This document provides an overview of a KDD 2012 tutorial on information and influence spread in social networks. The tutorial covers key concepts like social networks, information propagation, influence maximization and identifying influencers. It also discusses real-world examples of social influence and applications like viral marketing. While social influence exists, the tutorial notes it is difficult to prove and influence may not always lead to dramatic viral spreads as often assumed. It aims to provide motivation and challenges in studying this topic.
Ethical challenges for online social science research: Networks, rentals and ...berniehogan
Presentation at the 5th International Conference on eSocial Science. Part of a workshop on the law and ethics of eSocial Science research. It outlines three domains I am currently researching and some of the ethical issues I have encountered including reporting on a third party (Facebook), deception (craigslist) and information access (grouphug.us).
PPT presentation given to the American Red Cross Social Data Summit held on August 12, 2010 at the American Red Cross Headquarters in Washington DC. Heather Blanchard, Co Founder of CrisisCommons closing keynote slide deck.
JTerm Day 2 - History, Definitions & StatsAndrew Hoffman
This presentation walks through some historic context for social media, definitions and relevant statistics. All of this content was for the purpose of raising awareness for scale and impact.
Ethical challenges for online social science research: Networks, rentals and ...berniehogan
Presentation at the 5th International Conference on eSocial Science. Part of a workshop on the law and ethics of eSocial Science research. It outlines three domains I am currently researching and some of the ethical issues I have encountered including reporting on a third party (Facebook), deception (craigslist) and information access (grouphug.us).
PPT presentation given to the American Red Cross Social Data Summit held on August 12, 2010 at the American Red Cross Headquarters in Washington DC. Heather Blanchard, Co Founder of CrisisCommons closing keynote slide deck.
JTerm Day 2 - History, Definitions & StatsAndrew Hoffman
This presentation walks through some historic context for social media, definitions and relevant statistics. All of this content was for the purpose of raising awareness for scale and impact.
"You can just tell whether a website looks reliable or not." People's modes o...Lynn Connaway
Connaway, L. S. (2018). "You can just tell whether a website looks reliable or not." People's modes of online engagement. Keynote presented at Universidad Javeriana, October 2, 2018, Bogota, Colombia.
People Like You Like Presentations Like ThisDavid Millard
My EUROCALL 2017 keynote. On how Web Science can help us understand how we got the Web we have.
Abstract: The web has its roots in utopian visions of how technology could benefit humankind. Social media systems were part of this vision, using personalisation technologies to adapt the web you see to better suite your interests. But in the last decade we have seen an increasing number of problems, from anti-social behaviour to fake news, and concerns are being raised about the dangers of personal data collection, from mass surveillance to political propaganda. This talk will present the discipline of Web Science which asks how we got the Web we have, and aims to understand the dynamics of human interaction online, so that we can develop software and policies that help rather than harm. I argue that this is needed now more than ever, as future technology promises to be just as disruptive to our culture and society as the Web, and it is only by understanding these interactions, and acknowledging their consequences, that we can build technology that changes the world in ways that we actually want.
Eduwebinar: Our Everyday Tools for SuccessJudy O'Connell
The digital revolution has given us a world of global connectedness, information organisation, communication and participatory cultures of learning, giving teachers the opportunity to hone their professional practice through their networked learning community. What do you do to make it so?
Introduction to Social Media For Small BusinessWeb.com
What is social media? What Applications do small businesses need to use and much more from Jessica Hibbard
Frederick County Chamber of Commerce(frederickchamber.org) and Beth Schillaci Author of the Social Media Roadmap http://amzn.to/gXZkRJ
The Effects of Time on Query Flow Graph-based Models for Query SuggestionCarlos Castillo (ChaTo)
Ranieri Baraglia, Carlos Castillo, Debora Donato, Franco Maria Nardini, Raffaele Perego and Fabrizio Silvestri: "The Effects of Time on Query Flow Graph-based Models for Query Suggestion". In proceedings of RIAO. Paris, France, 2010.
Slides prepared by Franco Maria Nardini
Barbara Poblete, Aristides Gionis, Carlos Castillo: \"Dr. Searcher and Mr. Browser: a unified hyperlink-click graph\". Proceedings of CIKM, Napa Valley, CA, USA, October 2008.
Characterizing the Life Cycle of Online News Stories Using Social Media React...Carlos Castillo (ChaTo)
Carlos Castillo, Mohammed El-Haddad, Jürgen Pfeffer and Matt Stempeck: Characterizing the Life Cycle of Online News Stories Using Social Media Reactions. In CSCW. Baltimore, USA. February 2014.
Presentation at the Tow Center for Digital Journalism, Columbia University. November 14th, 2013.
VIDEO: http://new.livestream.com/accounts/1079539/events/2542929
http://towcenter.org/events/conversation-with-carlos-castillo/
Abdulfatai Popoola, Dmytro Krasnoshtan, Attila Toth, Victor
Naroditskiy, Carlos Castillo, Patrick Meier and Iyad Rahwan: Information Verification During Natural Disasters. In SWDM workshop, Rio de Janeiro, Brazil. 2013.
See also: http://www.veri.ly/
=========================
- Video #1 (Al Jazeera): http://www.youtube.com/watch?v=w4TmT_o8wy4
- Video #2 (CNN): http://www.youtube.com/watch?v=pAHoEO-K0Ek
"You can just tell whether a website looks reliable or not." People's modes o...Lynn Connaway
Connaway, L. S. (2018). "You can just tell whether a website looks reliable or not." People's modes of online engagement. Keynote presented at Universidad Javeriana, October 2, 2018, Bogota, Colombia.
People Like You Like Presentations Like ThisDavid Millard
My EUROCALL 2017 keynote. On how Web Science can help us understand how we got the Web we have.
Abstract: The web has its roots in utopian visions of how technology could benefit humankind. Social media systems were part of this vision, using personalisation technologies to adapt the web you see to better suite your interests. But in the last decade we have seen an increasing number of problems, from anti-social behaviour to fake news, and concerns are being raised about the dangers of personal data collection, from mass surveillance to political propaganda. This talk will present the discipline of Web Science which asks how we got the Web we have, and aims to understand the dynamics of human interaction online, so that we can develop software and policies that help rather than harm. I argue that this is needed now more than ever, as future technology promises to be just as disruptive to our culture and society as the Web, and it is only by understanding these interactions, and acknowledging their consequences, that we can build technology that changes the world in ways that we actually want.
Eduwebinar: Our Everyday Tools for SuccessJudy O'Connell
The digital revolution has given us a world of global connectedness, information organisation, communication and participatory cultures of learning, giving teachers the opportunity to hone their professional practice through their networked learning community. What do you do to make it so?
Introduction to Social Media For Small BusinessWeb.com
What is social media? What Applications do small businesses need to use and much more from Jessica Hibbard
Frederick County Chamber of Commerce(frederickchamber.org) and Beth Schillaci Author of the Social Media Roadmap http://amzn.to/gXZkRJ
The Effects of Time on Query Flow Graph-based Models for Query SuggestionCarlos Castillo (ChaTo)
Ranieri Baraglia, Carlos Castillo, Debora Donato, Franco Maria Nardini, Raffaele Perego and Fabrizio Silvestri: "The Effects of Time on Query Flow Graph-based Models for Query Suggestion". In proceedings of RIAO. Paris, France, 2010.
Slides prepared by Franco Maria Nardini
Barbara Poblete, Aristides Gionis, Carlos Castillo: \"Dr. Searcher and Mr. Browser: a unified hyperlink-click graph\". Proceedings of CIKM, Napa Valley, CA, USA, October 2008.
Characterizing the Life Cycle of Online News Stories Using Social Media React...Carlos Castillo (ChaTo)
Carlos Castillo, Mohammed El-Haddad, Jürgen Pfeffer and Matt Stempeck: Characterizing the Life Cycle of Online News Stories Using Social Media Reactions. In CSCW. Baltimore, USA. February 2014.
Presentation at the Tow Center for Digital Journalism, Columbia University. November 14th, 2013.
VIDEO: http://new.livestream.com/accounts/1079539/events/2542929
http://towcenter.org/events/conversation-with-carlos-castillo/
Abdulfatai Popoola, Dmytro Krasnoshtan, Attila Toth, Victor
Naroditskiy, Carlos Castillo, Patrick Meier and Iyad Rahwan: Information Verification During Natural Disasters. In SWDM workshop, Rio de Janeiro, Brazil. 2013.
See also: http://www.veri.ly/
=========================
- Video #1 (Al Jazeera): http://www.youtube.com/watch?v=w4TmT_o8wy4
- Video #2 (CNN): http://www.youtube.com/watch?v=pAHoEO-K0Ek
Social Media News Communities: Gatekeeping, Coverage, and Statement BiasMounia Lalmas-Roelleke
We examine biases in online news sources and social media communities around them. To that end, we introduce unsupervised methods considering three types of biases: selection or "gatekeeping" bias, coverage bias, and statement bias, characterizing each one through a series of metrics. Our results, obtained by analyzing 80 international news sources during a two-week period, show that biases are subtle but observable, and follow geographical boundaries more closely than political ones. We also demonstrate how these biases are to some extent amplied by social media.
Extracting Information Nuggets from Disaster-Related Messages in Social MediaMuhammad Imran
This presentation describes our work presented at the 10th International Conference on Information Systems on Crisis Response and Management (ISCRAM) in Baden-Baden, Germany. The work shows the importance of microblogging websites such as Twitter, and huge number of informative messages that can contribute to situational awareness at the time of disasters. Specifically, the work shows the classification, and information extractions of those valuable, actionable informative messages that people post during emergencies.
What to Expect When the Unexpected Happens: Social Media Communications Acros...Carlos Castillo (ChaTo)
Alexandra Olteanu, Sarah Vieweg and Carlos Castillo: "What to Expect When the Unexpected Happens: Social Media Communications Across Crises" In CSCW 2015, 14-18 March in Vancouver, Canada. ACM Press.
KDD 2016 tutorial on Algorithmic Bias, Parts III and IV.
Video: https://www.youtube.com/watch?v=ErgHjxJsEKA
By Sara Hajian, Francesco Bonchi, and Carlos Castillo.
http://francescobonchi.com/algorithmic_bias_tutorial.html
Emotions and dialogue in a peer-production community: the case of WikipediaDavid Laniado
Slides presented at WikiSym 2012.
This paper presents a large-scale analysis of emotions in conversations among Wikipedia editors. Our focus is on the emotions expressed by editors in talk pages, measured by using the Affective Norms for English Words (ANEW).
We find evidence that to a large extent women tend to participate in discussions with a more positive tone, and that administrators are more positive than non-administrators. Surprisingly, female non-administrators tend to behave like administrators in many aspects.
We observe that replies are on average more positive than the comments they reply to, preventing many discussions from spiralling down into conflict. We also find evidence of emotional homophily: editors having similar emotional styles are more likely to interact with each other.
Our findings offer novel insights into the emotional dimension of interactions in peer-production communities, and contribute to debates on issues such as the flattening of editor growth and the gender gap.
Given the growth of social media and rapid evolution of Web of Data, we have unprecedented opportunities to improve crisis response by extracting social signals, creating spatio-temporal mappings, performing analytics on social and Web of Data, and supporting a variety of applications. Such applications can help provide situational awareness during an emergency, improve preparedness, and assist during the rebuilding/recovery phase of a disaster. Data mining can provide valuable insights to support emergency responders and other stakeholders during crisis. However, there are a number of challenges and existing computing technology may not work in all cases. Therefore, our objective here is to present the characterization of such data mining tasks, and challenges that need further research attention for leveraging social media and Web of Data to assist crisis response coordination.
Main topics: social media mining, social networks, and influence propagation. Includes an application to social media in disasters.
Talk given at the European Summer School on Information Retrieval (ESSIR 2015) on September 1st, 2015.
See also: http://chato.cl/
KDD 2016 tutorial on Algorithmic Bias, Parts I and II.
Video:
Part I: https://www.youtube.com/watch?v=mJcWrfoGup8
Part II: https://www.youtube.com/watch?v=nKemhMbaYcU
Part III: https://www.youtube.com/watch?v=ErgHjxJsEKA
By Sara Hajian, Francesco Bonchi, and Carlos Castillo.
http://francescobonchi.com/algorithmic_bias_tutorial.html
Presentation charting the development of Web 2.0 technologies, and how to use them effectively as a medical professional, whilst avoiding the pitfalls. Draws on UK, ANZ and general professionalism guidelines.
Sociology Update on new topics for 2015: Subject content and Teaching Ideas by Patrick Robinson, Teacher at Cadbury College, Birmingham. A presentation at the BSA Teaching Group Regional Conference on 28 February 2015
Social Science in the Public Sphere: Riots, Class and ImpactLSEImpactblog
Event on 2 July 2013 with Prof Tim Newburn discussing the Reading the Riots project and Prof Fiona Devine and Dr Sam Friedman discussing the Great British Class Survey.
A sample of slides used from the Wired Nonprofit class at NYU SCPS at the Heyman Center for Philanthropy and Fundraising. From Marcia Stepanek, Tom Watson and Howard Greenstein
A presentation for undergraduate journalism students on using Twitter for research, as well as best practices for sourcing and verifying social content.
ESSAY INSTRUCTIONSI. TITLE & NUMBER OF THE COURSE ENGL 1301 .docxSALU18
ESSAY INSTRUCTIONS
I. TITLE & NUMBER OF THE COURSE: ENGL 1301
II. TITLE OF THE ASSIGNMENT: Examining an Issue
III. GENERAL EDUCATION CORE OBJECTIVES TO BE ASSESSED WITH THIS
ASSIGNMENT
A. Critical Thinking: Students will develop habits of mind, allowing them to appreciate the processes by which scholars in various disciplines organize and evaluate data and use the methodologies of each discipline to understand the human experience.
B. Communication Skills: Students will communicate ideas, express feelings and support conclusions effectively in written, oral and visual formats.
C. Personal Responsibility: Students will develop habits of intellectual exploration, personal responsibility and physical wellbeing.
IV. ASSIGNMENT AS GIVEN TO STUDENTS
Write an essay of 600 – 750 words (2.5 – 3 pages) that examines a topic from our class readings. The essay must do the following:
o Discuss the topic fully, using evidence from the reading
o Support a clear thesis statement
o Use other written sources as required by your instructor
o Attribute and document accurately all information from other sources
o Draw an informed conclusion based on the reading, sources (if required,) and if appropriate, your own experience
· Complete this essay in several stages (for example: pre-writing, drafting, revising/editing a draft,) and submit the work for each of those stages at posted deadlines
· Use Edited American English
· Address an audience of your classmates and instructor
· Follow MLA format and documentation standards
·
Guide for Social Issue Essay
Introduction
Start with an interesting question, a significant quote, a bold statement, or an interesting fact/statistic about your social issue (grab the reader’s attention). If you use words or ideas from a third source, be sure to add the appropriate documentation. Discuss the importance of the social issue. Why does it matter? Who is affected? Be general in your introduction. End the introduction with a thesis statement (implicit or explicit).
Body Paragraph Organization
1. Topic sentence that mentions the social issue and the subtopic (the connection between the sources). 2. Provide another sentence that continues with the idea within your topic sentence. 3. Introduce the source and provide your evidence and citation.
4. Analyze the evidence in relation to the topic sentence. (Asking how and why and other interviewer questions) 5. Provide a transition that suggests a similarity and introduce the other source (also provide your evidence and citation). 6. Synthesize the sources. Make the connection between the sources. State it. Don’t make the reader have to come up with the connection. This is your goal for the body paragraph.
Conclusion
Restate the thesis. Ask NOW WHAT? What can people do to help society overcome this social issue? Consider how the world would be a better place if the social issue did not exist.
Works Cited
Go to the article in the database ...
Lee Rainie, director of the Pew Internet Project, will describe the new media ecology and how “networked individuals” get, share and create information. This new environment has disrupted the old models of public relations and requires a new understanding of how information is passed through social media and networks and how influence is reconfigured when everyone is a publisher and a broadcaster.
Ponencia Congreso Andaluz Sociología, Almeria 25.11.2016 Social media el quin...BO TRUE ACTIVITIES SL
Las redes sociales en Internet han dado voz a los que no la tenían y han tenido un impacto democratizador en todo el mundo, aunque también, como dice Umberto Eco, le dan el derecho de hablar a legiones de idiotas. No obstante, muchos académicos son optimistas acerca de la capacidad del uso de Internet en el ámbito de lo social para incrementar las manifestaciones convencionales de activismo o compromiso social. ¿Cómo se manifiestan los movimientos sociales en Internet? ¿Qué papel juegan los medios de comunicación? ¿Hay personas centrales? ¿Existen patrones comunes en las redes sociales en internet? ¿De qué manera el uso de las redes sociales en internet facilita la discusión y la acción colectiva?
Stefanie Duguay, Jean Burgess, and Ben Light
Digital Media Research Centre, Queensland University of Technology
Draft working paper for the Digital Intimate Publics Symposium, 19-20 November 2015, University of Queensland, Brisbane, Australia
Abstract
This paper focuses on images of sexual desire that shape digital intimate publics of same-sex attracted women through related hashtags on social media platforms. While previous research has focused on same-sex attracted men’s use of digital technology to perform sexuality, studies of same-sex attracted women are sparse, focused on older technologies, and complicated by debates around gendered power relations. This is investigated by examining sexual content organised through hashtags related to same-sex attracted women (e.g., #lesbian, #gaygirl) on Instagram and Vine. Textual and visual analysis of user-generated content is paired with walkthroughs interrogating these platforms’ design, activity flows and features, identifying mediators that shape performances of sexual desire. Preliminary analysis shows that performances on Instagram can be divided into four categories: pornography and advertisements; memes, animations, and popular media; images of idealised ‘lesbians’; and personal selfies and sexy photos. On Vine, popular media and idealised lesbians are represented in fan mash-ups of YouTube celebrities while the majority of sexual performances involve sensual lip dubs and dancing to rap and hip hop music. Each platform provides unique affordances for these performances, such as Instagram’s filters and Vine’s audio track tools, as well as shared affordances like co-hashtags. Further analysis will allow for a better understanding of these multiple components of performances of sexual desire, presenting a view of Instagram and Vine’s digital intimate publics relating to same-sex attracted women.
I presented on social media today for the HR group with the Minnesota Department of Transportation. They organized their conference with a Star Trek motif, which caused me to refresh my presentation, encouraging them to boldly go....
Gatewatching 11: Echo Chambers? Filter Bubbles? Reviewing the EvidenceAxel Bruns
Lecture 11 in the course From Gatekeeping to Gatewatching: News and Journalism in the Digital Age.
This lecture series addresses the continuing transformation of the production and consumption of journalism in the contemporary media environment. It provides a brief history of the impact of participatory online news production and engagement practices – from the first wave of citizen journalism to the social media platforms of today – on how news content is disseminated and experienced; examines reactive and proactive responses to these changes by news organisations and journalists; and explores the longer-term impact of these developments on the public sphere, touching on the power of social media platforms and their role in shaping their users’ information diets.
Readings are largely drawn from Gatewatching and News Curation: Journalism, Social Media, and the Public Sphere (Bruns, 2018), with additional readings recommended for selected lectures.
Reading for this lecture:
Bruns, A. (2022). Echo Chambers? Filter Bubbles? The Misleading Metaphors That Obscure the Real Problem. In M. Pérez-Escolar & J. M. Noguera-Vivo (Eds.), Hate Speech and Polarization in Participatory Society (pp. 33–48). Routledge. https://doi.org/10.4324/9781003109891-4
This is a citizen science overview particularly aimed at graduate students enrolled in a new course at Arizona State University, aptly titled "Citizen Science." The author of this presentation, and course instructor, Darlene Cavalier, will talk students through its nuances and intersections with science, technology, and society.
On A Quest for Combating Filter Bubbles and Misinformation.
Invited Talk, Chinese University of Hong Kong at Shenzhen, Dec 13, 2022.
Social media have greatly facilitated access to information and news and have enhanced users' ability to share with peers their views on issues. However, they have unfortunately led to increased societal polarization. At the center of this phenomenon are filter bubbles and misinformation. Filter bubbles are the result of excessive personalization which enhances relevance of content at the price of limiting exposure to a specific viewpoint. These bubbles are amplified by the so-called echo chambers that exist in social media, whereby members of a community mutually reinforce a fixed opinion or viewpoint on an issue. Misinformation as well as disinformation, on the other hand, tends to propagate through the network, often faster and more virally than truth.
Both problems manifest themselves in the form of groups of actors working in concert and providing mutual reinforcement. How can we recognize these groups? Having detected them, how can we counteract these problems? The first question can benefit from an examination of techniques developed to search for dense subgraphs in an underlying network. As for the second question, a natural approach for countering filter bubbles is to launch some kind of counter-campaign to balance users' exposure to viewpoints. Countermeasures for misinformation propagating through a network depend on the party planning the countermeasure. The network host can intervene and take steps to limit the propagation of misinformation, but these actions come with a cost. Besides the political sensitivity and cost of limiting freedom of expression, what if the intervention was by mistake done on genuine information? On the other hand, a third party interested in countering the propagation of misinformation may launch a counter-campaign. Some of the ideas behind designing such campaigns have strong connections to a classic problem called Influence Maximization, studied in a very different context, driven by different applications like viral marketing, infection containment, and revenue or welfare maximization. In this talk, we will examine research on detecting dense subgraphs as well as competitive influence maximization and discuss how that can inspire techniques for addressing the two problems above.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Monitoring Java Application Security with JDK Tools and JFR Events
Kdd12 tutorial-inf-part-i
1. KDD 2012 Tutorial
Information and Influence
Spread in Social Networks
Carlos Castillo (Qatar Computing Research Institute)
Wei Chen (Microsoft Research Asia)
Laks V. S. Lakshmanan* (University of British Columbia)
* Research supported by an NSERC Strategic
Grant on Business Intelligence Network
2. Disclaimers
What this tutorial will not cover/do
◦ Comprehensive Study of various Diffusion Models,
Applications, Network Measurements.
◦ General Graph Mining
◦ Analytics of Social Media
◦ Heterogeneous Information Networks
◦ No completeness guarantee on focal topic!
Where to look if you are interested in these topics?
◦ Information Diffusion and Influentials [Budak, Al Abbadi,
and Agrawal VLDB 2011]
◦ Graph Mining [Faloutsos, Miller and Tsourakakis KDD 2009]
◦ Social Media Analytics [Leskovec KDD 2011]
◦ Heterogeneous IN [Han, Sun, Yan, and Yu, KDD 2010].
2
3. Acknowledgments
Francesco Bonchi Amit Goyal Michalis Smriti Bhagat
Yahoo! Research PhD Student Mathioudakis Technicolor Palo
UBC Phd Student Alto Research Lab
Univ. Toronto
Suresh Venkata- Wei Lu Chi Wang
Yajun Wang
3 Subramanian PhD Student PhD Student
MSRA 3
Utah UBC UIUC
4. Acknowledgments (cont’d)
Chin-Yew Lin Li Zhang Zhenming Liu Guojie Song
MSRA MSR-SVC post-doc Peking U.
Princeton
Tao Sun Xiaorui Sun Wei Wei Rachel Cummings
PhD student PhD student PhD student PhD student
4
Peking U. Columbia CMU Northwestern U.
5. Acknowledgments (cont’d)
Yifei Yuan Xinran He Te (Tony) Ke
Alex Collins
PhD student PhD student PhD student
Google
UPenn USC UC Berkeley
Ning Zhang
PhD student
Purdue U.
Ming Zhang
Siyu Yang David Rincon Qingye Jiang Peking U.
PhD student Universitat Politècnica Master student
5 Princeton de Catalunya Columbia U.
6. Outline
Part I: Motivation, Applications and Key
Concepts
Part II: Data and Tools
Part III: Influence Maximization
Part IV: Other Issues
Part V: Challenges
6
7. Part I → Part II → Part III → Part IV → Part V
Motivation, Applications and
Key Concepts
7
8. Part I: Outline
• Social Networks and Social
Influence
• Real-world stories
• Example applications
• The Flip Side
8
12. Information Propagation
nice read indeed!
09:00 09:30
People are connected and perform actions
friends, fans, comment, link, rate, like,
followers, etc. retweet, post a message,
photo, or video, etc.
12
13. Basic Data Model
Graph: users, links/ties Log: user, action, time
𝐺 = (𝑉, 𝐸) 𝐴 = { 𝑢1 , 𝑎1 , 𝑡1 , … }
John User Action Time
John Rates with 5 stars June 3rd
“The Artist”
Mary Peter
Peter Watches June 5th
“The Artist”
Jen
Jen … …
13
15. Social Influence: Real-world Story I
12K people, 50K links, medical records from 1971 to 2003
Obese Friend 57% increase in chances of obesity
Obese Sibling 40% increase in chances of obesity
Obese Spouse 37% increase in chances of obesity
15 [Christakis and Fowler, New England Journal of Medicine, 2007]
16. Social Influence: Real-world Story II
Key to understanding people is
understanding ties between
them.
Your friend’s friends’ actions and
feelings affect your thoughts,
feelings and actions!
• Back pain: spread from West to East in Germany after fall of Berlin Wall
• Suicide: well known to spread throughout communities on occasion
• Sex practices: e.g., growing prevalence of oral sex among teenagers
• Politics: the denser your connections, the more intense your convictions
16 [Christakis and Fowler 2011]
18. Social Influence: Real-world Story III
Hotmail’s viral climb Join the world's largest e-mail service
with MSN Hotmail. http://www.hotmail.com
to the top spot
(90s): 8 million users Simple message added to footer
of every email message sent out
in 18 months!
Boosted brand
awareness
Far more effective
than conventional
advertising by rivals
◦ … and far cheaper,
too!
18
19. Social Influence: Real-world Story IV
From rags to riches – Ted Williams
◦ Voice over artist
◦ Homeless and many a
brush with the law.
◦ Found at a street corner in
Columbus, OH in Jan 2011
◦ Interview posted in
YouTube; 13 million views
◦ Attracted numerous offers,
including jobs!
19
20. Social Influence: Real-world Story V
Gold award from YouTube for most hits;
featured in Time, BBC News, News1130 ...
> 58 x 106 hits on YouTube as of June 2012
20
21. Social Influence: Real-world Story V
Indian song from the sound track of the
upcoming Tamil movie Why this
க ொலைகெறி டி? (Why this kolaveri di?)
◦ Released on Nov. 16, 2011
◦ Top trend on Twitter on Nov. 21 2011
Within 1 week of release:
> 1.3 x 106 views on YouTube
> 106 “shares” on Facebook
Reaches many non-Tamil speakers.
21
22. Info. Diffusion: Real-world Story VI
2008 Mumbai Terror Attacks
≈16 tweets/second sent to Twitter via SMS
◦ eyewitness accounts, pleas for blood donors…
Wikipedia page up within minutes, with staggering
amount of detail and extremely fast “live” updates
Metroblog as a newswire service; 112 Flickr photos by
a journalist giving a firsthand account of aftermath
Google map with main buildings involved in the
attacks, with links to background and new stories!
22
23. Info. Diffusion: Real-world Story VII
2011 Stanley Cup Riots Vancouver Triggered widespread
reactions of disgust
◦ Turned into a way to
mobilize clean-ups
Over time, catch the
rioters and publicly shame
them on SM
100 hours VHS footage
Young rioters bragging from 1994 riots vs. 5000
in social media: e.g., hours of 100 types of digital
video
posing with (looted)
◦ Need for sophisticated and
Gucci bags in front of efficient analytics
23
burning cars.
25. Applications
Viral Marketing
Social media analytics
Spread of falsehood and rumors
Interest, trust, referrals
Adoption of innovations
Human and animal epidemics
Expert finding
Behavioral targeting
Feed ranking
“Friends” recommendation
Social search
25
26. Application: viral marketing
Purchase decisions are increasingly influenced
by opinions of friends in Social Media
How frequently do you share
recommendations online?
26
27. Viral/Word-of-Mouth Marketing
Idea: exploit social influence for marketing
Basic assumption: word-of-mouth effect
◦ Actions, opinions, buying behaviors, innovations,
etc. propagate in a social network
Target users who are likely to produce
word-of-mouth diffusion
◦ Additional reach, clicks, conversions,
brand awareness
◦ Target the influencers
27
28. Transitivity of trust
Trust is associated with the belief of an agent in
the assertions by other agents; it is neither
necessary nor sufficient for influence
The Web of Trust from the early 1990s
◦ Public Key Certification
◦ Advogato: propagate trust through links
Transitive social importance from the late 1940s
◦ Seeley 1949, Wei 1952, Katz 1953: transitive
importance computation
◦ Reinvented as PageRank [Page et al. TR 1998]
◦ TrustRank [Gyongyi et al. VLDB 2004], EigenTrust,
Trust/distrust propagation
28
31. Identifying influencers: start-ups
Klout
◦ Measure of overall influence online (mostly Twitter, now FB and LinkedIn)
◦ Score = function of true reach, amplification probability and network influence
◦ Claims score to be highly correlated to clicks, comments and retweets
Peer Index
◦ Identifies/Scores authorities on the social web by topic
SocialMatica
◦ Ranks 32M people by vertical/topic, claims to take into account quality of authored
content
Influencer50
◦ Clients: IBM, Microsoft, SAP, Oracle and a long list of tech companies
+ Svnetwork, Bluecalypso, CrowdBooster, Sproutsocial, TwentyFeet,
EmpireAvenue, Twitaholic, and many others …
31
33. Viral marketing &
The Influence Maximization Problem
33
Problem statement:
◦ find a seed-set of influential people such that
by targeting them we maximize the spread
of viral propagations
Focus of Part III of this tutorial
33
35. Criticisms / caveats
1. Are we observing correlation or
causation? Homophily or influence?
2. Can social influence actually drive viral
cascades?
3. Is viral marketing useful in practice?
35
36. Homophily or Influence?
Homophily: tendency to stay together with
people similar to you
“Birds of a feather flock together”
E.g. I’m overweight I date overweight girls
Influence: force that a person A exerts on a
person B that changes the behavior/opinion of B
Influence is a causal process
E.g. my girlfriend gains weight I gain weight too
36
37. Can social influence really drive
viral cascades?
Watts et al. challenge the traditional
notions and intuitions about SI causing
viral spread
Social epidemics are not always
responsible for dramatic, possibly
sudden social change
Influence is hard to prove
Do not dismiss influence altogether
37 [Watts & Paretti, Harvard Business Review 2007]
38. “Viral” cascades are shallow
Across multiple
social media
platforms:
Most adoptions
are not due to
influence from
others (depth=0)
Most cascades
are shallow
(depth=1-2)
38 [Goel et al. EC 2012]
39. How useful is viral marketing?
Criticism #1: Hard to predict which
campaign will succeed virally.
◦ Lack of predictability makes VM hard to
implement;
◦ The magic might not be in a small number of
influentials
◦ “Big seed” marketing is a predictable,
practical alternative
39 [Watts & Paretti, Harvard Business Review 2007]
40. Example: Huffington Post
Ad agency buys all of the
ad slots for a week
Displays attractive videos
with options for easy
sharing
Gets 7x more views due to
social referrals, but …
None of the videos “goes
viral” (grows exponentially
in views) at any time
40 [Watts & Paretti, Harvard Business Review 2007]
41. Evidence of Real Influence
People rate an item
higher if a friend has
recommended it
Even after carefully
removing homophily
effects, influence can
be clearly observed
41 [Huang et al. WSDM 2012, Aral et al. PNAS 2009]
43. Key takeaways
General idea of Social networks and
information propagation and how they are
modeled
Several real-life stories of influence and
information propagation
Other applications
The flip side: it is easy to get overexcited –
both about existence of influence and
about its absence!
43