Web Science is well poised to make advances by facilitating collaboration between theories, data, methods, and computational infrastructure regarding social networks. Recent developments allow capturing relational metadata from social networks to better understand how communities emerge and are enabled. Exponential random graph modeling can detect structural patterns in large networks to test theories about motivations for link creation and dissolution. Understanding these generative mechanisms could help contextualize community goals.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
An Online Social Network for Emergency ManagementConnie White
This document proposes investigating whether an online social network could help facilitate collaboration across different emergency management organizations. It discusses how social networking sites are becoming more popular tools for mass collaboration. The researchers conducted a survey of emergency management students to get preliminary feedback on using social networks for emergency coordination. The results showed strong agreement that social networks could effectively support information sharing and communication during emergencies. The researchers plan to further engage emergency professionals to understand their needs and how a social network could best serve the emergency domain.
The document discusses several reviews and responses related to theories of networks. It covers topics like how networks are used for control and surveillance. One review discusses the book "The Exploit" which analyzes networks and how their flaws can be exploited for change. The authors respond that networks should also be viewed as post-human and beyond human control. They raise questions about the ontology of networks and how humans should relate to increasingly technological systems.
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
Detailing guidelines and safe practices for using social media across a range of emergency management applications‚ Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies supplies cutting-edge methods to help you inform the public‚ reduce information overload‚ and ultimately‚ save more lives.
Introduces collaborative mapping tools that can be customized to your needs
Explores free and open-source disaster management systems‚ such as Sahana and Ushahidi
Covers freely available social media technologies—including Facebook‚ Twitter‚ and YouTube
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
This document discusses social network theory and analysis. It defines a social network as including actors (nodes) and the relationships (ties) between them. Social network analysis examines the relationships and structure of relationships between social entities like individuals or organizations. The document outlines some key concepts in social network theory including centrality, which looks at the importance of individual actors, and multiplexity, which refers to relationships serving multiple functions. It also discusses how network characteristics like size, subgroups, and centralization vs decentralization impact information sharing and decision making in organizations.
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
This document discusses multimode network-based approaches for efficiently learning collective behavior in large social networks. It provides an overview of existing approaches for predicting collective behavior based on the behaviors of connected individuals. Specifically, it describes methods that extract social dimensions from networks to represent affiliations between actors and then apply supervised learning to determine which dimensions are informative for behavior prediction. However, existing approaches do not scale well to networks with millions of actors. The document proposes a new edge-centric clustering approach to extract sparse social dimensions, enabling the efficient handling of very large networks while maintaining predictive performance.
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
An Online Social Network for Emergency ManagementConnie White
This document proposes investigating whether an online social network could help facilitate collaboration across different emergency management organizations. It discusses how social networking sites are becoming more popular tools for mass collaboration. The researchers conducted a survey of emergency management students to get preliminary feedback on using social networks for emergency coordination. The results showed strong agreement that social networks could effectively support information sharing and communication during emergencies. The researchers plan to further engage emergency professionals to understand their needs and how a social network could best serve the emergency domain.
The document discusses several reviews and responses related to theories of networks. It covers topics like how networks are used for control and surveillance. One review discusses the book "The Exploit" which analyzes networks and how their flaws can be exploited for change. The authors respond that networks should also be viewed as post-human and beyond human control. They raise questions about the ontology of networks and how humans should relate to increasingly technological systems.
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
Detailing guidelines and safe practices for using social media across a range of emergency management applications‚ Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies supplies cutting-edge methods to help you inform the public‚ reduce information overload‚ and ultimately‚ save more lives.
Introduces collaborative mapping tools that can be customized to your needs
Explores free and open-source disaster management systems‚ such as Sahana and Ushahidi
Covers freely available social media technologies—including Facebook‚ Twitter‚ and YouTube
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
This document discusses social network theory and analysis. It defines a social network as including actors (nodes) and the relationships (ties) between them. Social network analysis examines the relationships and structure of relationships between social entities like individuals or organizations. The document outlines some key concepts in social network theory including centrality, which looks at the importance of individual actors, and multiplexity, which refers to relationships serving multiple functions. It also discusses how network characteristics like size, subgroups, and centralization vs decentralization impact information sharing and decision making in organizations.
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
This document discusses multimode network-based approaches for efficiently learning collective behavior in large social networks. It provides an overview of existing approaches for predicting collective behavior based on the behaviors of connected individuals. Specifically, it describes methods that extract social dimensions from networks to represent affiliations between actors and then apply supervised learning to determine which dimensions are informative for behavior prediction. However, existing approaches do not scale well to networks with millions of actors. The document proposes a new edge-centric clustering approach to extract sparse social dimensions, enabling the efficient handling of very large networks while maintaining predictive performance.
The document discusses the rise of the Internet and the emergence of a "Fifth Estate" enabled by greater access to information and ability to network. It defines the Fifth Estate as a critical mass of individuals sourcing information, networking, and holding organizations accountable in new ways. Various strategies of the Fifth Estate are described, such as searching for information, sourcing new information, distributing leaks, forming collaborative networks, collective action, and collective intelligence. Challenges to the Fifth Estate from governments, businesses and other groups are also discussed.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
DPSY 6121 Wk2 ASSGN: Electronic Media Influence Part 1eckchela
This is a Walden University course (DPSY 6121 and 8121), Electronic Media Influence Part 1 and 2. It is written in APA format, includes references, and has been graded (A) by Dr. Elizabeth Essel ," Nice job on Part 1 of this assignment, Orlanda. You nicely discussed how the media you chose impacted yourself and how it might impact you as a professional. You also did a very nice job highlighting some important milestones about the media you chose. For part 2, you did a great job discussing how some of theories we learned about in our class this week could explain the behaviors you discussed in part 1. Overall, you included some really good sources to support your paper. Great job! Note from Orlanda Haynes: Higher-education assignments are, usually, submitted to Turnitin, so remember to paraphrase. Let us begin.
This document provides information about the Asia Triple Helix Society Summer Seminar to be held on June 25, 2014 in Daegu, South Korea. It will be held in conjunction with the 2014 World Conference for Public Administration. The seminar will include two panels on topics related to social media, big data, and North Korea, as well as corporate networks and entrepreneurial universities. Details are provided on the keynote speakers, panelists and their topics, dates and deadlines for abstracts and papers, location, sponsors, and contacts. The document outlines the full program agenda with titles, speakers and respondents for each presentation slot.
The document discusses networks and network theory. It defines what a network is and provides examples of networks in nature, society, and technology. It also discusses key network concepts like nodes, edges, average path length, clustering coefficients, and different types of networks including random, lattice, and small-world networks. Power laws and scale-free networks are also covered.
Cal Poly - Data Management: Who knew it was a hot topic?Carly Strasser
October 17, 2013 @ Robert E. Kennedy Library, Data Studio, California Polytechnic State University.
New mandates, announcements, memos, and requirements are emerging that encourage better data management, data sharing, and data preservation. In this presentation, data curation specialist Carly Strasser, PhD, offers a lay of the data management land by discussing recent events, resources, and new directions for data stewardship.
This document summarizes the winning strategy used by the MIT team in the 2009 DARPA Network Challenge. The challenge required teams to locate 10 weather balloons placed across the United States within a limited time period. The MIT team developed a recursive incentive mechanism to spread information about the tasks and incentivize individuals to search for and report balloon locations. This mechanism divided the budget across tasks and provided payments to individuals along the path that led to a task's completion, with the highest payments going to the direct informant and finder. Through this mechanism, the MIT team was able to recruit over 4,000 individuals in 36 hours and complete the challenge in under 9 hours, demonstrating the effectiveness of their incentive-based distributed approach.
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
UC Santa Cruz: Data Management for ScientistsCarly Strasser
This document contains data from an isotopic analysis of algal samples from Wash Cresc Lake. It includes the sample identifiers, weights, carbon and nitrogen composition percentages and delta values, and spectrometer numbers. There are notes that some of the samples are from the lake outlet or shore. The data is organized in a table with sample positions and reference standards included for quality control.
This dissertation defense summarizes Sarasi Lalithsena's Ph.D. dissertation on domain-specific knowledge extraction from the Web of Data. The thesis statement is that applications serving specific domains can benefit by identifying relevant knowledge from structured data on the Web by (a) leveraging existing crowdsourced knowledge bases as a reference schema to automatically determine the domains of knowledge graphs, and (b) exploiting the semantics and structure of entities and relationships with statistical techniques to extract relevant portions of knowledge graphs. The outline covers identifying relevant knowledge graphs for a given domain and identifying the relevant portion of knowledge graphs through domain-specific subgraph extraction from hierarchical and non-hierarchical knowledge graphs.
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
The graph/network domain has been driven by the creativity of numerous individuals from disparate areas of the academic and the commercial sector. Examples of contributing academic disciplines include mathematics, physics, sociology, and computer science. Given the interdisciplinary nature of the domain, it is difficult for any single individual to objectively realize and speak about the space as a whole. Any presentation of the ideas is ultimately biased by the formal training and expertise of the individual. For this reason, I will simply present on the domain from my perspective---from my personal experiences. More specifically, from my perspective biased by cognitive and computer science.
This is an autobiographical lecture on my life (so far) with graphs/networks.
Journalists today are faced with an overwhelming abundance of data – from large collections of leaked documents, to public databases about lobbying or government spending, to ‘big data’ from social networks such as Twitter and Facebook. To stay relevant to society journalists are learning to process this data and separate signal from noise in order to provide valuable insights to their readers. This talk will address questions like: What is the potential of data journalism? Why is it relevant to society? And how can you get started?
Future of the Internet Predictions March 2014 PIP ReportVasily Ryzhonkov
This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-Lee. He wrote a paper on March 12, 1989 proposing an “information management” system that became the conceptual and architectural structure for the Web. He eventually released the code for his system — for free — to the world on Christmas Day in 1990. It became a milestone in easing the way for ordinary people to access documents and interact over the Internet — a system that linked computers and that had been around for years.
The Web became a major layer of the Internet. Indeed, for many, it became synonymous with the Internet, even though that is not technically the case. Its birthday offers an occasion to revisit the ways it has made the Internet a part of Americans’ social lives.
Our first report tied to the anniversary looked at the present and the past of the Internet, marking its strikingly fast adoption and assessing its impact on American users’ lives. This report is part of an effort by the Pew Research Center’s Internet Project in association with Elon University’s Imagining the Internet Center to look at the future of the Internet, the Web, and other digital activities. This is the first of eight reports based on a canvassing of hundreds of experts about the future of such things as privacy, cybersecurity, the “Internet of things,” and net neutrality. In this case we asked experts to make their own predictions about the state of digital life by the year 2025. We will also explore some of the economic change driven by the spectacular progress that made digital tools faster and cheaper. And we will report on whether Americans feel the explosion of digital information coursing through their lives has helped them be better informed and make better decisions.
This report is a collaborative effort based on the input and analysis of the following individuals.
The document discusses machine learning techniques for multivariate data analysis using the TMVA toolkit. It describes several common classification problems in high energy physics (HEP) and summarizes several machine learning algorithms implemented in TMVA for supervised learning, including rectangular cut optimization, likelihood methods, neural networks, boosted decision trees, support vector machines and rule ensembles. It also discusses challenges like nonlinear correlations between input variables and techniques for data preprocessing and decorrelation.
FULL REPORT OF ASSURANCE OF LEARNING RESULTSbutest
This document summarizes assessment results from West Texas A&M University's College of Business for the 2008-2009 academic year. It reports on assessment activities and results for the BBA program's learning goals of effective communication and application of business principles. It analyzes student performance on writing assignments and oral presentations. While most students performed acceptably, some areas showed room for improvement, such as strengthening writing courses and using uniform rubrics. The college will work to enhance the curriculum and assessment process.
Learning and Text Analysis for Ontology Engineeringbutest
This document calls for papers and participation in a workshop on learning and text analysis for ontology engineering to be held in conjunction with the ECAI 2002 conference in Lyon, France. The workshop aims to bring together researchers from linguistics, natural language processing, knowledge representation, and machine learning to discuss issues around building, maintaining, and reusing ontologies and terminological resources. Topics of interest include using texts and linguistic/terminological resources as knowledge sources for building ontologies, applying machine learning and NLP tools to ontology engineering, and learning ontologies from sources like the web. The deadline for paper submissions is March 15th and for motivation abstracts is May 24th. The workshop will include paper presentations, discussions, and
The document discusses the rise of the Internet and the emergence of a "Fifth Estate" enabled by greater access to information and ability to network. It defines the Fifth Estate as a critical mass of individuals sourcing information, networking, and holding organizations accountable in new ways. Various strategies of the Fifth Estate are described, such as searching for information, sourcing new information, distributing leaks, forming collaborative networks, collective action, and collective intelligence. Challenges to the Fifth Estate from governments, businesses and other groups are also discussed.
2009 - Connected Action - Marc Smith - Social Media Network AnalysisMarc Smith
Review of social media network analysis of Internet social spaces like twitter, flickr, email, message boards, etc. Network analysis and visualization of social media collections of connections.
This document summarizes a study that compares the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study aimed to determine if these applications are used for cyberactivism related to real-world issues and places in Chile. It also sought to identify trends in topics of discussion and whether there are correlations between topics discussed nationally and locally. The main findings were that Facebook is mainly used to strengthen existing social ties rather than create new connections, and that it allows for distributed organization without centralized control of information.
Suazo%2c martínez & elgueta english version2011990
This document summarizes a study that analyzed the use of Facebook Groups and Causes as tools for cyberactivism in Chile and the Concepción area. The study found that social networks mainly strengthen existing social ties rather than create new connections. It also found that Facebook's horizontal structure and lack of centralized control enables strong information sharing. Finally, the study aimed to determine if Groups or Causes were better for generating cyberactivism campaigns and setting independent social media agendas.
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
DPSY 6121 Wk2 ASSGN: Electronic Media Influence Part 1eckchela
This is a Walden University course (DPSY 6121 and 8121), Electronic Media Influence Part 1 and 2. It is written in APA format, includes references, and has been graded (A) by Dr. Elizabeth Essel ," Nice job on Part 1 of this assignment, Orlanda. You nicely discussed how the media you chose impacted yourself and how it might impact you as a professional. You also did a very nice job highlighting some important milestones about the media you chose. For part 2, you did a great job discussing how some of theories we learned about in our class this week could explain the behaviors you discussed in part 1. Overall, you included some really good sources to support your paper. Great job! Note from Orlanda Haynes: Higher-education assignments are, usually, submitted to Turnitin, so remember to paraphrase. Let us begin.
This document provides information about the Asia Triple Helix Society Summer Seminar to be held on June 25, 2014 in Daegu, South Korea. It will be held in conjunction with the 2014 World Conference for Public Administration. The seminar will include two panels on topics related to social media, big data, and North Korea, as well as corporate networks and entrepreneurial universities. Details are provided on the keynote speakers, panelists and their topics, dates and deadlines for abstracts and papers, location, sponsors, and contacts. The document outlines the full program agenda with titles, speakers and respondents for each presentation slot.
The document discusses networks and network theory. It defines what a network is and provides examples of networks in nature, society, and technology. It also discusses key network concepts like nodes, edges, average path length, clustering coefficients, and different types of networks including random, lattice, and small-world networks. Power laws and scale-free networks are also covered.
Cal Poly - Data Management: Who knew it was a hot topic?Carly Strasser
October 17, 2013 @ Robert E. Kennedy Library, Data Studio, California Polytechnic State University.
New mandates, announcements, memos, and requirements are emerging that encourage better data management, data sharing, and data preservation. In this presentation, data curation specialist Carly Strasser, PhD, offers a lay of the data management land by discussing recent events, resources, and new directions for data stewardship.
This document summarizes the winning strategy used by the MIT team in the 2009 DARPA Network Challenge. The challenge required teams to locate 10 weather balloons placed across the United States within a limited time period. The MIT team developed a recursive incentive mechanism to spread information about the tasks and incentivize individuals to search for and report balloon locations. This mechanism divided the budget across tasks and provided payments to individuals along the path that led to a task's completion, with the highest payments going to the direct informant and finder. Through this mechanism, the MIT team was able to recruit over 4,000 individuals in 36 hours and complete the challenge in under 9 hours, demonstrating the effectiveness of their incentive-based distributed approach.
An interactive presentation on social network theory and analysis. Content includes information on tie formation and social capital. Network relations are explained by using the example of The A Team. Granovetter's Strength of Weak Ties Theory (1973) is also covered and weak ties and strong ties are explained. Appropriate application of social network theory to individuals understanding how to best take advantage of social networking platforms to find jobs as well as companies taking advantage of social media platforms to find followers are introduced.
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
UC Santa Cruz: Data Management for ScientistsCarly Strasser
This document contains data from an isotopic analysis of algal samples from Wash Cresc Lake. It includes the sample identifiers, weights, carbon and nitrogen composition percentages and delta values, and spectrometer numbers. There are notes that some of the samples are from the lake outlet or shore. The data is organized in a table with sample positions and reference standards included for quality control.
This dissertation defense summarizes Sarasi Lalithsena's Ph.D. dissertation on domain-specific knowledge extraction from the Web of Data. The thesis statement is that applications serving specific domains can benefit by identifying relevant knowledge from structured data on the Web by (a) leveraging existing crowdsourced knowledge bases as a reference schema to automatically determine the domains of knowledge graphs, and (b) exploiting the semantics and structure of entities and relationships with statistical techniques to extract relevant portions of knowledge graphs. The outline covers identifying relevant knowledge graphs for a given domain and identifying the relevant portion of knowledge graphs through domain-specific subgraph extraction from hierarchical and non-hierarchical knowledge graphs.
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
The graph/network domain has been driven by the creativity of numerous individuals from disparate areas of the academic and the commercial sector. Examples of contributing academic disciplines include mathematics, physics, sociology, and computer science. Given the interdisciplinary nature of the domain, it is difficult for any single individual to objectively realize and speak about the space as a whole. Any presentation of the ideas is ultimately biased by the formal training and expertise of the individual. For this reason, I will simply present on the domain from my perspective---from my personal experiences. More specifically, from my perspective biased by cognitive and computer science.
This is an autobiographical lecture on my life (so far) with graphs/networks.
Journalists today are faced with an overwhelming abundance of data – from large collections of leaked documents, to public databases about lobbying or government spending, to ‘big data’ from social networks such as Twitter and Facebook. To stay relevant to society journalists are learning to process this data and separate signal from noise in order to provide valuable insights to their readers. This talk will address questions like: What is the potential of data journalism? Why is it relevant to society? And how can you get started?
Future of the Internet Predictions March 2014 PIP ReportVasily Ryzhonkov
This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-Lee. He wrote a paper on March 12, 1989 proposing an “information management” system that became the conceptual and architectural structure for the Web. He eventually released the code for his system — for free — to the world on Christmas Day in 1990. It became a milestone in easing the way for ordinary people to access documents and interact over the Internet — a system that linked computers and that had been around for years.
The Web became a major layer of the Internet. Indeed, for many, it became synonymous with the Internet, even though that is not technically the case. Its birthday offers an occasion to revisit the ways it has made the Internet a part of Americans’ social lives.
Our first report tied to the anniversary looked at the present and the past of the Internet, marking its strikingly fast adoption and assessing its impact on American users’ lives. This report is part of an effort by the Pew Research Center’s Internet Project in association with Elon University’s Imagining the Internet Center to look at the future of the Internet, the Web, and other digital activities. This is the first of eight reports based on a canvassing of hundreds of experts about the future of such things as privacy, cybersecurity, the “Internet of things,” and net neutrality. In this case we asked experts to make their own predictions about the state of digital life by the year 2025. We will also explore some of the economic change driven by the spectacular progress that made digital tools faster and cheaper. And we will report on whether Americans feel the explosion of digital information coursing through their lives has helped them be better informed and make better decisions.
This report is a collaborative effort based on the input and analysis of the following individuals.
The document discusses machine learning techniques for multivariate data analysis using the TMVA toolkit. It describes several common classification problems in high energy physics (HEP) and summarizes several machine learning algorithms implemented in TMVA for supervised learning, including rectangular cut optimization, likelihood methods, neural networks, boosted decision trees, support vector machines and rule ensembles. It also discusses challenges like nonlinear correlations between input variables and techniques for data preprocessing and decorrelation.
FULL REPORT OF ASSURANCE OF LEARNING RESULTSbutest
This document summarizes assessment results from West Texas A&M University's College of Business for the 2008-2009 academic year. It reports on assessment activities and results for the BBA program's learning goals of effective communication and application of business principles. It analyzes student performance on writing assignments and oral presentations. While most students performed acceptably, some areas showed room for improvement, such as strengthening writing courses and using uniform rubrics. The college will work to enhance the curriculum and assessment process.
Learning and Text Analysis for Ontology Engineeringbutest
This document calls for papers and participation in a workshop on learning and text analysis for ontology engineering to be held in conjunction with the ECAI 2002 conference in Lyon, France. The workshop aims to bring together researchers from linguistics, natural language processing, knowledge representation, and machine learning to discuss issues around building, maintaining, and reusing ontologies and terminological resources. Topics of interest include using texts and linguistic/terminological resources as knowledge sources for building ontologies, applying machine learning and NLP tools to ontology engineering, and learning ontologies from sources like the web. The deadline for paper submissions is March 15th and for motivation abstracts is May 24th. The workshop will include paper presentations, discussions, and
This document provides background information on a management and visualization tool for text mining applications developed by Peishan Mao for her MSc project. It discusses natural language text classification and describes how suffix trees can be used to represent documents at a more granular level than traditional "bag-of-words" models. The document outlines the design of the tool, which aims to provide a flexible framework for text classification experiments and allow evaluation and refinement of classifiers. It also describes the implementation of the tool in C# with a Windows Forms interface and Access database.
Improving the Performance of Action Prediction through ...butest
The document describes an approach to improve action prediction in smart homes by identifying abstract tasks from low-level inhabitant actions. The approach models actions as states in a simple Markov model. Actions are clustered into groups representing tasks, and hidden Markov models are created using the clusters as hidden states. On simulated data with embedded patterns, the approach achieved good prediction accuracy, but had only marginal performance on real home data which contained more noise. The identification of tasks is meant to provide context that can help predict the next action and task more accurately than using low-level actions alone.
This proposal requests $1.45 million from the NSF to develop a Curator Assistant to help communities annotate the rapidly increasing number of sequenced genomes. As sequencing costs decrease from $1 million to $10,000 per genome, the bottleneck has shifted to functional annotation, which currently relies on human curators. The proposed software will use natural language processing to extract gene functions from literature and suggest annotations to assist community curators with databases for non-model organisms lacking professional curation resources. It will initially focus on arthropod genomes through collaboration with the Arthropod Base Consortium.
What s an Event ? How Ontologies and Linguistic Semantics ...butest
The document discusses challenges for machine learning models in extracting information about events from text. It describes different approaches to representing events, from single relations to complex structures with interconnected subevents. Proper representation requires modeling event granularity, ordering, interrelations and other factors. Learning the building blocks of events and how they connect poses difficult problems for machine learning systems.
1. The document discusses machine learning and provides an overview of key concepts like inductive reasoning, learning from examples, and the constituents of machine learning problems.
2. It explains that machine learning problems involve an example set, background concepts, background axioms, and potential errors in data. Common machine learning tasks are categorization and prediction.
3. The document also outlines the constituents of machine learning methods, including representation schemes, search methods, and approaches for selecting hypotheses when multiple solutions are produced.
This proposal seeks funding to develop technology using data mining and machine learning to detect insider threats and security breaches through email and application monitoring. Specifically, the proposal aims to:
1) Develop an email security appliance that integrates with mail servers and alerts of potential insider misuse while quarantining emails to mitigate damage.
2) Extend current email monitoring technology to also monitor applications handling document attachments to detect insider malfeasance.
3) Investigate additional non-email data sources like host-based sensors monitoring user actions and file activities to identify insider threats.
The proposal involves researchers at Columbia University and developers at System Detection, Inc. working to expand current email profiling technology and develop a proof-
Data Science Innovations : Democratisation of Data and Data Science suresh sood
Data Science Innovations : Democratisation of Data and Data Science covers the opportunity of citizen data science lying at the convergence of natural language generation and discoveries in data made by the professions, not data scientists.
This document summarizes a lecture on network science given by Madhav Marathe at Lawrence Livermore National Laboratory in December 2010. It provides an overview of network science, including definitions of networks and their unique properties. It also discusses mathematical and computational approaches to modeling complex networks and applications to infrastructure planning, energy systems, and national security. The lecture acknowledges prior work that contributed to its material from various researchers and textbooks.
Open Grid Forum workshop on Social Networks, Semantic Grids and WebNoshir Contractor
Workshop organized by David De Roure at the Open Grid Forum XIX. Other participants included Carole Gobler, Jeremy Frey, Pamela Fox.
January 29, 2007, Chapel Hill, NC
Big Data for the Social Sciences - David De Roure - Jisc Digital Festival 2014Jisc
The analysis of government data, data held by business, the web, social science survey data will support new research directions and findings. Big Data is one of David Willetts’ 8 great technologies, and in order to secure the UK’s competitive advantage new investments have been made by the Economic Social Science Research Council ( ESRC) in Big Data, for example the Business Datasafe and Understanding Populations investments. In this session the benefits of the use of Big Data in social science , and the ESRCs Big Data strategy will be explained by Professor David De Roure.of the Oxford e-Research Centre and advisor to the ESRC.
Internet Archives and Social Science Research - Yeungnam Universitymwe400
The document discusses using large datasets from the Internet Archive to conduct social science research on emerging organizational forms. It presents examples of previous research leveraging archive data on topics like natural disasters, political activity, and social movements. The author proposes analyzing hyperlink, news coverage, Twitter, and website data on the Occupy Wall Street movement to test hypotheses about its emerging networked structure over time. Results are presented showing the growth of the movement's online presence and core clusters within its organizational network.
Webinar slides sept 23 2021 mary aikenCapitolTechU
Capitol Technology University Cap Tech Talks Webinar presented Sept 23, 2021 by Dr. Mary Aiken called “An Introduction to Cyberpsychology: The Impact of Emerging Technology on Human Behavior.”
Keynote talk at the Web Science Summer School, Singapore, 8 December 2014. Today we see the rise of Social Machines, like Twitter, Wikipedia and Galaxy Zoo—where communities identify and solve their own problems, harnessing commitment, local knowledge and embedded skills, without having to rely on experts or governments.
The Social Machines paradigm provides a lens onto the interacting sociotechnical systems of our hybrid digital-physical world, citizen-centric and at scale—emphasising empowerment and sociality in a world of pervasive technology adoption and automation.
This talk will present the Social Machines paradigm as an approach to social media analytics and a rethinking of our scholarly practices and knowledge infrastructure.
This PowerPoint begins with a brief discussion regarding one of the origins to this discovery. Following the introduction is the advancement of the Internet to Web 3.0 and Civilization Progression through the Value Theory of Axiology.
The document discusses technology-mediated social participation and outlines the goals and challenges of the Summer Social Webshop. It summarizes that the Webshop aims to (1) clarify national priorities, (2) develop research questions around social participation, and (3) promote novel research methodologies to influence national policy and increase educational opportunities. It also notes key challenges include malicious attacks, privacy violations, lack of trust, and failure to be universally accessible.
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
Wire Workshop: Overview slides for ArchiveHub Projectmwe400
The document discusses using large datasets from the Internet Archive to conduct research. It outlines an agenda with three parts: large scale data, developing new tools, and testing and building theory. The Internet Archive contains over 10 petabytes of cultural data, including 410 billion archived web pages. The ArchiveHub project aims to create tools and guidelines for longitudinal research on archived web data. Examples of potential research topics are discussed, such as studying social movements using link and text data from websites about Occupy Wall Street. Challenges discussed include accessing and preparing the large datasets for research purposes and connecting the data to theoretical frameworks.
Visually Exploring Social Participation in Encyclopedia of LifeHarish Vaidyanathan
This document discusses visually exploring social participation on the Encyclopedia of Life (EOL) citizen science platform. It analyzes the conversation network of EOL users over time using dynamic network visualization methods. The analysis found that new website features increased interactive and individual member activities, and that curator activities encouraged other members to be more active. Dynamic network visualization is useful for understanding how online social networks and participation evolve over time.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
The Networked Creativity in the Censored Web 2.0Weiai Wayne Xu
This document discusses a study analyzing the Twitter activities of Chinese users discussing and mobilizing around internet censorship. It provides background on China's censorship policies and innovations used to bypass them. The study uses Twitter data from 2014 and network, content, and demographic analyses to understand how users interact, tactics used, and characteristics of central users in the censorship discussion network. The goal is to understand how Web 2.0 platforms facilitate technological and political strategies to crowdsource responses to censorship.
Four Disruptive Trends for the Next DecadeLarry Smarr
Four disruptive trends will shape the next decade: 1) Distributed software systems will drive disintermediation and disrupt industries like transportation and hospitality; 2) Networked virtual reality will allow for planetary-scale collaboration and remote viewing; 3) Climate change will require adaptation of infrastructure to become intelligent, secure, low-carbon and climate-resilient; 4) Brain-inspired computing utilizing massive data and exascale supercomputers will enable emulation of the human brain within a decade and usher in an era of cognitive technologies.
Small Worlds Social Graphs Social Mediasuresh sood
The document discusses what a small-world network is and provides context around the term. It references a 1967 psychology today article by Suresh Sood and Michael Light that may have originally coined the term. It also mentions that in 1991, the concept was popularized by studying social networks and the phenomenon of six degrees of separation. The small-world phenomenon shows that most people are connected through short chains of acquaintances.
The document discusses various topics related to surveillance, including Jeremy Bentham's Panopticon model of surveillance, increased surveillance of both public and virtual spaces, and examples of creative practitioners using online strategies to critique surveillance and globalization. It also shares several news articles about issues like government censorship of Wikipedia, data breaches at the tax office, and a student cracking the government's internet porn filter.
Similar to Noshir Contractor - WebSci'09 - Society On-Line (20)
Este documento analiza el modelo de negocio de YouTube. Explica que YouTube y otros sitios de video online representan un nuevo modelo de negocio para contenidos audiovisuales debido al cambio en los hábitos de consumo causado por las nuevas tecnologías. Describe cómo YouTube aprovecha la participación de los usuarios para mejorar continuamente y atraer una audiencia diferente a la de los medios tradicionales.
The defense was successful in portraying Michael Jackson favorably to the jury in several ways:
1) They dressed Jackson in ornate costumes that conveyed images of purity, innocence, and humility.
2) Jackson was shown entering the courtroom as if on a red carpet, emphasizing his celebrity status.
3) Jackson appeared vulnerable, childlike, and in declining health during the trial, eliciting sympathy from jurors.
4) Defense attorney Tom Mesereau effectively presented a coherent narrative of Jackson as a victim and portrayed Neverland as a place of refuge, undermining the prosecution's arguments.
Michael Jackson was born in 1958 in Gary, Indiana and rose to fame in the 1960s as the lead singer of The Jackson 5, topping music charts in the 1970s. As a solo artist in the 1980s, his album Thriller broke music records. In the 1990s and 2000s, Jackson faced several legal issues related to child abuse allegations while continuing to release music. He married Lisa Marie Presley and Debbie Rowe and had two children before his death in 2009.
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
This document appears to be a list of popular books from various authors. It includes over 150 book titles across many genres such as fiction, non-fiction, memoirs, and novels. The books cover a wide range of topics from politics to cooking to autobiographies.
The prosecution lost the Michael Jackson trial due to several key mistakes and weaknesses in their case:
1) The lead prosecutor, Thomas Sneddon, was too personally invested in the case against Jackson, having pursued him for over a decade without success.
2) Sneddon's opening statement was disorganized and weak, failing to effectively outline the prosecution's case.
3) The accuser's mother was not credible and damaged the prosecution's case through her erratic testimony, history of lies and con artist behavior.
4) Many prosecution witnesses were not credible due to prior lawsuits against Jackson, debts owed to him, or having been fired by him. Several witnesses even took the Fifth Amendment.
Here are three examples of public relations from around the world:
1. The UK government's "Be Clear on Cancer" campaign which aims to raise awareness of cancer symptoms and encourage early diagnosis.
2. Samsung's global brand marketing and sponsorship activities which aim to increase brand awareness and favorability of Samsung products worldwide.
3. The Brazilian government's efforts to improve its international image and relations with other countries through strategic communication and diplomacy.
The three most important functions of public relations are:
1. Media relations because the media is how most organizations reach their key audiences. Strong media relationships are crucial.
2. Writing, because written communication is at the core of public relations and how most information is
Michael Jackson Please Wait... provides biographical information about Michael Jackson including his birthdate, birthplace, parents, height, interests, idols, favorite foods, films, and more. It discusses his background, career highlights including influential albums like Thriller, and films he appeared in such as The Wiz and Moonwalker. The document contains photos and details about Jackson's life and illustrious music career.
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
The document discusses the process of manufacturing celebrity and its negative byproducts. It argues that celebrities are rarely the best in their individual pursuits like singing, dancing, etc. but become famous due to being products of a system controlled by wealthy elites. This system stifles opportunities for worthy artists and creates feudalism. The document also asserts that manufactured celebrities should not be viewed as role models due to behaviors like drug abuse and narcissism that result from the celebrity-making process.
Michael Jackson was a child star who rose to fame with the Jackson 5 in the late 1960s and early 1970s. As a solo artist in the 1970s and 1980s, he had immense commercial success with albums like Off the Wall, Thriller, and Bad, which featured hit singles and groundbreaking music videos. However, his career and public image were plagued by controversies related to allegations of child sexual abuse in the 1990s and 2000s. He continued recording and performing but faced ongoing media scrutiny into his private life until his death in 2009.
Social Networks: Twitter Facebook SL - Slide 1butest
The document discusses using social networking tools like Twitter and Facebook in K-12 education. Twitter allows students and teachers to share short updates and can be used to give parents a window into classroom activities. Facebook allows targeted advertising that could be used to promote educational activities. Both tools could help facilitate communication between schools and communities if used properly while managing privacy and security concerns.
Facebook has over 300 million active users who log on daily, and allows brands to create public profile pages to interact with users. Pages are for brands and organizations only, while groups can be made by any user about any topic. Pages do not show admin names and have no limits on fans, while groups display admin names and are limited to 5,000 members. Content on pages should aim to provoke action from subscribers and establish a regular posting schedule using a conversational tone.
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
Hare Chevrolet is a car dealership located in Noblesville, Indiana that has successfully used social media platforms like Twitter, Facebook, and YouTube to create a positive brand image. They invest significant time interacting directly with customers online to foster a sense of community rather than overtly advertising. As a result, Hare Chevrolet has built a large, engaged audience on social media and serves as a model for how brands can use online presences strategically.
Welcome to the Dougherty County Public Library's Facebook and ...butest
This document provides instructions for signing up for Facebook and Twitter accounts. It outlines the sign up process for both platforms, including filling out forms with name, email, password and other details. It describes how the platforms will then search for friends and suggest people to connect with. It also explains how to search for and follow the Dougherty County Public Library page on both Facebook and Twitter once signed up. The document concludes by thanking participants and providing a contact for any additional questions.
Paragon Software announces the release of Paragon NTFS for Mac OS X 8.0, which provides full read and write access to NTFS partitions on Macs. It is the fastest NTFS driver on the market, achieving speeds comparable to native Mac file systems. Paragon NTFS for Mac 8.0 fully supports the latest Mac OS X Snow Leopard operating system in 64-bit mode and allows easy transfer of files between Windows and Mac partitions without additional hardware or software.
This document provides compatibility information for Olympus digital products used with Macintosh OS X. It lists various digital cameras, photo printers, voice recorders, and accessories along with their connection type and any notes on compatibility. Some products require booting into OS 9.1 for software compatibility or do not support devices that need a serial port. Drivers and software are available for download from Olympus and other websites for many products to enable use with OS X.
To use printers managed by the university's Information Technology Services (ITS), students and faculty must install the ITS Remote Printing software on their Mac OS X computer. This allows them to add network printers, log in with their ITS account credentials, and print documents while being charged per page to funds in their pre-paid ITS account. The document provides step-by-step instructions for installing the software, adding a network printer, and printing to that printer from any internet connection on or off campus. It also explains the pay-in-advance printing payment system and how to check printing charges.
The document provides an overview of the Mac OS X user interface for beginners, including descriptions of the desktop, login screen, desktop elements like the dock and hard disk, and how to perform common tasks like opening files and folders. It also addresses frequently asked questions for Windows users switching to Mac OS X, such as where documents are stored, how to save or find documents, and what the equivalent of the C: drive is in Mac OS X. The document concludes with sections on file management tasks like creating and deleting folders, organizing files within applications, using Spotlight search, and an overview of the Dashboard feature.
This document provides a checklist for securing Mac OS X version 10.5, focusing on hardening the operating system, securing user accounts and administrator accounts, enabling file encryption and permissions, implementing intrusion detection, and maintaining password security. It describes the Unix infrastructure and security framework that Mac OS X is built on, leveraging open source software and following the Common Data Security Architecture model. The checklist can be used to audit a system or harden it against security threats.
This document summarizes a course on web design that was piloted in the summer of 2003. The course was a 3 credit course that met 4 times a week for lectures and labs. It covered topics such as XHTML, CSS, JavaScript, Photoshop, and building a basic website. 18 students from various majors enrolled. Student and instructor evaluations found the course to be very successful overall, though some improvements were suggested like ensuring proper software and pairing programming/non-programming students. The document also discusses implications of incorporating web design material into existing computer science curriculums.
1. Web Science: An Exploratorium for Understanding and Enabling Social Networks Noshir Contractor Jane S. & William J. White Professor of Behavioral SciencesProfessor of Ind. Engg & Mgmt Sciences, McCormick School of Engineering Professor of Communication Studies, School of Communication & Professor of Management & Organizations, Kellogg School of Management, Director, Science of Networks in Communities (SONIC) Research Laboratory nosh@northwestern.edu Supported by NSF : OCI-0753047, IIS-0729505, IIS-0535214, SBE-0555115 SONIC Advancing the Science of Networks in Communities
2.
3. Theories: Theories about the social motivations for creating, maintaining, dissolving and re-creating links in multidimensional networks. Generative mechanisms for emergence of macro-structures.
4. Data: Developments in Semantic Web/Web 2.0provide the technological capability to capture, store , merge, and query relational metadata needed to more effectively understand and enable communities.
5. Methods: An ensemble of qualitative and quantitative methods (exponential random graph modeling (p*) techniques to understand and enable theoretically grounded network recommendations
6. Computational infrastructure: Cloud computing and petascale applications are critical to face the computational challenges in analyzing the dataSONIC Advancing the Science of Networks in Communities
7. Emergent Structures in the Blogosphere by Language SONIC Advancing the Science of Networks in Communities Source; John Kelly
8. WHAT ARE THE GENERATIVE MECHANISMS THAT EXPLAIN THE EMERGENT STRUCTURES OBSERVED IN LARGE SCALE NETWORKS? WEB SCIENCE PROCESS MODEL SONIC Advancing the Science of Networks in Communities
16. Theories of co-evolutionSources: Contractor, N. S., Wasserman, S. & Faust, K. (2006). Testing multi-theoretical multilevel hypotheses about organizational networks: An analytic framework and empirical example. Academy of Management Review. Monge, P. R. & Contractor, N. S. (2003). Theories of Communication Networks. New York: Oxford University Press. SONIC Advancing the Science of Networks in Communities
17. A B F - + C E D Novice Expert “Structural signatures” Theories of Self interest Theories of Exchange Theories of Balance Theories of Collective Action Theories of Homophily Theories of Cognition SONIC Advancing the Science of Networks in Communities
18. Statistical “MRI” for Structural Signatures p*/ERGM: Exponential Random Graph Models Statistical “Macro-scope” to detect structural motifs in observed networks Move from exploratory to confirmatory network analysis to understand multi-theoretical multilevel motivations for why we create our social networks SONIC Advancing the Science of Networks in Communities
19. A contextual “meta-theory” ofsocial drivers for creating and sustaining communities SONIC Advancing the Science of Networks in Communities
20. Projects Investigating Social Drivers for Communities Business Applications PackEdge Community of Practice (P&G) Kraft Design Teams Science Applications CI-Scope: Understanding & Enabling CI in Virtual Communities (NSF) CP2R: Collaboration for Preparedness, Response & Recovery (NSF) TSEEN: Tobacco Surveillance Evaluation & Epidemiology Network (NSF, NIH, CDC) Core Research Socio-technical Drivers for Creating & Sustaining Communities Societal Justice Applications Cultural & Networks Assets In Immigrant Communities (Rockefeller Program on Culture & Creativity) Mapping Digital Media and Learning Networks (MacArthur Foundation) Entertainment Applications Second Life (NSF, Army Research Institute, Linden Labs) EverQuest II (NSF, Army Research Institute, Linden Labs) SONIC Advancing the Science of Networks in Communities
21. Contextualizing Goals of Communities Challenges of empirically testing, extending, and exploring theories about networks … until now SONIC Advancing the Science of Networks in Communities
22. Multidimensional Networks in the Semantic Web/Web 2.0 Multiple Types of Nodes and Multiple Types of Relationships SONIC Advancing the Science of Networks in Communities
23.
24. Technologies to “tag” communities’ relational metadata (from Dublin Core taxonomies to folksonomies (‘wisdom of crowds’) like
36. CATPAC UBERLINK Digital Harvesting of Relational Metadata Web of Science Citation Bios, titles & descriptions Personal Web sites Google search results CI-KNOW Analyses and Visualizations SONIC Advancing the Science of Networks in Communities
37. Projects Investigating Social Drivers for Communities Business Applications PackEdge Community of Practice (P&G) Kraft Design Teams Science Applications CI-Scope: Understanding & Enabling CI in Virtual Communities (NSF) CP2R: Collaboration for Preparedness, Response & Recovery (NSF) TSEEN: Tobacco Surveillance Evaluation & Epidemiology Network (NSF, NIH, CDC) Core Research Socio-technical Drivers for Creating & Sustaining Communities Societal Justice Applications Cultural & Networks Assets In Immigrant Communities (Rockefeller Program on Culture & Creativity) Mapping Digital Media and Learning Networks (MacArthur Foundation) Entertainment Applications Second Life (NSF, Army Research Institute, Linden Labs) EverQuest II (NSF, Army Research Institute, Linden Labs) SONIC Advancing the Science of Networks in Communities
38. Hurricane Katrina 2005 Formed: Aug 23, 2005 Dissipated: Aug 31, 2005 Highest wind: 175 mph Lowest press: 902 mbar Damages: $81.2 Billion Fatalities: >1,836 Areas affected: Bahamas, South Florida, Cuba, Louisiana (especially Greater New Orleans), Mississippi, Alabama, Florida Panhandle, most of eastern North America 8/31 8/30 8/29 8/25 8/28 8/26 8/24 8/27 8/23 SONIC Advancing the Science of Networks in Communities Map source: http://hurricane.csc.noaa.gov/
39.
40. Typical SITREP *Colorado Division of Emergency Management SITUATION REPORT 2005-6 (Hurricane Katrina) August 30, 2005* *Event Type:* Hurricane Response *Situation:* On August 29, Hurricane Katrina hit the gulf coast east of New Orleans. It was considered a Category 5 Hurricane, which brings winds of over 155mph and storm surge of 18 feet above normal. Massive property damage has occurred and undetermined number of deaths and injuries. Colorado response to date include two deployments: - Two members from the Division of Emergency Management to the Louisiana EOC, departed on August 29. · · · *Weather Report:* Katrina is moving toward the north-northeast near 18 mph. A turn toward the northeast and a faster forward speed is expected during the next 24 hours. This motion should bring the cent · · · *Agencies Involved:* Colorado Department of Military and Veteran Affairs, Department of Local Affairs, Division of Emergency Management, Governor's Office.* * *Additional Assistance Requested:* Type III teams, consisting of Operations, Plans, and Logistics personnel (two individuals for each area). These teams could deploy to Alabama, Louisiana, and/or Mississippi. Teams will be at either working the State or Parish/County EOCs. · · · SONIC Advancing the Science of Networks in Communities
45. Automated processing is done through creating itineraries that combine processing modules into a workflow
46. Developed by the Automated Learning Group at NCSA SONIC Advancing the Science of Networks in Communities
47. SAL ARC Shelter KY FEMA FL Gov Bush TX AL LA NO Time Slice 1: 8/23 to 8/25/2005 Florida is the Topic of the Conversation Petroleum Network formed Early SONIC Advancing the Science of Networks in Communities
48. Time Slice 1 to 2 SAL ARC Shelter Power Military KY FEMA FP&L FL Gov Bush TX AL GA LA NO SONIC Advancing the Science of Networks in Communities
49. Time Slice 2: 8/26 to 8/27/2005 SAL ARC Shelter Power Military FEMA FP&L FL Gov Bush TX MS GA LA NO SONIC Advancing the Science of Networks in Communities
50. Time Slice 2 to 3 SAL ARC Shelter Power Military FEMA FP&L FL Gov Bush TX MS GA NC LA NO SONIC Advancing the Science of Networks in Communities
51. ARC Shelter Power Military FEMA FP&L FL Gov Bush TX MS NC GA LA NO Time Slice 3: 8/28 to 8/29/2005 SONIC Advancing the Science of Networks in Communities
52. ARC Shelter Power Military AL Power S & R NationalGuard FEMA FP&L FL Gov Bush TX AL MS NC GA LA NO Time Slice 3 to 4 SONIC Advancing the Science of Networks in Communities
53. ARC Shelter Power AL Power S & R NationalGuard FEMA FP&L FL TX AL MS NC GA LA NO Time Slice 4: 8/30 to 8/31/2005 SONIC Advancing the Science of Networks in Communities
54. Time Slice 4 to 5 ARC Shelter Power AL Power S & R NationalGuard FEMA FP&L FL TX AL NC GA MS LA NO SONIC Advancing the Science of Networks in Communities
55. ARC Shelter Power AL Power S & R NationalGuard FEMA FL TX MS NC GA LA AL NO Time Slice 5: 9/1 to 9/2/2005 SONIC Advancing the Science of Networks in Communities
56. ARC Shelter Power AL Power S & R NationalGuard FEMA FL TX MS GA LA AL NO Time Slice 5 to 6 SONIC Advancing the Science of Networks in Communities
57. Time Slice 6: 9/3 to 9/4/2005 ARC Shelter Outages AL Power Urban S & R NationalGuard S & R FEMA FL TX AL MS GA LA NO SONIC Advancing the Science of Networks in Communities
58.
59. “FEMA” starts in the 20s, moves to the teens, and ends in the 60sCrossover where American Red Cross becomes relatively more central than FEMA (Sep 1, 2005) SONIC Advancing the Science of Networks in Communities FEMA drops rank and American Red Cross moves up
60. Projects Investigating Social Drivers for Communities Business Applications PackEdge Community of Practice (P&G) Kraft Design Teams Science Applications CI-Scope: Understanding & Enabling CI in Virtual Communities (NSF) CP2R: Collaboration for Preparedness, Response & Recovery (NSF) TSEEN: Tobacco Surveillance Evaluation & Epidemiology Network (NSF, NIH, CDC) Core Research Socio-technical Drivers for Creating & Sustaining Communities Societal Justice Applications Cultural & Networks Assets In Immigrant Communities (Rockefeller Program on Culture & Creativity) Mapping Digital Media and Learning Networks (MacArthur Foundation) Entertainment Applications Second Life (NSF, Army Research Institute, Linden Labs) EverQuest II (NSF, Army Research Institute, Linden Labs) SONIC Advancing the Science of Networks in Communities
61. Online and Offline SONIC Advancing the Science of Networks in Communities
62. Four Types of Relations in EQ2 Partnership: Two players play together in combat activities; Instant messaging: Two players exchange messages through Sony universal chat system Player trade: Players meet “face-to-face” in EQ2 and one gives items to another; Mail: One player sends a message and/or items to others by in-game mail SONIC Advancing the Science of Networks in Communities
65. Zip code, state, and countrySONIC Advancing the Science of Networks in Communities
66. Black: male Red: female Partnership Instant messaging SONIC Advancing the Science of Networks in Communities Trade Mail
67. Results Selectivity and transitivity (friend of a friend) exists in all online relations. Homophily of age and game experience is supported in all four relations. Distance matters but short distances are more important. Individuals living within 50 Km are 22.6 times more likely to be partners than those who live between 50 and 800 Km. Time zones impacts gaming and trading but not IM and mail. Individuals in the same time zone are 1.25 times more likely to be game partners than the individuals with one hour difference (but no time zone effect for Gender homophily is not supported for all relations and female players are more likely to interact with the male players. SONIC Advancing the Science of Networks in Communities
68. Projects Investigating Social Drivers for Communities Business Applications PackEdge Community of Practice (P&G) Kraft Design Teams Science Applications CI-Scope: Understanding & Enabling CI in Virtual Communities (NSF) CP2R: Collaboration for Preparedness, Response & Recovery (NSF) TSEEN: Tobacco Surveillance Evaluation & Epidemiology Network (NSF, NIH, CDC) Core Research Socio-technical Drivers for Creating & Sustaining Communities Societal Justice Applications Cultural & Networks Assets In Immigrant Communities (Rockefeller Program on Culture & Creativity) Mapping Digital Media and Learning Networks (MacArthur Foundation) Entertainment Applications Second Life (NSF, Army Research Institute, Linden Labs) EverQuest II (NSF, Army Research Institute, Linden Labs) SONIC Advancing the Science of Networks in Communities
77. H3: Digital proximity (time spent online) is positively associated with friendship formation.
78. H4: Temporal proximity (joining at similar times) is positively associated with friendship formation.
79. H5: Age homophily are more likely to form friendships (though not very strong)
80. H6: Friendships tend to be balanced (friend of a friend). SONIC Advancing the Science of Networks in Communities
81. From Understanding to Enabling Networks in … Tobacco Research: TobIG DemoComputational Nanotechnology: nanoHUB DemoCyberinfrastructure: CI-Scope DemoOncofertility: Onco-IKNOW SONIC Advancing the Science of Networks in Communities
82.
83. Theories: Theories about the social motivations for creating, maintaining, dissolving and re-creating links in multidimensional networks
84. Data: Developments in Semantic Web/Web 2.0provide the technological capability to capture, store and query relational metadata needed to more effectively understand and enable communities.
85. Methods: Ensemble of qualitative and quantitative methods (exponential random graph modeling (p*) techniques) enable theoretically grounded network recommendations
86. Computational infrastructure: Cloud computing and petascale applications are critical to face the computational challenges in analyzing the dataSONIC Advancing the Science of Networks in Communities
88. SONIC Team York Yao Research Programmer Yun Huang Annie Wang David Huffaker Post-doc Post-doc Doctoral candidate Brian Keegan Doctoral Candidate Mengxiao Zhu Jingling Li Jeffrey Treem Doctoral candidate Research Programmer Doctoral candidate Zack Johnson Undergraduate SONIC Advancing the Science of Networks in Communities
Editor's Notes
Focus on players in the U.S. and CanadaFemale: Red; Male: black