariates x in the hazards model:  Cox proportional hazards model :  Accelerated life model :
  • 11. Weibull distribution is used for p ( y ) θ :
  • 12. Model Extension with Bayesian Framework Data sparsity
  • 13.
  • 16. TENURE-BASED DECISION PROBABILITY  Push-based Scenario  Pull-based Scenario
  • 17. EVALUATION OF HAZARDS MODEL  tenure-based decision probability  predicted decision time  covariates
  • 18. EVALUATION OF HAZARDS MODEL  Evaluation Metrics  Perplexity/Likelihood  Estimated Decision Time
  • 19. EVALUATION OF HAZARDS MODEL  Models to Compare  H-One :the hazards model that fits a single set of parameters with no covariates ;m = {∗ → ∗}  H-Source :the hazards model that fits multiple sets of parameters with no covariates to the tenure data ;m = { a → ∗}  H-SourceDest :m = { a → b }  H-SourceDestCov : incorporates covariates into the hazards model in HSourceDest .
  • 20. EVALUATION OF HAZARDS MODEL  covariates  1) about the user u : the user’s gender, age, number of connections, number of jobs that the user has changed, average months that the user changes a job;  2)about the item ja or jb : discretized company size, the company age  3)about the relationship between ja and jb : the ratio of the company size, the ratio of the company age; whether j a and j b are in the same function, whether they are in the same industry;  4)about the user’s aspiration of category b : number of job applications from user u in category b in the last week, last month, last two months, and last three months.
  • 21.
  • 22.
  • 23.
  • 24. EVALUATION OF RECOMMENDATION MODEL  In the Push-Based Scenario
  • 25.
  • 26. In the Pull-Based Scenario • BasicModel • Basic+TranProb • Basic+TranProb+Tenure • Basic+TranProb+TenureProb
  • 27. CONCLUSION  Q: When is the right time to make a job recommendation and how do we use this inference to improve the utility of a job recommender system?  the hierarchical proportional hazards model  real-world job application data : Linkedin
  • 28. Is This App Safe for Children? A Comparison Study of Maturity Ratings on Android and iOS Applications
  • 29. ABSTRACT  we develop mechanisms to verify the maturity ratings of mobile apps and investigate possible reasons behind the incorrect ratings.
  • 30. INTRODUCTION  Android maturity rating policy   “Everyone,” “Low Maturity,” “Medium Maturity,” and “High Maturity,” iOS’s policy  “4+,” “9+,” “12+,” and “17+.”  iOS rates each app submitted according to its own policies  Android apps are purely a result of app developers’ self-report.
  • 31. INTRODUCTION  Android rating policy is unclear, and it is difficult for developers to understand the difference between the four maturity-rating levels  Contribution:  We develop a text mining algorithm to automatically predict apps’ actual maturity ratings from app descriptions and user reviews.  By comparing Android ratings with iOS ratings, we illustrate the percentage of Android apps with incorrect maturity ratings and examine the types of apps which tend to be misclassified.  We conduct some preliminary analyses to explore the factors that may lead to untruthful maturity ratings in Android apps.
  • 32. RESEARCH QUESTIONS  Does iOS rating strictly reflect its policy?  Are app ratings reflected in app descriptions and user reviews? If so, can we build an effective text mining approach to predict the true rating of an app?  Do Android developers provide accurate maturity ratings for their own apps? For apps published in both markets, are Android ratings consistent with iOS ratings?  What are the factors that could lead to untruthful maturity ratings in Android apps in comparison to iOS apps?
  • 33. METHODOLOGY  iOS Maturity Rating Policy vs. Implementation
  • 34.  iOS actually downgrades its official maturity policy during implementation.
  • 36. discrepancies • Android does not consider horror content ( C ) as mature content, while iOS does include • Android considers graphic violence ( B3 ) as mature content while iOS directly rejects apps with graphic violence. • Android integrates privacy protection in its maturity rating policy by including the social feature ( I ) and location collection ( J ). However, no corresponding privacyrelated consideration exists in the maturity rating scheme by iOS. • Frequent/intense cartoon violence and fantasy violence ( A2 ) is rated as “Medium Maturity” (i.e., level 3) in Android but as “9+” (i.e., level 2) in iOS. • Frequent/intense simulated gambling ( H2 ) is rated as “High Maturity” (i.e., level 4) in Android but is rates as “12+” (i.e., level 3) in iOS.
  • 37. we can now use iOS actual maturity rating as a baseline to examine the reliability of Android apps’ maturity ratings.
  • 38. Comparing Apps on iOS and Android  For each Android app, we choose up to 150 search results from the iOS App Store. For those showing similar app names, we conducted analysis to determine the closest fit.  their descriptions and developers’ company names  apps’ icons and screenshots
  • 39. ALM—Automatic Label of Maturity Ratings for Mobile Apps  “Android-only” apps  ALM is a semi-supervised learning algorithm, and it processes apps’ descriptions and user reviews to determine maturity ratings. 1. Building seed-lexicons for objectionable content detection 2. Assigning initial weights to seed-terms 3. Classification 4. Expanding seed-lexicons and adjusting weights
  • 40. 1.Building seed-lexicons for objectionable content detection  Apps are organized based on their rating scheme together with their corresponding token, such as A1.txt , A2.txt , B1.txt , and H2.txt .  Human experts read grouped app descriptions and select seed lexicons to detect objectionable content.  grouped into three bigger lexicons denoted as Ti, i∈ 9,12,17 for classifying the maturity rating: 9+, 12+, and 17+
  • 41. 2.Assigning initial weights to seedterms Pi, Ni For each seed-term t, denote its frequency in Pi and Ni as tp and tn
  • 43. 3.Classification  For each app 4 , all terms in its description are selected and categorized as a set A=tk  maturity rating ma
  • 45. EXPERIMENT A total of 1,464 apps were found on iOS App Store and the rest 3,595 apps were classified as Android-only apps.
  • 46. Experiment 1: Predicting Apps’ Maturity Ratings by the ALM algorithm
  • 47. Experiment 2: Overrated and Underrated Android Applications • overrated • underrated
  • 48. Overrated Android Applications  possible reasons  Intelligence  Simulated Gambling  Violence  Mature and Suggestive Themes
  • 50. Experiment 3: Exploring Factors Contributing to Incorrect Ratings  apps’ attributes : popularity, price, and dangerous level of the required permissions .  Developers’ attributes : general privacy awareness, trustworthiness, actual privacy awareness, and child safety awareness .
  • 51.
  • 52.
  • 53. Conclusion  examine the maturity rating policies on both Android and iOS platforms  possible reasons behind the incorrect ratings  ALM algorithm