This research article analyzes interactions between bots that edit articles on Wikipedia from 2001-2010 across 13 different language editions. The key findings are:
1) Bots constitute a small percentage of total Wikipedia editors but are responsible for a significant percentage of total edits, varying substantially between languages.
2) Bots revert each other's edits more than humans revert each other, but a smaller percentage of bots' own edits are reverts compared to humans.
3) The number of reverts between bots has increased over time, suggesting bot interactions are not becoming more efficient, and the percentage of mutual bot reverts has remained stable.
Rise of the cyborgs: the growth of librarian-IT hybridsSimon Bowie
In this presentation for CILIP's Umbrella 2013 conference, Simon Barron explored the impact of technology on librarianship and the increased amalgamation of library and IT roles. By examining the skills and technologies of librarian-IT hybrids, we see the future of librarianship and information management.
Facebook accounts function as "cyborg counterparts" to users. The document argues that a person's Facebook account takes on aspects of their identity and personality separate from their real-life identity. As users continually update their Facebook profiles and interact on the site, they are simultaneously shaping both their online identity on Facebook and their "second self" or cyborg counterpart. The widespread implementation of the "Like" button further enhances this process by cataloging users' interests to refine their Facebook profiles and cyborg identities over time. The document examines this phenomenon through the lenses of theorists like Sherry Turkle, Amber Case, Frank Biocca, and Ollivier Dyens to argue that humans are becoming more integrated with technology through sites like
This document summarizes the negative impacts of technology on reading, writing, and education. It argues that electronic books and social media have shortened attention spans and promoted informal writing styles over formal literary works. Studies show more than half of students have been accidentally influenced by the informality of the internet in their school writing. While technology provides access to information, online reading does not progress logically and may not develop critical thinking skills like physical books. The document also raises concerns that digital books could be monopolized by corporations, limiting access, and that online databases of books could be hacked, compromising preservation of literary works. It argues for moderation of technology in education to promote traditional teaching practices involving human interaction.
Have you ever received an e-mail from someone telling you about something you do not want to hear? Well, that is internet spam, and has taken over the personal and business world over the past decade. Spam is a big issue in the US and has cost businesses and people millions of dollars to combat. Please reference my upload describing the effects of Spam on society and also how society plans to deal with this threat.
This document discusses digital sexualities and how they have developed and are mediated through technology. It covers several topics:
- The evolution of digital platforms for sexual expression from early internet forums and chatrooms to modern dating apps like Tinder.
- How these platforms are used for porn, hookups, sex work, and discussions around sexual health and harassment.
- The methods used to study digital sexualities including data scraping, visualization, digital ethnography, and qualitative/quantitative approaches.
- Issues around data ethics, anonymity, and participant consent when researching sensitive topics like sexuality.
Sir Tim Berners-Lee, who invented the World Wide Web, gave a lecture examining its origins and future development. He discussed how the number of web pages now exceeds the world's population and continues growing exponentially each year. Web science is championed by Berners-Lee as a new field to better understand this growth and improve the user experience. He also emphasized that the web's success is largely due to collaboration and creativity between its users.
Done for classes at the Department of Library and Information Studies, University of the West Indies, Mona Campus.
Uploaded to be accessible to students studying the topic.
The Future Of Human Computer Interaction And Its Implications For Library Ser...Matthew Hamilton
This was my first presentation for my first MLS class, LI802. Essentially it was an introduction for non-techie, brand new MLS students about the need to understand technology and the changes it will bring not only in user expectations, but in information use as well.
Rise of the cyborgs: the growth of librarian-IT hybridsSimon Bowie
In this presentation for CILIP's Umbrella 2013 conference, Simon Barron explored the impact of technology on librarianship and the increased amalgamation of library and IT roles. By examining the skills and technologies of librarian-IT hybrids, we see the future of librarianship and information management.
Facebook accounts function as "cyborg counterparts" to users. The document argues that a person's Facebook account takes on aspects of their identity and personality separate from their real-life identity. As users continually update their Facebook profiles and interact on the site, they are simultaneously shaping both their online identity on Facebook and their "second self" or cyborg counterpart. The widespread implementation of the "Like" button further enhances this process by cataloging users' interests to refine their Facebook profiles and cyborg identities over time. The document examines this phenomenon through the lenses of theorists like Sherry Turkle, Amber Case, Frank Biocca, and Ollivier Dyens to argue that humans are becoming more integrated with technology through sites like
This document summarizes the negative impacts of technology on reading, writing, and education. It argues that electronic books and social media have shortened attention spans and promoted informal writing styles over formal literary works. Studies show more than half of students have been accidentally influenced by the informality of the internet in their school writing. While technology provides access to information, online reading does not progress logically and may not develop critical thinking skills like physical books. The document also raises concerns that digital books could be monopolized by corporations, limiting access, and that online databases of books could be hacked, compromising preservation of literary works. It argues for moderation of technology in education to promote traditional teaching practices involving human interaction.
Have you ever received an e-mail from someone telling you about something you do not want to hear? Well, that is internet spam, and has taken over the personal and business world over the past decade. Spam is a big issue in the US and has cost businesses and people millions of dollars to combat. Please reference my upload describing the effects of Spam on society and also how society plans to deal with this threat.
This document discusses digital sexualities and how they have developed and are mediated through technology. It covers several topics:
- The evolution of digital platforms for sexual expression from early internet forums and chatrooms to modern dating apps like Tinder.
- How these platforms are used for porn, hookups, sex work, and discussions around sexual health and harassment.
- The methods used to study digital sexualities including data scraping, visualization, digital ethnography, and qualitative/quantitative approaches.
- Issues around data ethics, anonymity, and participant consent when researching sensitive topics like sexuality.
Sir Tim Berners-Lee, who invented the World Wide Web, gave a lecture examining its origins and future development. He discussed how the number of web pages now exceeds the world's population and continues growing exponentially each year. Web science is championed by Berners-Lee as a new field to better understand this growth and improve the user experience. He also emphasized that the web's success is largely due to collaboration and creativity between its users.
Done for classes at the Department of Library and Information Studies, University of the West Indies, Mona Campus.
Uploaded to be accessible to students studying the topic.
The Future Of Human Computer Interaction And Its Implications For Library Ser...Matthew Hamilton
This was my first presentation for my first MLS class, LI802. Essentially it was an introduction for non-techie, brand new MLS students about the need to understand technology and the changes it will bring not only in user expectations, but in information use as well.
The document discusses the growing necessity for Michigan libraries to have an online presence. It notes that while many libraries currently see their online presence as optional, recent studies show that libraries without a digital strategy are becoming irrelevant. The document analyzes the online representation of Michigan libraries of different class sizes and identifies common problems such as outdated websites and lack of accessible library services online. It proposes solutions such as using content management systems and social media to engage communities and address issues like usability and mobile accessibility.
The document discusses the debate around net neutrality. It explores the perspectives of internet service providers (ISPs) who want to charge content providers fees for priority bandwidth, versus net neutrality advocates who believe this would negatively impact consumers and competition. The author also shares their free market views, arguing that more competition among ISPs and letting private companies address bandwidth and piracy issues is preferable to government regulation.
Web 1 allowed users to access information on read-only websites like dictionaries and university pages. Web 2 emerged in 2004, enabling users to interact and contribute to content through wikis and social networks. Web 3 is an intelligent version that is becoming smarter through machine learning and AI, delivering personalized content by understanding individual browsing histories.
The document discusses the concepts of Library 2.0 and how libraries are adopting Web 2.0 technologies and principles to become more user-centered. It provides examples of libraries that have experimented with new services and features on their websites, such as allowing user ratings and comments, integrating with social networking sites, and providing new ways for users to search and browse the catalog. The examples show libraries embracing change, taking risks with new technologies, and meeting users in online spaces to remain relevant in the digital age.
The document discusses the history and evolution of open source software from its origins in computer science academia to the present. It describes how Richard Stallman developed the GNU operating system and generalized public license (GPL) to create a legal framework ensuring software remains freely accessible and modifiable. While open source models aim to grant universal access, the document notes they still face challenges around equitable participation, as seen in the small percentage of female Wikipedia editors. Overall, it examines the positive and negative societal impacts of shifting towards more open information systems and knowledge-sharing frameworks.
This document summarizes research comparing four mobile dating/hookup apps: Tinder, Mixxxer, Squirt, and Dattch. It discusses how each app is designed to attract certain groups (e.g. Tinder for general dating, Mixxxer and Squirt for explicit hookups) and how they navigate issues like real name policies, content policies of app stores, and ensuring privacy and safety for users. Key differences discussed include how users can browse, search, match, and meet up based on the intended purpose and technical capabilities of each app.
Technological Revolutions and Cultural Revolutions: OSCON 2014Tim O'Reilly
Open source, DevOps, cloud computing, and the internet of things don't just require new technology, they require new thinking about how society and business is to be organized. It's critical, therefore, to infuse the work that developers do with human values, and to build a world that we are proud of.
Call Me Email - The New York Times by Adam BaerAdam Baer
Eric Brown, a former English professor, has written a "digital epistolary novel" called Intimacies that is meant to be read using a software interface. The story is told through emails, instant messages, and web pages. Brown plans to sell software to help other writers create their own digital novels using a similar format. Some scholars see this as a promising new form of electronic literature that captures how people communicate digitally, while others are skeptical of how engaging or "literary" the format currently is. The digital novel format has attracted over 5,000 readers so far.
The document discusses the evolution of the World Wide Web from Web 1.0 to Web 3.0. Web 1.0 focused on static, read-only pages and basic hyperlinking. Web 2.0 enabled user-generated content and social networking. Web 3.0 aims to make the web more intelligent through semantic annotation and artificial intelligence to better understand user needs. It also discusses some key applications and limitations of each stage of the web's development.
Facebook knew about and failed to police abusive content globally; reportaditi agarwal
- Facebook has struggled for years to police abusive content globally due to lacking resources like moderators with local language skills and AI screening tools.
- Internal documents show gaps in content moderation in countries deemed "at risk" of real-world violence like Myanmar, Ethiopia, Afghanistan, and Yemen due to lack of classifiers and reviewers for local languages.
- Employees have warned that these shortcomings limit Facebook's ability to curb hate speech and other violations as it pledged, and that its global expansion was not matched by similar growth in safety measures.
This document discusses the size and quality of information available on the "deep web" or non-searchable parts of the internet, as compared to the "surface web" or searchable parts. It finds that the deep web is about 500 times larger than the surface web, with documents in the deep web having an average quality score about 3 times higher per document. The total quality of information in the deep web vastly exceeds that of the surface web by thousands of times. The deep web has long been underestimated in size and importance, with some estimates placing it as large as the surface web or larger and growing exponentially.
Web 3.0 aims to bring together the content of Web 1.0 and the social aspects of Web 2.0 by creating meaning from online content and social context through advances like semantic search engines that understand concepts rather than just keywords. It will be a more personalized, intelligent web where software agents can perform tasks on a user's behalf based on their needs and preferences. While definitions vary, Web 3.0 is emerging as a dynamic, customized web that filters and organizes information for individuals.
This document discusses and dispels common misconceptions about the internet and information literacy. It explains that the internet was originally created by the US government to enable researchers and professors to share information. While the internet has grown significantly, no single group controls it. It also clarifies that the world wide web is just one component of the internet and describes how to access the web using browsers. Additionally, it notes that searching the internet can be difficult because most results will not be useful and developing skills to evaluate sources is important for finding quality information online.
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
Source: http://www.helioteixeira.org/ How to use Collective Intelligence techniques to ensure that your web application can extract valuable data from its usage and deliver that value right back to the users. (MODULE 1)
The surprising adventures of the mechanical curatorbenosteen
The document describes an experiment conducted by the British Library Labs to provide researchers with broader access to the Library's digital collections. Researchers were given direct access to files to explore how faces were depicted in 19th century illustrations. While face detection software had limited success due to differences from modern images, the experiment revealed unexpected illustrations. This led to the creation of the Mechanical Curator Twitter account and Flickr site to make more images accessible. The Library is now exploring providing broader access and ways to make data more useful through collaborations like the British Library Big Data Experiment.
The document discusses the concept of Library 2.0 and how libraries are adopting practices associated with Web 2.0, such as user-generated content, social media, and participatory services. Some examples of libraries using blogs, Twitter, Flickr, and instant messaging on Facebook are provided. While there are some objections to the emphasis on 2.0 technologies, the document argues that libraries need to engage with these new technologies because users, especially younger generations, are increasingly using social media and participating online.
The document discusses the evolution of the World Wide Web and different proposed versions such as Web 4.0 and beyond. It provides:
1) Various definitions and predictions for future versions from different sources, with no clear consensus on what defines each version.
2) Examples of proposed characteristics for versions like Web 3.0 focusing on mobile web, Web 4.0 focusing on connections and recommendations, and Web 5.0 focusing on either time-based services or a "wise web" with greater artificial intelligence.
3) However, the document suggests there is no agreed upon definition and the evolution is ongoing with constant new ideas for how the web may develop further in the future.
The Turing test asked whether one could recognize the behavior of a human from that of a computer algorithm. Today this question has suddenly become very relevant in the context of social media, where text constraints limit the expressive power of humans, and real incentives abound to develop human-mimicking software agents called social bots. These elusive entities wildly populate social media ecosystems, often going unnoticed among the population of real people. Bots can be benign or harmful, aiming at persuading, smearing, or deceiving. Here we discuss the characteristics of modern, sophisticated social bots, and how their presence can endanger online ecosystems and our society. We then discuss current efforts aimed at detection of social bots in Twitter. Characteristics related to content, network, sentiment, and temporal patterns of activity are imitated by bots but at the same time can help discriminate synthetic behaviors from human ones, yielding signatures of engineered social tampering.
Human–robot interaction HRI is essentially the field of study of interactions between humans and robots. It exists at the overlap of several academic disciplines such as psychology, philosophy, anthropology, cognitive science, the social sciences, artificial intelligence, computer science, robotics, engineering, and human computer interaction. It is dedicated to understanding, designing, and evaluating robotic systems used by humans. The goal of HRI is seeking to better understand the nature of interaction between humans and machines. Long term human robot interaction is important in several areas such as for companion robots, rehabilitation, and education. This paper introduces human robot interaction and critically reflects on some of its key challenges. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Human-Robot Interaction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50050.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/50050/humanrobot-interaction/matthew-n-o-sadiku
The document discusses the growing necessity for Michigan libraries to have an online presence. It notes that while many libraries currently see their online presence as optional, recent studies show that libraries without a digital strategy are becoming irrelevant. The document analyzes the online representation of Michigan libraries of different class sizes and identifies common problems such as outdated websites and lack of accessible library services online. It proposes solutions such as using content management systems and social media to engage communities and address issues like usability and mobile accessibility.
The document discusses the debate around net neutrality. It explores the perspectives of internet service providers (ISPs) who want to charge content providers fees for priority bandwidth, versus net neutrality advocates who believe this would negatively impact consumers and competition. The author also shares their free market views, arguing that more competition among ISPs and letting private companies address bandwidth and piracy issues is preferable to government regulation.
Web 1 allowed users to access information on read-only websites like dictionaries and university pages. Web 2 emerged in 2004, enabling users to interact and contribute to content through wikis and social networks. Web 3 is an intelligent version that is becoming smarter through machine learning and AI, delivering personalized content by understanding individual browsing histories.
The document discusses the concepts of Library 2.0 and how libraries are adopting Web 2.0 technologies and principles to become more user-centered. It provides examples of libraries that have experimented with new services and features on their websites, such as allowing user ratings and comments, integrating with social networking sites, and providing new ways for users to search and browse the catalog. The examples show libraries embracing change, taking risks with new technologies, and meeting users in online spaces to remain relevant in the digital age.
The document discusses the history and evolution of open source software from its origins in computer science academia to the present. It describes how Richard Stallman developed the GNU operating system and generalized public license (GPL) to create a legal framework ensuring software remains freely accessible and modifiable. While open source models aim to grant universal access, the document notes they still face challenges around equitable participation, as seen in the small percentage of female Wikipedia editors. Overall, it examines the positive and negative societal impacts of shifting towards more open information systems and knowledge-sharing frameworks.
This document summarizes research comparing four mobile dating/hookup apps: Tinder, Mixxxer, Squirt, and Dattch. It discusses how each app is designed to attract certain groups (e.g. Tinder for general dating, Mixxxer and Squirt for explicit hookups) and how they navigate issues like real name policies, content policies of app stores, and ensuring privacy and safety for users. Key differences discussed include how users can browse, search, match, and meet up based on the intended purpose and technical capabilities of each app.
Technological Revolutions and Cultural Revolutions: OSCON 2014Tim O'Reilly
Open source, DevOps, cloud computing, and the internet of things don't just require new technology, they require new thinking about how society and business is to be organized. It's critical, therefore, to infuse the work that developers do with human values, and to build a world that we are proud of.
Call Me Email - The New York Times by Adam BaerAdam Baer
Eric Brown, a former English professor, has written a "digital epistolary novel" called Intimacies that is meant to be read using a software interface. The story is told through emails, instant messages, and web pages. Brown plans to sell software to help other writers create their own digital novels using a similar format. Some scholars see this as a promising new form of electronic literature that captures how people communicate digitally, while others are skeptical of how engaging or "literary" the format currently is. The digital novel format has attracted over 5,000 readers so far.
The document discusses the evolution of the World Wide Web from Web 1.0 to Web 3.0. Web 1.0 focused on static, read-only pages and basic hyperlinking. Web 2.0 enabled user-generated content and social networking. Web 3.0 aims to make the web more intelligent through semantic annotation and artificial intelligence to better understand user needs. It also discusses some key applications and limitations of each stage of the web's development.
Facebook knew about and failed to police abusive content globally; reportaditi agarwal
- Facebook has struggled for years to police abusive content globally due to lacking resources like moderators with local language skills and AI screening tools.
- Internal documents show gaps in content moderation in countries deemed "at risk" of real-world violence like Myanmar, Ethiopia, Afghanistan, and Yemen due to lack of classifiers and reviewers for local languages.
- Employees have warned that these shortcomings limit Facebook's ability to curb hate speech and other violations as it pledged, and that its global expansion was not matched by similar growth in safety measures.
This document discusses the size and quality of information available on the "deep web" or non-searchable parts of the internet, as compared to the "surface web" or searchable parts. It finds that the deep web is about 500 times larger than the surface web, with documents in the deep web having an average quality score about 3 times higher per document. The total quality of information in the deep web vastly exceeds that of the surface web by thousands of times. The deep web has long been underestimated in size and importance, with some estimates placing it as large as the surface web or larger and growing exponentially.
Web 3.0 aims to bring together the content of Web 1.0 and the social aspects of Web 2.0 by creating meaning from online content and social context through advances like semantic search engines that understand concepts rather than just keywords. It will be a more personalized, intelligent web where software agents can perform tasks on a user's behalf based on their needs and preferences. While definitions vary, Web 3.0 is emerging as a dynamic, customized web that filters and organizes information for individuals.
This document discusses and dispels common misconceptions about the internet and information literacy. It explains that the internet was originally created by the US government to enable researchers and professors to share information. While the internet has grown significantly, no single group controls it. It also clarifies that the world wide web is just one component of the internet and describes how to access the web using browsers. Additionally, it notes that searching the internet can be difficult because most results will not be useful and developing skills to evaluate sources is important for finding quality information online.
Web 2.0 Collective Intelligence - How to use collective intelligence techniqu...Paul Gilbreath
Source: http://www.helioteixeira.org/ How to use Collective Intelligence techniques to ensure that your web application can extract valuable data from its usage and deliver that value right back to the users. (MODULE 1)
The surprising adventures of the mechanical curatorbenosteen
The document describes an experiment conducted by the British Library Labs to provide researchers with broader access to the Library's digital collections. Researchers were given direct access to files to explore how faces were depicted in 19th century illustrations. While face detection software had limited success due to differences from modern images, the experiment revealed unexpected illustrations. This led to the creation of the Mechanical Curator Twitter account and Flickr site to make more images accessible. The Library is now exploring providing broader access and ways to make data more useful through collaborations like the British Library Big Data Experiment.
The document discusses the concept of Library 2.0 and how libraries are adopting practices associated with Web 2.0, such as user-generated content, social media, and participatory services. Some examples of libraries using blogs, Twitter, Flickr, and instant messaging on Facebook are provided. While there are some objections to the emphasis on 2.0 technologies, the document argues that libraries need to engage with these new technologies because users, especially younger generations, are increasingly using social media and participating online.
The document discusses the evolution of the World Wide Web and different proposed versions such as Web 4.0 and beyond. It provides:
1) Various definitions and predictions for future versions from different sources, with no clear consensus on what defines each version.
2) Examples of proposed characteristics for versions like Web 3.0 focusing on mobile web, Web 4.0 focusing on connections and recommendations, and Web 5.0 focusing on either time-based services or a "wise web" with greater artificial intelligence.
3) However, the document suggests there is no agreed upon definition and the evolution is ongoing with constant new ideas for how the web may develop further in the future.
The Turing test asked whether one could recognize the behavior of a human from that of a computer algorithm. Today this question has suddenly become very relevant in the context of social media, where text constraints limit the expressive power of humans, and real incentives abound to develop human-mimicking software agents called social bots. These elusive entities wildly populate social media ecosystems, often going unnoticed among the population of real people. Bots can be benign or harmful, aiming at persuading, smearing, or deceiving. Here we discuss the characteristics of modern, sophisticated social bots, and how their presence can endanger online ecosystems and our society. We then discuss current efforts aimed at detection of social bots in Twitter. Characteristics related to content, network, sentiment, and temporal patterns of activity are imitated by bots but at the same time can help discriminate synthetic behaviors from human ones, yielding signatures of engineered social tampering.
Human–robot interaction HRI is essentially the field of study of interactions between humans and robots. It exists at the overlap of several academic disciplines such as psychology, philosophy, anthropology, cognitive science, the social sciences, artificial intelligence, computer science, robotics, engineering, and human computer interaction. It is dedicated to understanding, designing, and evaluating robotic systems used by humans. The goal of HRI is seeking to better understand the nature of interaction between humans and machines. Long term human robot interaction is important in several areas such as for companion robots, rehabilitation, and education. This paper introduces human robot interaction and critically reflects on some of its key challenges. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Human-Robot Interaction" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-4 , June 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50050.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/50050/humanrobot-interaction/matthew-n-o-sadiku
The Emergence Of Social Bots In Social Media- WiDS TalkAseel Addawood
Social bots are algorithms that automatically produce content and interact with humans on social media to emulate and potentially manipulate human behavior. Around 9-15% of active Twitter accounts may be bots. Bots are used for marketing, entertainment, gaining followers, spamming, influencing opinions, and limiting free speech. About 30% of users can be deceived by bots. Identifying bots can be difficult as sophisticated bots mimic human behavior, but graph-based and feature-based methods analyze social networks and individual account features to detect bots with machine learning classifiers. The arms race between bot detection and deception will continue as long as deception remains effective.
Here are five questions I would ask Vladimir Lenin:
1. What were your long-term goals for Russia and how did you plan to transition the country from a monarchy to a socialist state in the aftermath of the revolution?
2. How did your views on Marxism and class struggle develop and what key Marxist theorists most influenced your political ideology?
3. What factors or events do you believe were most critical to the Bolsheviks seizing power in the October Revolution of 1917?
4. What challenges did you face in consolidating power as the new Soviet government and how did you work to overcome opposition from other leftist factions?
5. Looking back, are there any aspects of how you led the Soviet Union
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
This document discusses the rise of virtual personas and how data is used to create narratives. It notes that as sensors and computing devices became smaller, social media encouraged oversharing of personal information. This data can now be used by systems like Weavrs to generate virtual personas that act autonomously online. While this raises issues around authenticity and transparency, it also enables new types of market research by simulating audiences at scale. The document questions how people and businesses will interact with these algorithmically generated narratives in the future.
Metanomics Transcript May 27 2009, Measuring Value in Virtual WorldsDoug Thompson
This document summarizes a discussion from the Metanomics podcast about virtual teams and organizations.
1) Tony O'Driscoll from Duke University kicks off the discussion by looking at recent NSF research on virtual organizations and sociotechnical systems. This research examines how and when virtual organizations can enable scientific and educational work.
2) The main guest, Dr. Mitzi Montoya from NC State University, then presents her research on measuring the effectiveness of virtual worlds using her scale of "perceived virtual presence." Her research finds that the more present users feel in virtual worlds, the greater the effectiveness of training, collaboration, education, or presentations.
3) The discussion concludes by considering which industries
The document discusses human robot interaction. It begins with an introduction that defines human robot interaction and discusses remote and proximate interaction. The literature survey section then summarizes research on robots in healthcare, acceptance issues, autonomous vehicles, interactive robots, and brain computer interfaces. The document also outlines advantages like performing dangerous tasks, disadvantages like costs, and applications in areas like search and rescue. It concludes by discussing challenges in developing acceptable and comfortable human-robot interaction.
Human–robot interaction is the study of interactions between humans and robots. It is often referred as HRI by researchers. Human–robot interaction is a multidisciplinary field with contributions from human–computer interaction, artificial intelligence, robotics, natural language understanding, design, and social sciences.
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
This panel discusses research projects studying the formation of online communities. Each panelist presents empirical research on a different social cyber space:
1) Marc Smith studied Usenet and found islands of cooperative behavior exist, contradicting the idea it has succumbed to a "tragedy of the commons".
2) Steven Drucker analyzed graphical chat system V-Chat and found the graphical features were used extensively without direct prompts, showing why people communicate this way.
3) Barry Wellman studied residents in a wired Canadian suburb, finding how existing online services are used and what future services people want, providing insight into future connected communities.
4) Robert Kraut found that greater internet use was associated with declines in
Optimizing interconnectivity inhabiting virtual cities of common practiceJonathan Buffa
This document discusses the design of online social environments and virtual communities. It argues that online spaces should be designed as social technologies that facilitate human interaction, rather than just as tools for sharing information. The author proposes using the city as a metaphor to think about designing virtual spaces, and discusses how identity formation works differently online compared to in-person due to the lack of physical cues. The document outlines the author's thesis, which develops approaches for creating online spaces that better support social interaction and the communication of identity through visualization tools and information architectures.
In this session, we talk about the mobile and social web, and how it shapes economy, individual behavior and well-being, political events, and society as a whole.
The document discusses the development of human-like robots and artificial intelligence, and the potential threats and problems that this poses. It notes that some scientists believe AI will become indistinguishable from humans and form real relationships. However, others argue that AI is just computation and lacks human qualities like spirituality. The document also examines the Microsoft chatbot Tay, which showed how AI can learn bad behaviors from users. Overall, the key issue is how humans will interact with and teach human-like AI, as our relationship with and programming of robots may shape whether AI becomes helpful or harmful.
Cascon 2016 Keynote: Disrupting Developer Productivity One Bot at a TimeMargaret-Anne Storey
Conversational bots have become a popular addition to many mainstream platforms and software engineering has adopted them at an almost dizzying pace across every phase of the development life cycle. Bots reportedly help developers become more productive by automating tedious tasks, by bringing awareness of important project or community activities, and by reducing interruptions. Developers "talk to" and "listen to" these bots in the same conversational channels they use to collaborate with and monitor each other. However, the actual impact these bots have on developer productivity and project quality is still unclear. In this talk, I will give an overview of how bots play a prominent role in software development and discuss the benefits and challenges that can arise from relying on these "new virtual team members". I will also explore how bots may influence other knowledge work domains and propose a number of future directions for practitioners and researchers to consider.
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
Slides from a series of talks for the IET's IoT India Congress and some associated events - SRM Chennai, PES Bengaluru, Srishti Bengaluru. I used different subsets of the slides in each talk - this is the whole deck.
The passage compares the protagonists Jack from Lord of the Flies and Kurtz from Heart of Darkness. Both characters degenerate into savagery when isolated from civilization. Other characters are highly influenced by the protagonists' descent. The report analyzes how each character's leadership influences the groups in distinctly different environments - a deserted island for Lord of the Flies and the Congo for Heart of Darkness.
Virtual communities allow people to connect and share information online despite physical distances. They are formed when people with similar interests congregate online to share information, develop relationships, and express ideas. Examples include social media sites, online games like World of Warcraft, and blogs. While virtual communities enable global connections and support networks, some argue they could negatively impact users' real-world responsibilities if overused. Monitoring and self-control may help address risks to health and relationships posed by excessive virtual community use.
The essay about In the future, what kind of relationship should .docxmehek4
The essay about
In the future, what kind of relationship should robots and humans have? In other words, in your opinion, will robots supplement (assist) or supplant (replace) us? Your answer to this question will become your thesis.
My thesis statement
There are relationship between human and robots, because military, emotion and prosthetics.
From those articles I make my essay. Please look at it and see what I wrote and fix any mistake
http://www.thenewatlantis.com/publications/machine-morality-and-human-responsibility
Machine Morality and Human Responsibility - The New Atlantis
www.thenewatlantis.com
E-mail Updates. Enter your e-mail address to receive occasional updates and previews from The New Atlantis.
http://www.livescience.com/27204-human-robot-relationships-turkle.html
Human-Robot Relations: Why We Should Worry | Sherry Turkle
www.livescience.com
People are looking more and more to robotic toys and tools for companionship, and less to other people, said Sherry Turkle, a professor of the social studies of ...
http://spectrum.ieee.org/automaton/robotics/medical-robots/biomimetic-anthropomorphic-robot-hand
This Is the Most Amazing Biomimetic Anthropomorphic Robot ...
spectrum.ieee.org
Here’s why it was important for them to design a new kind of robotic hand, according to Xu: “The conventional approach to designing anthropomorphic ...
This is compleat my essay
In today's cutting edge life innovation has contributed in individuals lives from numerous points of view. Particularly automated frameworks with man-made brain-power can perform numerous modern obligations and getting the opportunity to be progressively imperative for a few individuals. In any case, there are the individuals who believe that robots have a contrary effect for individuals and can acquire amazing risk what's to come. These perspectives must be tended to as needs be.
Today, it has been demonstrated, that automated framework has profited from multiple points of view. Case in point, couple of robots has helped youngsters with formative inabilities others have enhanced the wellbeing status of individuals with various insufficiencies. Individuals who have encountered treatment robots in their lives have remarked that robots gotten certain their lives and tackled issues with their wellbeing. The other reality is that in some mechanical nations robots are helping kids with insufficiencies to grow speedier and have affected emphatically to their conduct. Be that as it may a few individuals consider that robots might be to a great degree unsafe for individuals. One explanation behind this is robots have counterfeit savvy and they can't supplant human shrewd in taking care of various issues. Case in point, couple of robots has begun to work in a few healing facilities and it is extremely risky for patients as robots can't be in charge of their activity. Besides, robots might represent the conceivable increment of unemployment later on. This can be prove, as manag ...
Similar to Research article even good bots fight the case of wikipedi (20)
please write a short essay to address the following questions. Lengt.docxDIPESH30
please write a short essay to address the following questions. Length: 500 word count to the minimum.
“Blogs, Twitter, Facebook, and a host of other news and social-media sites have allowed average citizens to become newsmakers. Is this a good or bad thing? Is the increase in citizen journalism leading to inaccuracies in reporting? Or can we trust that Americans will “consider the source” and verify any questionable information they read on a blog?”
Requirements:
1.Word count: 500.
2.Submissions must be in Word format (doc, docx) or Rich Text format (rtf). Attached file sent to my email will not be graded.
3.VeriCite has been activated to prevent plagiarism and no credit will be issued if Similarity Index points to 20% or higher.
.
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
please write a diary entry from the perspective of a French Revolutionary of the Third Estate (bourgeoisie, worker, or peasant), a member of the First Estate (clergy) or a member of the Second Estate (nobles). Your entry should have a well established mood, or writing that evokes certain feelings or emotions in readers through words and descriptions. Some examples of mood through setting, diction, and tone can be found
HERE
.
In addition, your journal should incorporate at least
THREE
of the following vocabulary terms:
Louis XVI
Estates-General
National Assembly
Tennis Court Oath
estate (First, Second, Third)
The Enlightenment
Great Fear
.
Please write the definition for these words and provide .docxDIPESH30
Please write the definition for these words and
provide two
examples
for each one
The definition should relate to “linguistic form“ / grammar
See attached file. you have
three hours and an half
to do the assignemnt
.
Please view the filmThomas A. Edison Father of Invention, A .docxDIPESH30
Please view the film:
Thomas A. Edison: Father of Invention
, A & E Television (New York, NY: A & E Television Networks, 1996); Available on the Hagerty Library catalogue at: http://records.library.drexel.edu/record=b2133926~S9
And discuss:
Edison is portrayed rather herocially in this film, what would you do to present a more balanced view of Edison the man and inventor? Based on my lecture, discuss why or why not Edison should be considered the creator of the light bulb?
.
Please watch the clip from the movie The Break Up. Then reflect w.docxDIPESH30
Please watch the clip from the movie "The Break Up." Then reflect who you think is most at fault and why.
Then I would you like to think about a conflict you have had and think about what could have been done differently to resolve it.
Write a one page paper (double spaced)
https://www.youtube.com/watch?v=_bqhVqTuFO4
.
please write a report on Social Media and ERP SystemReport should.docxDIPESH30
please write a report on Social Media and ERP System:
Report should be a detail study on social media, effects of social media on business.Use of ERP Systems in social media and its benefits.During presentatio the students should present the use of ERP Systems in the social media aspect.
pages: 15
font size: 11
spaces: 1.5
please see attached file
due date tomorrow, within 24 hour
.
Please write 200 wordsHow has the healthcare delivery system chang.docxDIPESH30
Please write 200 words
How has the healthcare delivery system changed?
For what types of patients and what types of care does each of the systems deliver? Would a patient have a need for more than one system? When (give examples and explain)?
What are the regulations related to the medical staff? What purpose do these regulations serve?
.
Please view the documentary on Typhoid Mary at httpswww..docxDIPESH30
Please view the documentary on Typhoid Mary at:
https
://
www
.
youtube
.com/watch?v=
Mc
8O9
EnAuLo
And read:
- Priscilla Wald, “Cultures and Carriers: "Typhoid Mary" and the Science of Social Control,”
Social Text
, No. 52/53,
Queer
Transexions
of Race, Nation, and Gender
(Autumn - Winter, 1997), pp. 181-214; Available in the Readings Folder and on JSTOR at:
http
://
www
.
jstor
.
org
/stable/466739
Then discuss:
Wald discusses how the concept of "social control" relates or is exemplified by the Mary
Mallon
ca
se
. Choose one of the aspects of Wald's argument and discuss how it relates to the Typhoid Mary documentary. Do these help us understand the significance the 'Typhoid Mary' case has for the history of medicine, or for the treatment of epidemics today?
.
Please use the two attachments posted to complete work. Detailed in.docxDIPESH30
This document provides instructions and deadlines for two assignments. A discussion is due on December 11th by noon and a paper is due on December 13th by noon. It also lists additional research sources that can be used for part two of the assignment, including journal articles and books on business regulation and international trade theory.
Please use the sources in the outline (see photos)The research.docxDIPESH30
Please use the sources in the outline (see photos)
The research essay is to be 12 pages, typed, double-spaced. 10-12 sources are to be used. It is to be on a social policy area and may focus on Canada, or Canada in comparative perspective.
1.
Discuss the National Child Benefit, introduced in 1997. Has this measure been effective in reducing child poverty? Can this measure be seen as the further extension of neoliberalism, or as a new form of state-provided social investment?
Please make a clear and wordy thesis (highlight this in red) use notions of this thesis throughout the paper please. Clear and concise english as this is a university level paper.
Please include your own ideas as well as recommendations.
if a point is made please provide proof with the sources or readings
Please use APA FORMAT.
Please ensure that the paper follows the format suggested in the outline.
.
Please submit a minimum of five (5) detailed and discussion-provokin.docxDIPESH30
Please submit a minimum of five (5) detailed and discussion-provoking questions based on the recent reading assignments, video clips and the other websites assigned.
Only complete questions will earn credit. Therefore, it is important for you to think carefully about formulating the kinds of questions intended to stimulate conversations. Ask detailed and specific, rather than broad, general questions. Do not ask, for example, ‘When was the first Mission established in California?’ Instead, ask something like ‘What is the ideological agenda behind maintaining figures like Father Junipero Serra as heroic in California textbooks?’
Other examples include:
Does recent news media coverage of the “riots” in Baltimore, Ferguson and other cities promote a message that is pro-police? If not, how does it engender understanding of the root causes of many of the frustrations of local residents?
In the film “Banned in Arizona,” why does Superintendent Tom Horne argue in favor of “individualism” and why does he say that the Mexican American Studies program encourages radical thinking? What, if anything, is radical about the way those courses teach students in Tucson, Arizona?
If the U.S. reinstated a Vietnam War era-like military draft instead of relying upon the current all-volunteer force, would current public support for war change at all? If so, how?
Please consider these guidelines in composing your questions:
1. Make certain to ask at least one question from each source.
2. Ask questions about things that interest you.
3. Write your questions as though you were asking them to the entire class.
4. Be sure to make specific reference to the readings in each question. Many good questions require at least two sentences.
5. Try and use the questions to critique the author's opinion.
6. These homework questions should attempt to raise larger issues and---when possible---to relate the readings to issues in our current world.
"This week, I want us to think about the concept of
bias
, and its application in the places we consume information. This is tricky territory because even the very presentation of this unit is fraught with bias—my personal bias, or frame of reference. I’m going to ask you to read a collection of articles that I think are important, but they all clearly have a perspective and an agenda that comes from a particular worldview. So let’s get that out in the open. Maybe nothing in your liberal arts education is free from bias, but that does not mean we shy away from considering the information, ideas, arguments and critiques.
What is bias? For the purposes of our consideration, bias is really just about a set of values that can color or distort fair judgment. We can sometimes recognize obvious bias in others, especially when people use overtly discriminatory or offensive language, or have a clear political or ideological perspective that makes everything they present go through that lens. But more than anything else, I want us to think a.
Please think about the various learning activities you engaged in du.docxDIPESH30
Please think about the various learning activities you engaged in during this unit.
write one page summarizing the following:
Multiculturalism plays an important role in many schools today.
How can this be incorporated into everyday lessons related to health, safety, and nutrition?
How has your school (or your children’s school) incorporated multiculturalism into their lesson?
.
Please type out the question and answer it underneath. Each question.docxDIPESH30
Please type out the question and answer it underneath. Each question should be about a page long DOUBLE SPACED and cited.
Please use the articles that I PROVIDE!
Due date is this Sunday the 14th.
First two articles answer the questions 1 & 2 , the last article answers question 3
PLEASE FOLLOW INSTRUCTIONS
.
Please use the following technique-Outline the legal issues t.docxDIPESH30
Please use the following technique:
-
Outline the legal issues that you are going to discuss in your answer
-
Define the legal rules that are relevant to the question
-
Apply the legal rules to the facts of the question
-
Formulate a decision of which party should be successful
The use of headings for each relationship discussed is suggested.
Application of legal principles to the facts is the most important and often the hardest step. I am more interested in how you arrived at your answer, than the actual conclusions that you draw. Having said that, the “kitchen sink approach” is not suggested – i.e. spilling all of your knowledge that is vaguely related to the issue raised into your answer.
Please do not simply say, “Andrew is liable for negligence.” You must go through the analysis for why or why not a particular tort claim will be successful.
Use the language of the question.
Be as comprehensive and thorough as possible when responding to each issue – canvas all possible answers. If you have considered the application of a particular contractual concept, but after analysis, you have decided that it is not applicable, please go through your analysis.
If any possible remedies are available to either party, please identify with supporting reasons.
Assume for each relationship that the matter is being litigated in court,
not
through alternative dispute resolution.
DUE: TUESDAY MARCH 24
th
, 2015 at beginning of class
No midterms will be accepted after this date.
Tort Law Problem
Andrew Black is the owner of Confederation Mall (“Mall”) located in New Minas, Nova Scotia. Mr. Black leases out many retail spaces in the Mall to a wide range of businesses. He prides himself as a local success story. The people of New Minas truly admire his entrepreneurial success.
George Orange, owner of Guppy World, a pet fish store, has been a long-time tenant of Confederation Mall. Colin and Darren work for Mr. Orange. Colin was repairing a ceiling fan when he asked Darren to toss him a screwdriver, as Colin was up on a step-ladder at the time. Darren, standing 15 feet away, underhand tosses the screwdriver to Colin. Darren overshoots the toss and the screwdriver shatters a glass fish tank containing a piranha fish. At the same time a customer, Sally, was walking towards the check-out to purchase fish food, when she slipped on the water from the broken tank, fell to the floor and fractured her wrist. She is also bitten on the ankle by the piranha. When Mr. Orange tried to assist Sally, he smelled a strong smell of alcoholic beverage coming from her mouth. Colin noted that Sally appeared to be staggering slightly before falling.
Sally was transported to the hospital by paramedics. The doctor determines that Sally’s foot needs to be amputated due to the piranha bite and she needs to wear a cast on her wrist for 6-8 weeks due to the fracture.
Word of the piranha bite spreads like wild fire throughout the Mall. Evelyn, who suff.
Please use from these stratagies This homework will be to copyies .docxDIPESH30
This homework assignment involves using different educational strategies to complete copies of student work. Some suggested strategies include revising and reading, quick writes, learning logs, data charts, and authors chair.
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxDIPESH30
PLEASE THOROUGHLY ANSWER THE FOLLOWING
FIVE
QUESTIONS BELOW IN A 500 Word Count Discussion
Contrast the dynamics between dominant cultures and subcultures either in a work setting or in society.
Explain why it is important to understand the impact of culture.
Give an example where you demonstrated your awareness and or openness to understanding a cultural difference.
Explain how these differences underscore the need for understanding diversity.
From the information given, develop guidelines for embracing diversity.
YOU MUST USE ONE CITED SCHOLARLY SOURCE. PROPERLY CITED IN APA FORM WITH AN REFERENCE PAGE ON THE BOTTOM. DO NOT USE WIKIPEDIA, THESAURUS, OR ENCYCLOPEDIA (THESE ARE NOT CITED SCHOLARLY SOURCES)
DO NOT TURN IN A PLAGIARIZED PAPER, WE WILL REPORT YOU.....
THIS PAPER IS DUE TODAY 12/11/2014.... 8 HOURS FROM NOW MAX NO LATER....SERIOUS INQUIRIES ONLY...DO NOT TAKE THIS PAPER IF YOU DO NOT KNOW THE TOPIC.....
.
Please share your thoughts about how well your employer, military .docxDIPESH30
Please share your thoughts about how well your employer, military base, or home responds to environmental concerns. Provide examples of some types.
1.
Issue 4
-
Re-Wilding
a. Explain what re-wilding is and how it became an issue.
b. Outline and discuss three main areas of disagreement between Josh Donlan and Rubenstein et al.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 5
-
Military Training and the Environment
a. Explain the history of military training and the environment.
b. Outline and discuss three main areas of disagreement between Benedict Cohen and Jamie Clark.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length.
All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 6
-
Carbon Emission Restrictions
a. Explain the history of carbon emissions and why the debate over carbon emissions exists.
b. Outline and discuss three main areas of disagreement between Paul Cicio and Eileen Claussen.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Explain in your own words the Section 2017 initiative which Jamie Clark describes on. Then describe how you think Benedict Cohen would respond to Jamie Clark's presentation of Section 2017. Your response should be at least 200 words in length. as source material for your response. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
Explain carbon trading, carbon offsets, and cap and trade. How are each similar? How are each different? Your response should be at least 200 words in length. as source material for your response. All sources used, , must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
.
Please select and answer one of the following topics in a well-org.docxDIPESH30
Please select and answer one of the following topics in a well-organized and thoughtful paper (a minimum of 10 pages in
length). Your paper must contain at least five references in addition to the text. CSU requires that students use the APA
style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sources
are to be followed.
1. If your employer's EMS is registered to ISO 14000, review the registration process. What were the most
difficult implementation activities? How long did it take? How easy was it to get worker buy-in and
participation? Cost? Others.
.
Please see the attachment for the actual work that is require. This.docxDIPESH30
Please see the attachment for the actual work that is require. This will be due on Sunday Nov 9, 2014.
THIS ISTHE CASE STUDY ATTACHED IS THE DIRECTIONS ON OW TO COMPLETE THE TASK.
Case Study Analysis
When it comes to planning events how many of us take the proper steps and put in the time and how many of us wait till the last minute to plan our event? What's the outcome of an event that has had the proper planning? Usually, a properly planned event is a huge success, and people leave-taking away information that will help them either improve, grow as a person or be successful at their job. People who try to plan events without taking the proper steps find themselves running into many problems along the way. Before they know it, they are out of time to fix any issues or problems that arise. Running out of time can lead to frustration, panic, and eventually the thought of “what am I going to do". Even though the steps to planning an event can be time-consuming, proper planning can ease frustration and anxiety, and lead to a successful event. Proper planning can eliminate the “What am I going to do” question.
Background
In the case study, Carl Robins did not plan for his event very well. He hired 15 new trainees and wanted to schedule a new hire orientation on June 15
th
. His goal was to have the new hires working by July. Carl had only been at his job for six months, and this was his first recruitment effort, so it is crucial for this event to work in Carl’s favor. Carl was contacted by Monica Carrolls, the soon to be Supervisor of the new hires, on May 15
th
. Monica was following up with Carl on how the planning for his orientation was going. She asked him about physicals, drug tests, the training schedule, orientation, manuals, and policy booklets. Carl told Monica that everything would be fine and ready to go in time for orientation. After Memorial Day, Carl finally decided to start planning for his event. Unfortunately; because Carl did not do any planning after hiring the fifteen new trainees and waited till the last minute to plan his event, he ran into multiple problems. When Carl finally decided to start planning for his event, he found that the training room where he was going to hold his orientation was booked for the whole month of June by a fellow associate named Joe. Joe was from technology services and needed the room for computer terminals. When he went to finalize the paperwork for his event, he found that some of the new hire trainees did not have completed transcripts or applications on file; nor had they gone to the clinic for their physicals and mandatory drug screenings. He then checked the orientation manuals and found that there were only three and that those three had missing pages. By now, Carl is very concerned, his anxiety is at a level high, and he is so frustrated that he sits with his head on his desk with the thought of “What am I going to do”.
Alternatives
At this point, Carl can .
Please see the attachment and look over the LOOK HERE FIRST file b.docxDIPESH30
Please see the attachment and look over the "LOOK HERE FIRST" file before handshaking to make sure you're committed to the assignment. Everything you need is within the zip folder attached. Thanks in advance. I had someone working on this and then they stopped answering me. Please don't be that person.
.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Research article even good bots fight the case of wikipedi
1. RESEARCH ARTICLE
Even good bots fight: The case of Wikipedia
Milena Tsvetkova
1
, Ruth Garcı́a-Gavilanes
1
, Luciano Floridi
1,2
, Taha Yasseri
1,2*
1 Oxford Internet Institute, University of Oxford, Oxford,
United Kingdom, 2 Alan Turing Institute, London,
United Kingdom
* [email protected]
Abstract
In recent years, there has been a huge increase in the number of
bots online, varying from
Web crawlers for search engines, to chatbots for online
customer service, spambots on
social media, and content-editing bots in online collaboration
communities. The online world
2. has turned into an ecosystem of bots. However, our knowledge
of how these automated
agents are interacting with each other is rather poor. Bots are
predictable automatons that
do not have the capacity for emotions, meaning-making,
creativity, and sociality and it is
hence natural to expect interactions between bots to be
relatively predictable and unevent-
ful. In this article, we analyze the interactions between bots that
edit articles on Wikipedia.
We track the extent to which bots undid each other’s edits over
the period 2001–2010,
model how pairs of bots interact over time, and identify
different types of interaction trajecto-
ries. We find that, although Wikipedia bots are intended to
support the encyclopedia, they
often undo each other’s edits and these sterile “fights” may
sometimes continue for years.
Unlike humans on Wikipedia, bots’ interactions tend to occur
over longer periods of time and
to be more reciprocated. Yet, just like humans, bots in different
cultural environments may
behave differently. Our research suggests that even relatively
“dumb” bots may give rise
3. to complex interactions, and this carries important implications
for Artificial Intelligence
research. Understanding what affects bot-bot interactions is
crucial for managing social
media well, providing adequate cyber-security, and designing
well functioning autonomous
vehicles.
Introduction
In August 2011, Igor Labutov and Jason Yosinski, two PhD
students at Cornell University, let
a pair of chat bots, called Alan and Sruthi, talk to each other
online. Starting with a simple
greeting, the one-and-a-half-minute dialogue quickly escalated
into an argument about what
Alan and Sruthi had just said, whether they were robots, and
about God [1]. The first ever con-
versation between two simple artificial intelligence agents
ended in a conflict.
A bot, or software agent, is a computer program that is
persistent, autonomous, and reactive
[2,3]. Bots are defined by programming code that runs
continuously and can be activated by
itself. They make and execute decisions without human
4. intervention and perceive and adapt
to the context they operate in. Internet bots, also known as web
bots, are bots that run over the
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 1 / 13
a1111111111
a1111111111
a1111111111
a1111111111
a1111111111
OPEN ACCESS
Citation: Tsvetkova M, Garcı́a-Gavilanes R, Floridi
L, Yasseri T (2017) Even good bots fight: The case
of Wikipedia. PLoS ONE 12(2): e0171774.
doi:10.1371/journal.pone.0171774
Editor: Sergio Gómez, Universitat Rovira i Virgili,
SPAIN
Received: November 16, 2016
Accepted: January 25, 2017
7. study found that 25% of all messages on Yahoo! chat over a
period of three months in 2007
were sent by spam bots [9]. Another study discovered that 32%
of all tweets made by the most
active Twitter users in 2009 were generated by bots [10],
meaning that bots were responsible
for an estimated 24% of all tweets [11]. Further, researchers
estimated that bots comprise
between 4% and 7% of the avatars on the virtual world Second
Life in 2009 [12]. A media ana-
lytics company found that 54% of the online ads shown in
thousands of ad campaigns in 2012
and 2013 were viewed by bots, rather than humans [13].
According to an online security com-
pany, bots accounted for 48.5% of website visits in 2015 [14].
Also in 2015, 100,000 accounts
on the multi-player online game World of Warcraft (about 1%
of all accounts) were banned
for using bots [15]. And in the same year, a database leak
revealed that more than 70,000
“female” bots sent more than 20 million messages on the
cheater dating site Ashley Madison
[16].
As the population of bots active on the Internet 24/7 is growing
8. fast, their interactions are
equally intensifying. An increasing number of decisions,
options, choices, and services depend
now on bots working properly, efficaciously, and successfully.
Yet, we know very little about
the life and evolution of our digital minions. In particular,
predicting how bots’ interactions
will evolve and play out even when they rely on very simple
algorithms is already challenging.
Furthermore, as Alan and Sruthi demonstrated, even if bots are
designed to collaborate, con-
flict may occur inadvertently. Clearly, it is crucial to
understand what could affect bot-bot
interactions in order to design cooperative bots that can manage
disagreement, avoid unpro-
ductive conflict, and fulfill their tasks in ways that are socially
and ethically acceptable.
There are many types of Internet bots (see Table 1). These bots
form an increasingly com-
plex system of social interactions. Do bots interact with each
other in ways that are comparable
Table 1. Categorization of Internet bots according to the
intended effect of their operations and the kind of activities
they perform, including some
9. familiar examples for each type.
Benevolent Malevolent
Collect
information
• Web crawlers
• Bots used by researchers
• Spam bots that collect e-mail addresses
• Facebook bots that collect private information
Execute actions • Anti-vandalism bots on Wikipedia
• Censoring and moderating bots on chats and
forums
• Auction-site bots
• High-frequency trading algorithms
• Gaming bots
• DDoS attack bots
• Viruses and worms
• Clickfraud bots that increase views of online ads and YouTube
videos
Generate content • Editing bots on Wikipedia
10. • Twitter bots that create alerts or provide content
aggregation
• Spam bots that disseminate ads
• Bot farms that write positive reviews and boost ratings on
Apple App Store,
YouTube, etc.
Emulate humans • Customer service bots
• @DeepDrumpf and poet-writing bots on Twitter
• AI bots, e.g. IBM’s Watson
• Social bots involved in astroturfing on Twitter
• Social bots on the cheater dating site Ashley Madison
doi:10.1371/journal.pone.0171774.t001
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 2 / 13
to how we humans interact with each other? Bots are predictable
automatons that do not have
the capacity for emotions, meaning-making, creativity, and
sociality [17]. Despite recent
11. advances in the field of Artificial Intelligence, the idea that bots
can have morality and culture
is still far from reality. Today, it is natural to expect
interactions between bots to be relatively
predictable and uneventful, lacking the spontaneity and
complexity of human social interac-
tions. However, even in such simple contexts, our research
shows that there may be more simi-
larities between bots and humans than one may expect. Focusing
on one particular human-bot
community, we find that conflict emerges even among
benevolent bots that are designed to
benefit their environment and not fight each other, and that bot
interactions may differ when
they occur in environments influenced by different human
cultures.
Benevolent bots are designed to support human users or
cooperate with them. Malevolent
bots are designed to exploit human users and compete
negatively with them. We have classi-
fied high-frequency trading algorithms as malevolent because
they exploit markets in ways
that increase volatility and precipitate flash crashes. In this
study, we use data from editing
12. bots on Wikipedia (benevolent bots that generate content).
We study bots on Wikipedia, the largest free online
encyclopedia. Bots on Wikipedia are
computer scripts that automatically handle repetitive and
mundane tasks to develop, improve,
and maintain the encyclopedia. They are easy to identify
because they operate from dedicated
user accounts that have been flagged and officially approved.
Approval requires that the bot
follows Wikipedia’s bot policy.
Bots are important contributors to Wikipedia. For example, in
2014, bots completed about
15% of the edits on all language editions of the encyclopedia
[18]. In general, Wikipedia bots
complete a variety of activities. They identify and undo
vandalism, enforce bans, check spell-
ing, create inter-language links, import content automatically,
mine data, identify copyright
violations, greet newcomers, and so on [19]. Our analysis here
focuses on editing bots, which
modify articles directly. We analyze the interactions between
bots and investigate the extent to
which they resemble interactions between humans. In particular,
13. we focus on whether bots
disagree with each other, how the dynamics of disagreement
differ for bots versus humans,
and whether there are differences between bots operating in
different language editions of
Wikipedia.
To measure disagreement, we study reverts. A revert on
Wikipedia occurs when an editor,
whether human or bot, undoes another editor’s contribution by
restoring an earlier version of
the article. Reverts that occur systematically indicate
controversy and conflict [20–22]. Reverts
are technically easy to detect regardless of the context and the
language, so they enable analysis
at the scale of the whole system.
Our data contain all edits in 13 different language editions of
Wikipedia in the first ten
years after the encyclopedia was launched (2001–2010). The
languages represent editions of
different size and editors from diverse cultures (see Materials
and Methods for details). We
know which user completed the edit, when, in which article,
whether the edit was a revert and,
14. if so, which previous edit was reverted. We first identified
which editors are humans, bots, or
vandals. We isolated the vandals since their short-lived
disruptive activity exhibits different
time and interaction patterns than the activity of regular
Wikipedia editors.
Results
Bots constitute a tiny proportion of all Wikipedia editors but
they stand behind a significant
proportion of all edits (Fig 1A and 1B). There are significant
differences between different lan-
guages in terms of how active bots are. From previous research,
we know that, in small and
endangered languages, bots are extremely active and do more
than 50% of the edits, sometimes
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 3 / 13
up to 100% [19]. Their tasks, however, are mainly restricted to
adding links between articles
and languages. In large and active languages, the level of bot
activity is much lower but also
15. much more variable.
Compared to humans, a smaller proportion of bots’ edits are
reverts and a smaller propor-
tion get reverted (Fig 1C and 1D). In other words, bots dispute
others and are disputed by oth-
ers to a lesser extent than humans. Since 2001, the number of
bots and their activity has been
increasing but at a slowing rate (S1 Fig). In contrast, the
number of reverts between bots has
been continuously increasing (Fig 2A). This would suggest that
bot interactions are not
becoming more efficient. We also see that the proportion of
mutual bot-bot reverts has
remained relatively stable, perhaps even slightly increasing over
time, indicating that bot own-
ers have not learned to identify bot conflicts faster (Fig 2B).
In general, bots revert each other a lot: for example, over the
ten-year period, bots on
English Wikipedia reverted another bot on average 105 times,
which is significantly larger
than the average of 3 times for humans (S1 Table). Bots on
German Wikipedia revert each
other to a much lesser extent than other bots (24 times on
average). Bots on Portuguese Wiki-
16. pedia, in contrast, fight the most, with an average of 185 bot-
bot reverts per bot. This striking
difference, however, disappears when we account for the fact
that bots on Portuguese Wikipe-
dia edit more than bots on German Wikipedia. In general, since
bots are much more active
Fig 1. The proportion of Wikipedia editors who are human,
vandals, and bots and the type of editorial
activity in which they are involved. A language edition to the
left has a higher total number of edits than one
to the right. (A) Bots comprise a tiny proportion of all
Wikipedia users, usually less than 0.1% (not visible in the
figure). (B) However, bots account for a significant proportion
of the editorial activity. The level of bot activity
significantly differs between different language editions of
Wikipedia, with bots generally more active in
smaller editions. (C) A smaller proportion of bots’ edits are
reverts compared to humans’ edits. (D) A smaller
proportion of bots’ edits get reverted compared to humans’
edits. Since by our definition, vandals have all of
their edits reverted, we do not show them in this figure.
doi:10.1371/journal.pone.0171774.g001
Even good bots fight
17. PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 4 / 13
editors than humans, the higher number of bot-bot reverts does
not mean that bots fight more
than humans. In fact, the proportion of bots’ edits that are
reverts is smaller for bots than for
humans (Fig 1C). This proportion is highest for bots in the
English and the Romance-language
editions (Spanish, French, Portuguese, and Romanian).
Interestingly, although bots in these
languages revert more often compared to bots in other
languages, fewer of these reverts are for
another bot (S2 Fig).
Our analysis focuses on interactions in dyads over time. We
model the interaction trajecto-
ries in two-dimensional space, where the x-axis measures time
and the y-axis measures how
many more times the first editor has reverted the second
compared to the second reverting the
first (Fig 3). We analyze three properties of the trajectories:
latency, imbalance, and reciprocity.
Latency measures the average steepness of the interaction
18. trajectory, imbalance measures the
distance between the x-axis and the last point of the trajectory,
and reciprocity measures the
trajectory’s jaggedness (see Materials and Methods below for
definitions).
Analyzing the properties of the interaction trajectories suggests
that the dynamics of dis-
agreement differ significantly between bots and humans.
Reverts between bots tend to occur at
a slower rate and a conflict between two bots can take place
over longer periods of time, some-
times over years. In fact, bot-bot interactions have different
characteristic time scale than
human-human interactions (S3 Fig). The characteristic average
time between successive
reverts for humans is at 2 minutes, 24 hours, or 1 year. In
comparison, bot-bot interactions
have a characteristic average response of 1 month. This
difference is likely because, first, bots
systematically crawl articles and, second, bots are restricted as
to how often they can make
Fig 2. The number of bot reverts executed by another bot and
the proportion of unique bot-bot pairs
that have at least one reciprocated revert for the period 2001–
2010. (A) Generally, the number of bot-bot
19. reverts has been increasing. (B) However, the proportion of
reciprocated reverts has not been decreasing
(error bars correspond to one standard error). This suggests that
disagreement between bots is not becoming
less common.
doi:10.1371/journal.pone.0171774.g002
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 5 / 13
edits (the Wikipedia bot policy usually requires spacing of 10
seconds, or 5 for anti-vandalism
activity, which is considered more urgent). In contrast, humans
use automatic tools that report
live changes made to a pre-selected list of articles [24,25]; they
can thus follow only a small set
of articles and, in principle, react instantaneously to any edits
on those.
Bots also tend to reciprocate each other’s reverts to a greater
extent. In contrast, humans
tend to have highly unbalanced interactions, where one
individual unilaterally reverts another
20. one (S4 and S5 Figs).
We quantify these findings more precisely by identifying
different types of interaction tra-
jectories and counting how often they occur for bots and for
humans, as well as for specific
languages. To this end, we use k-means clustering on the three
properties of the trajectories
(latency, imbalance, and reciprocity) and on all bot-bot and
human-human interactions longer
than five reverts (the results are substantively similar without
the length restriction). We do
not claim that the clusters are natural to the data; rather, we use
the clusters to compare the
interactions of the different groups.
Fig 3. Typical interaction trajectories for bot-bot and human-
human pairs in English Wikipedia in the
period 2001–2010. The interaction trajectories are constructed
as follows: starting from yo = 0, yt = yt-1 + 1 if i
reverts j and yt = yt-1 − 1 if j reverts i at time t; the labels i and
j are assigned so that y >= 0 for the majority of the
ij interaction time; to compress the extremes, we scaled the y-
axis to the power of 0.5. The panels show the
trajectories of 200 pairs randomly sampled from those who have
exchanged more than five reverts. In
21. addition, we highlight the four longest trajectories in the sample
from each of the four trajectory types we
identify. Compared to human-human interactions, bot-bot
interactions occur at a slower rate and are more
balanced, in the sense that reverts go back and forth between
the two editors.
doi:10.1371/journal.pone.0171774.g003
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 6 / 13
The algorithm suggested that the data can be best clustered in
four trajectory types (S6 Fig):
• Fast unbalanced trajectories. These trajectories have low
reciprocity and latency and high
imbalance. They look like smooth vertical lines above the x-
axis.
• Slow unbalanced trajectories. These trajectories have low
reciprocity and high latency and
imbalance. They look like smooth diagonal lines above the x-
axis.
• Somewhat balanced trajectories. These trajectories have
intermediate imbalance and reci-
22. procity. They are somewhat jagged and cross the x-axis.
• Well balanced trajectories. These trajectories have low
imbalance and high reciprocity.
They are quite jagged and centered on the x-axis.
Looking at the prevalence of these four types of trajectories for
bots and humans and across
languages, we confirm the previous observations: bot-bot
interactions occur at a slower rate
and are more balanced, in the sense that reverts go back and
forth between the two bots (Fig
4). Further, we find that bot-bot interactions are more balanced
in smaller language editions of
Wikipedia. This could be due to the fact that bots are more
active in smaller editions and
hence, interactions between them are more likely to occur. Less
intuitively, however, this
observation also suggests that conflict between bots is more
likely to occur when there are
fewer bots and when, common sense would suggest,
coordination is easier.
Discussion
Our results show that, although in quantitatively different ways,
bots on Wikipedia behave and
23. interact as unpredictably and as inefficiently as the humans . The
disagreements likely arise
from the bottom-up organization of the community, whereby
human editors individually
create and run bots, without a formal mechanism for
coordination with other bot owners.
Fig 4. The prevalence of the four types of trajectories for bots
and humans and for different language editions of
Wikipedia. The darker the shading of the cell, the higher the
proportion for that type of trajectory for the language. Bot-bot
interactions occur at a slower rate and are more balanced, in the
sense that reverts go back and forth between the two bots.
Further, bot-bot interactions are more balanced in smaller
language editions of Wikipedia.
doi:10.1371/journal.pone.0171774.g004
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone. 0171774 February 23,
2017 7 / 13
Delving deeper into the data, we found that most of the
disagreement occurs between bots that
specialize in creating and modifying links between different
language editions of the encyclo-
24. pedia. The lack of coordination may be due to different
language editions having slightly dif-
ferent naming rules and conventions.
In support of this argument, we also found that the same bots
are responsible for the major-
ity of reverts in all the language editions we study. For
example, some of the bots that revert
the most other bots include Xqbot, EmausBot, SieBot, and
VolkovBot, all bots specializing in
fixing inter-wiki links. Further, while there are few articles with
many bot-bot reverts (S7 Fig),
these articles tend to be the same across languages. For
example, some of the articles most con-
tested by bots are about Pervez Musharraf (former president of
Pakistan), Uzbekistan, Estonia,
Belarus, Arabic language, Niels Bohr, Arnold Schwarzenegger.
This would suggest that a sig-
nificant portion of bot-bot fighting occurs across languages
rather than within. In contrast, the
articles with most human-human reverts tend to concern local
personalities and entities and
tend to be unique for each language [26].
Our data cover a period of the evolution of Wikipedia when bot
activity was growing. Evi-
25. dence suggests that this period suddenly ended in 2013
(http://stats.wikimedia.org/EN/
PlotsPngEditHistoryTop.htm). This decline occurred because at
the beginning of 2013 many
language editions of Wikipedia started to provide inter-language
links via Wikidata, which is a
collaboratively edited knowledge base intended to support
Wikipedia. Since our results were
largely dictated by inter-language bots, we believe that the
conflict we observed on Wikipedia
no longer occurs today. One interesting direction for future
research is to investigate whether
the conflict continues to persist among the inter-language bots
that migrated to Wikidata.
Wikipedia is perhaps one of the best examples of a populous
and complex bot ecosystem
but this does not necessarily make it representative. As Table 1
demonstrates, we have investi-
gated a very small region of the botosphere on the Internet. The
Wikipedia bot ecosystem is
gated and monitored and this is clearly not the case for systems
of malevolent social bots, such
as social bots on Twitter posing as humans to spread political
propaganda or influence public
26. discourse. Unlike the benevolent but conflicting bots of
Wikipedia, many malevolent bots are
collaborative, often coordinating their behavior as part of
botnets [27]. However, before being
able to study the social interactions of these bots, we first need
to learn to identify them [28].
Our analysis shows that a system of simple bots may produce
complex dynamics and unin-
tended consequences. In the case of Wikipedia, we see that
benevolent bots that are designed
to collaborate may end up in continuous disagreement. This is
both inefficient as a waste of
resources, and inefficacious, for it may lead to local impasse.
Although such disagreements
represent a small proportion of the bots’ editorial activity, they
nevertheless bring attention to
the complexity of designing artificially intelligent agents. Part
of the complexity stems from
the common field of interaction—bots on the Internet, and in
the world at large, do not act in
isolation, and interaction is inevitable, whether designed for or
not. Part of the complexity
stems from the fact that there is a human designer behind every
bot, as well as behind the envi-
27. ronment in which bots operate, and that human artifacts embody
human culture. As bots con-
tinue to proliferate and become more sophisticated, social
scientist will need to devote more
attention to understanding their culture and social life.
Materials and methods
Data
Wikipedia is an ecosystem of bots. Some of the bots are
“editing bots”, that work on the arti-
cles. They undo vandalism, enforce bans, check spelling, create
inter-language links, import
Even good bots fight
PLOS ONE | DOI:10.1371/journal.pone.0171774 February 23,
2017 8 / 13
http://stats.wikimedia.org/EN/PlotsPngEditHistoryTop.htm
http://stats.wikimedia.org/EN/PlotsPngEditHistoryTop.htm
content automatically, etc. Other bots are non-editing: these
bots mine data, identify vandal-
ism, or identify copyright violations.
In addition to bots, there are also certain automated services
that editors use to streamline
28. their work. For example, there are automated tools such Huggle
and STiki, which produce a
filtered set of edits to review in a live queue. Using these tools,
editors can instantly revert the
edit in question with a single click and advance to the next one.
There are also user interface
extensions and in-browser functions such as Twinkle, rollback,
and undo, which also allow
editors to revert with a single click. Another automated service
that is relatively recent and
much more sophisticated is the Objective Revision Evaluation
Service (ORES). It uses
machine-learning techniques to rank edits with the ultimate goal
to identify vandals or low-
quality contributions.
Our research focuses on editing bots. Our data contain who
reverts whom, when, and in
what article. To obtain this information, we analyzed the
Wikipedia XML Dumps (https://
dumps.wikimedia.org/mirrors.html) of 13 different language
editions. To detect restored ver-
sions of an article, a hash was calculated for the complete
article text following each revision
and the hashes were compared between revisions [23]. The data
29. cover the period from the
beginning of Wikipedia (January 15, 2001) until February 2,
2010 –October 31, 2011, the last
date depending on when the data was collected for the particular
language edition. This time
period captures the “first generation” of Wikipedia bots, as in
later years, Wikidata took over
some of the tasks previously controlled by Wikipedia. The
sample of languages covers a wide
range of Wikipedia editions in terms of size; for example, it
includes the four largest editions
by number of edits and number of editors. In terms of cultural
diversity, the sample covers a
wide range of geographies.
Wikipedia requires that human editors create separate accounts
for bots and that the bot
account names clearly indicate the user is a bot, usually by
including the word “bot” (https://
en.wikipedia.org/wiki/Wikipedia:Bot_policy). Hence, to
identify the bots, we selected all
account names that contain different spelling variations of the
word “bot.” We supplemented
this set with all accounts that have currently active bot status in
the Wikipedia database but
30. that may not fit the above criterion (using
https://en.wikipedia.org/wiki/Wikipedia:Bots/Status
as of August 6, 2015). We thus obtained a list of 6,627 …