I presented a model I am very proud of on mathematical models of the glass ceiling in the Knesset (joint work with Chen Avin BGU, Claire Mathieu ENS, David Peleg Weizmann, Yvonne-Anne Pignolet IBB Zurich, Barbara Keller ETHZ, Hadassa Daltrophe BGU, Yinon Nahum Weizmann). The conorance Was interesting
Utilizing The Social Graph to Surface Relevant Conversations - Defrag09Todd Clayton
This presentation describes the social graph and how you can leverage your social graph to surface conversations that might provide value. I gave this presentation at the 2009 Defrag Conference. You can see the video for this presentation here:
http://blip.tv/file/2849456
Presentation by Martin Weller, Professor of Educational Technology, The Open University UK at the 2018 European Distance Learning Week's first day webinar on "Open Education: What Now?" - 5 November 2018
Recording of the discussion is available: https://eden-online.adobeconnect.com/pqaljdhgy2w2/
Utilizing The Social Graph to Surface Relevant Conversations - Defrag09Todd Clayton
This presentation describes the social graph and how you can leverage your social graph to surface conversations that might provide value. I gave this presentation at the 2009 Defrag Conference. You can see the video for this presentation here:
http://blip.tv/file/2849456
Presentation by Martin Weller, Professor of Educational Technology, The Open University UK at the 2018 European Distance Learning Week's first day webinar on "Open Education: What Now?" - 5 November 2018
Recording of the discussion is available: https://eden-online.adobeconnect.com/pqaljdhgy2w2/
UCL women's group presentation final versionBelinda Brown
Belinda Brown from the Gender Equity Network explores the possibility that gender equality policies designed to correct gender imbalances at the top of academia may be obscuring far more serious inequalities occurring further down
My current study addressed the following question; do parents know how to access cyber bullying information and what knowledge to parents have regarding cyber bullying?
Brief remarks on big data trends and responsible data science at the Workshop on Science and Technology for Washington State: Advising the Legislature, October 4th 2017 in Seattle.
Predictions for what's next for the future of higher educationOlogie
Inspired by the generation of students who will entering college ten years from now, we've identified future states that will define tomorrow's higher education.
Amanda Lenhart delivered this presentation to the Year of the Child summit at the National Association of Attorneys General Year of the Child Conference, Philadelphia, PA, this talk surveys the current research on cyberbullying and online harassment, pulling in Pew Internet data as well as the work of the Crimes Against Children Research Center at the University of New Hampshire, Internet Solutions for Kids and other academics and scholars researching this topic. 5/13/09
Cyberbullying is a pervasive problem in society. This presentation explores (a) definitions and common forms of cyberbullying, (b) the prevalence and characteristics of cyberbullying, (c) the targets, victims. and outcomes of cyberbullying, and (d) practical advice to confront this societal problem. Hopefully, one day, through research and active intervention, we will see a decline of this destructive behavior in schools.
Join the discussion at www.wvucommmooc.org!
Presented at the Google diversity workshop.
Studying gender diversity in software development teams/communities requires understanding gender of individual developers. In this talk I will provide an overview of different ways of asking developers about their gender as well as inferring gender information from the ways they present themselves and artefacts they create. We conclude by discussing limitations of the inference techniques and surveying concerns related to their application.
Title: Variation on preferential-attachment
Abstract
In this talk, I will describe how preferential attachment arises from the first principle using game theory. Next, I will extend the model of preferential attachment into a general model, which allows for the incorporation of Homophily ties in the network. This talk is based on joint works with Prof. Chen Avin, Avi Cohen, Yinon Nahum, Prof. Pierre Fraigniaud, and Prof. David Peleg.
UCL women's group presentation final versionBelinda Brown
Belinda Brown from the Gender Equity Network explores the possibility that gender equality policies designed to correct gender imbalances at the top of academia may be obscuring far more serious inequalities occurring further down
My current study addressed the following question; do parents know how to access cyber bullying information and what knowledge to parents have regarding cyber bullying?
Brief remarks on big data trends and responsible data science at the Workshop on Science and Technology for Washington State: Advising the Legislature, October 4th 2017 in Seattle.
Predictions for what's next for the future of higher educationOlogie
Inspired by the generation of students who will entering college ten years from now, we've identified future states that will define tomorrow's higher education.
Amanda Lenhart delivered this presentation to the Year of the Child summit at the National Association of Attorneys General Year of the Child Conference, Philadelphia, PA, this talk surveys the current research on cyberbullying and online harassment, pulling in Pew Internet data as well as the work of the Crimes Against Children Research Center at the University of New Hampshire, Internet Solutions for Kids and other academics and scholars researching this topic. 5/13/09
Cyberbullying is a pervasive problem in society. This presentation explores (a) definitions and common forms of cyberbullying, (b) the prevalence and characteristics of cyberbullying, (c) the targets, victims. and outcomes of cyberbullying, and (d) practical advice to confront this societal problem. Hopefully, one day, through research and active intervention, we will see a decline of this destructive behavior in schools.
Join the discussion at www.wvucommmooc.org!
Presented at the Google diversity workshop.
Studying gender diversity in software development teams/communities requires understanding gender of individual developers. In this talk I will provide an overview of different ways of asking developers about their gender as well as inferring gender information from the ways they present themselves and artefacts they create. We conclude by discussing limitations of the inference techniques and surveying concerns related to their application.
Title: Variation on preferential-attachment
Abstract
In this talk, I will describe how preferential attachment arises from the first principle using game theory. Next, I will extend the model of preferential attachment into a general model, which allows for the incorporation of Homophily ties in the network. This talk is based on joint works with Prof. Chen Avin, Avi Cohen, Yinon Nahum, Prof. Pierre Fraigniaud, and Prof. David Peleg.
In the paper Preferential Attachment as a Unique Equilibrium, We show how to use the symmetry of game theory in social networks.
This is Join work with Avi Cohen, David Peleg, Zvi Lotker, Chen Avin and Pierre Fraigniaud
The effect of population control on societal fragmentation end-5Zvi Lotker
Population control policies are proposed and in some places employed as a means towards curbing population growth. This paper is concerned with a disturbing side-effect of such policies, namely, the potential risk of societal fragmentation due to changes in the distribution of family sizes. This effect is illustrated in some simple settings and demonstrated by simulation. In addition, the dependence of societal fragmentation on family size distribution is analyzed. In particular, it is shown that under the studied model, any population control policy that disallows families of 3 or more children incurs the possible risk of societal fragmentation.
In this presentation we show that there exist graphs which greedy routing thak long time. This show that Small world is a Social phenomena and not mathematical one.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
8. Models for social networks
• Graphs 𝑮 𝟏, 𝑮 𝟐, 𝑮 𝟑 … where 𝑮 𝒕+𝟏 is derived from 𝑮 𝒕
• How? Vertex/edge arrival events
• Probabilistic Model
9. Preferential attachment
• Proposed by [Price ‘76] and [Barabási ,Albert ‘99] to explain
Power Law.
9
“The rich get richer”
• Dynamic, randomized
joining process
• Rule: a new site
attaches itself to each
site with probability
proportional to its
degree and the and
depend no the colors
10. Definition [Federal glass ceiling commission, 1995]:
“The unseen, yet unbreachable barrier that keeps minorities and women
from rising to the upper rungs of the corporate ladder, regardless of their
qualifications or achievements”
The glass ceiling effect
Our motivating question:
What prevents women
from reaching the stars?
Disclaimer: Potential solutions
are left for future study…
12. How does it look?Individualsno.
Power level
The glass ceiling effect
13. A. Possible causes for inequality
The model considers
1. Minority
2. Homophily
3. The Rich Get Richer
One other possible cause:
4. Leaky pipeline
Individualsno.
Power level
14. Another possible cause for inequality
3. Leaky pipeline:
Members of the red population may quit work (or take
extended vacations) at a higher rate than members of the
blue population
Thanks
to David
Peleg for
the Slide
15. Leaky pipeline in STEM
[USA 2010 statistics]
Students
51% Male
49% Female
Graduates
54% Male
46% Female
First Ph.D. post
56% Male
44% Female
Next level
positions
63% Male
37% Female
Highest level
80% Male
20% Female
Thanks
to David
Peleg for
the Slide
16. Interpretation
To break the glass ceiling:
One should ensure
𝓡minority ⋅ 𝓡leakage ⋅ 𝓡homophily ≥ 1
or
𝑟
𝑏
⋅
𝑞 𝑅
𝑞 𝐵
⋅
𝜌 𝐵 1−𝜌 𝑅
𝜌 𝑅 1−𝜌 𝐵
≥ 1
Increase
women
entrance rate
Increase
women
activity rate
Reduce bias
against
women
Thanks
to David
Peleg for
the Slide
17. Conclusion
• 1 We saw two explanations for the glass ceiling
• 2 We have a formula that measures whether there is a glass ceiling or not
• 𝓡minority ⋅ 𝓡leakage ⋅ 𝓡homophily ≥ 1
• 3 Equality will increase if both parents go on maternity leave
• 4 Equality will increase if everyone went out of retirement at the same age
• Equality would increase if there were more collaborations