SlideShare a Scribd company logo
2023 ASIS&T
WEBINAR SERIES
MARCH 30, 2023
“ CRITICAL DATA MODELING (DCMI)”
w e b i n a r s @ a s i s t . o r g
CRITICAL DATA MODELING
Karen Wickett
School of Information Sciences
University of Illinois Urbana-
Champaign
ASIST/DCMI Webinar
March 30, 2023
2
CRITICAL
DATA
MODELING
 Using data modeling and systems analysis
techniques to closely examine the creation
and implementation of information systems
 to expose unjust or biased assumptions in data
models or algorithms
 to highlight the technical roles of those
assumptions within a system
 Exposing and examining these
assumptions in the language of the
technical systems in which they are
embedded will validate and expand
existing critiques and enable the
development of more equitable information
systems.
 Wickett, K. M. (2023). Critical data
modeling and the basic representation
model. Journal of the Association for
Information Science and Technology, 1– 11.
https://doi.org/10.1002/asi.24745
3
WHY WE
NEED
CRITICAL
DATA
MODELING
 Digital platforms are pervasive and the
information representation decisions that
structure those systems play out in the
lives of our communities.
 In Race After Technology (2019), Ruha
Benjamin shows how information systems
have created an insidious system of
oppression obfuscated by the technical
nature of the systems involved.
 The complex relationships and layers of
encodings involved in the realization of any
digital object are an additional obfuscating
factor for the analysis of modern
information objects and systems.
4
DATA
MODELING
 A data model is a set of labels for
categories, and a set of assumptions about
how those categories will be handled in a
computational system.
 Every information system uses data models
to structure data and to specify processing.
 Data modeling necessarily reduces real-
world entities into the set of attributes
defined by a data model.
 Data modeling therefore takes a position
on what matters about those entities by
elevating some aspects and leaving others
out.
5
THE BASIC
REPRESENTAT
ION MODEL
A general model for
information representation
and encoding in digital
objects.
An organizing framework for
critical readings of datasets
and systems
 Naming the entities and
relationships involved at
any level of representation
or encoding
 Highlighting the
interconnections between
information representation
choices at the various
levels.
6
THE BASIC
REPRESENTAT
ION MODEL
Expressions and encodings in various
forms convey propositional content to
some audience.
 The content of a class roster could
be expressed as a table of data, an
XML document, or a series of
sentences in natural language
Symbol structures express semantic
content in some context or encode
other symbol structures within a
computational system.
 layers of encoding and
representation in a digital system are
by a series of is Encoded By
relationships between Symbol
Structures.
We are material beings in a material
world, we encounter information via
patterned matter or energy that carries
the inscription of symbol structures
7
MODELING A
POLICE
ARREST
RECORD
DATASET
Examples from an ongoing
critical reading of the
“Arrest Data from 2020 to
Present” dataset published
through the Los Angeles
Open Data platform.
Close readings of the
dataset versions and data
model documentation.
 Metadata for the entire
dataset and a table that
describes each of the 25
columns of data provided in
the dataset.
 Structured queries designed
around reading the metadata.
8
COUNTING ROWS
AS CRIMES
Arrests are the primary entity in
the dataset.
There is an assumed
correspondence between a row in
the dataset and a criminal
incident.
Location information in the
dataset reflects location of a
criminal incident associated with
an arrest, not the location where
the arrest occurred.
9
COUNTING
ROWS AS
CRIMES
Some rows do not correspond to
suspected criminal activity of the
person described by that row.
Filtering the dataset for the value
“PARENT IN CUSTODY, NO
CARETAKER AVAILABLE” in Charge
Description gives 99 rows, all with
Age values between 0 and 17.
 These rows represent children
taken into custody by the LAPD
when one or both of their
parents were arrested.
10
COUNTING
ROWS AS
CRIMES
Rows for children in the
Arrest Dataset have a
tendency for sparseness but
still have location
information.
 66 of the 98 rows with Age
of 0 have no Charge
Description listed
 Only 2 of the 98 rows with
Age of 0 have location as
(0,0), which indicates
missing data
 96 rows list a latitude and
longitude for location
11
ATTRIBUTES
FOREGROUND
LOCATION
10 of the 25 available
attributes offer information
about geographic location, at
varying levels of granularity
 Area ID, Area Name, Reporting
District, Address, Cross Street, LAT,
LON, Location, Booking Location,
Booking Location Code.
12
EXPORT FORMATS
FOREGROUND
LOCATION
There are three main formats for
downloading the Arrest Dataset:
 CSV, KML, and Shapefile.
 KML and Shapefile are both geographic
data formats
The dataset is positioned as geographic
information.
Criminal justice systems transform
information into geographic information.
This has a significant impact on how we
understand places and people in our
communities (Jefferson, 2020).
13
DATATYPE OVER
ACCURACY - TIME
Arrest Date and Booking Date use the
Floating Timestamp datatype.
To conform with the datatype, values for
this attribute must include a time, not just
a date.
Every time value listed for Arrest Date and
Booking Date is “12:00:00 AM”
Other attributes give times with a
distribution of values that suggest that
they are accurate transcriptions from the
original arrest record
 Time corresponds with Arrest Date
 Booking Time corresponds with Booking
Date 14
DATATYPE OVER
ACCURACY -
LOCATION
The dataset summary states, “Some
location fields with missing data are noted
as (0.0000°, 0.0000°).” But this is an actual
location.
This point appears in 4640 number of
rows in the dataset.
Every row in the dataset has a value for
Location that matches the Point datatype,
even in rows that were missing location
data in the original arrest record.
Maintaining conformance with the
datatype has taken precedence over
accuracy of the data.
 Awareness of levels of representation and
interactions between lets us analyze these
cases 15
CONCLUSI
ONS
Information science is called as a field to
examine the ways in which social injustices
are built into our information systems
through data models.
Critical data modeling is a method for
analyzing data models and existing data
objects in order to examine the
sociotechnical commitments, underlying
assumptions, and social and cultural
consequences of information systems.
The Basic Representation Model provides a
logical framework for a critical interrogation
of an information object.
16
THANK YOU FOR
ATTENDING
A c o p y o f t h e r e c o r d i n g a n d a
f o l l o w - u p s u r v e y w i l l b e e m a i l e d
w i t h i n 2 4 h o u r s .
S u b m i t a w e b i n a r p r o p o s a l a t
h t t p s : / / w w w. a s i s t . o r g / m e e t i n g s -
e v e n t s / w e b i n a r s /
w e b i n a r s @ a s i s t . o r g

More Related Content

Similar to slides_critical-data-modeling.pptx

Data Coordinator Guidebook
Data Coordinator GuidebookData Coordinator Guidebook
Data Coordinator Guidebook
Jacqueline J. Dearborn
 
Open Government Data on the Web - A Semantic Approach
Open Government Data on the Web - A Semantic ApproachOpen Government Data on the Web - A Semantic Approach
Open Government Data on the Web - A Semantic Approach
Peter Krantz
 
Fairness in Machine Learning
Fairness in Machine LearningFairness in Machine Learning
Fairness in Machine Learning
Delip Rao
 
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Alejandro Arizpe, MBA, MSc IT, PMP
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
eraser Juan José Calderón
 
Data literacy
Data literacyData literacy
Data literacy
Jayanta Nayek
 
Knowledge Graphs and their central role in big data processing: Past, Present...
Knowledge Graphs and their central role in big data processing: Past, Present...Knowledge Graphs and their central role in big data processing: Past, Present...
Knowledge Graphs and their central role in big data processing: Past, Present...
Amit Sheth
 
Neo4j - Responsible AI
Neo4j - Responsible AINeo4j - Responsible AI
Neo4j - Responsible AI
Neo4j
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
Lilminow
 
Big Data Challenges and Trust Management at CTS -2016
Big Data Challenges and Trust Management at CTS -2016Big Data Challenges and Trust Management at CTS -2016
Big Data Challenges and Trust Management at CTS -2016
Artificial Intelligence Institute at UofSC
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data Driven Innovation
 
organic information design
organic information designorganic information design
organic information design
rosa qin
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
eraser Juan José Calderón
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
Andry Alamsyah
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
drennanmicah
 
Criminal and Civil Identification with DNA Databases Using Bayesian Networks
Criminal and Civil Identification with DNA Databases Using Bayesian NetworksCriminal and Civil Identification with DNA Databases Using Bayesian Networks
Criminal and Civil Identification with DNA Databases Using Bayesian Networks
CSCJournals
 
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Amit Sheth
 
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Artificial Intelligence Institute at UofSC
 
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
Istituto nazionale di statistica
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
Duke Network Analysis Center
 

Similar to slides_critical-data-modeling.pptx (20)

Data Coordinator Guidebook
Data Coordinator GuidebookData Coordinator Guidebook
Data Coordinator Guidebook
 
Open Government Data on the Web - A Semantic Approach
Open Government Data on the Web - A Semantic ApproachOpen Government Data on the Web - A Semantic Approach
Open Government Data on the Web - A Semantic Approach
 
Fairness in Machine Learning
Fairness in Machine LearningFairness in Machine Learning
Fairness in Machine Learning
 
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
Alejandro Arizpe - Artificial Intelligence, Machine Learning, and Databases i...
 
What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin What Data Can Do: A Typology of Mechanisms . Angèle Christin
What Data Can Do: A Typology of Mechanisms . Angèle Christin
 
Data literacy
Data literacyData literacy
Data literacy
 
Knowledge Graphs and their central role in big data processing: Past, Present...
Knowledge Graphs and their central role in big data processing: Past, Present...Knowledge Graphs and their central role in big data processing: Past, Present...
Knowledge Graphs and their central role in big data processing: Past, Present...
 
Neo4j - Responsible AI
Neo4j - Responsible AINeo4j - Responsible AI
Neo4j - Responsible AI
 
Back to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV securityBack to Basics - Firmware in NFV security
Back to Basics - Firmware in NFV security
 
Big Data Challenges and Trust Management at CTS -2016
Big Data Challenges and Trust Management at CTS -2016Big Data Challenges and Trust Management at CTS -2016
Big Data Challenges and Trust Management at CTS -2016
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
 
organic information design
organic information designorganic information design
organic information design
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx150 words agree or disagreeThis week we discussed data mining an.docx
150 words agree or disagreeThis week we discussed data mining an.docx
 
Criminal and Civil Identification with DNA Databases Using Bayesian Networks
Criminal and Civil Identification with DNA Databases Using Bayesian NetworksCriminal and Civil Identification with DNA Databases Using Bayesian Networks
Criminal and Civil Identification with DNA Databases Using Bayesian Networks
 
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
 
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...Semantics of the Black-Box: Using knowledge-infused learning approach to make...
Semantics of the Black-Box: Using knowledge-infused learning approach to make...
 
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
Session III Census and registers - M. Scannapieco,The Italian Integrated Syst...
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 

Recently uploaded

Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
eddie19851
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 

Recently uploaded (20)

Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 
Nanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdfNanandann Nilekani's ppt On India's .pdf
Nanandann Nilekani's ppt On India's .pdf
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 

slides_critical-data-modeling.pptx

  • 1. 2023 ASIS&T WEBINAR SERIES MARCH 30, 2023 “ CRITICAL DATA MODELING (DCMI)” w e b i n a r s @ a s i s t . o r g
  • 2. CRITICAL DATA MODELING Karen Wickett School of Information Sciences University of Illinois Urbana- Champaign ASIST/DCMI Webinar March 30, 2023 2
  • 3. CRITICAL DATA MODELING  Using data modeling and systems analysis techniques to closely examine the creation and implementation of information systems  to expose unjust or biased assumptions in data models or algorithms  to highlight the technical roles of those assumptions within a system  Exposing and examining these assumptions in the language of the technical systems in which they are embedded will validate and expand existing critiques and enable the development of more equitable information systems.  Wickett, K. M. (2023). Critical data modeling and the basic representation model. Journal of the Association for Information Science and Technology, 1– 11. https://doi.org/10.1002/asi.24745 3
  • 4. WHY WE NEED CRITICAL DATA MODELING  Digital platforms are pervasive and the information representation decisions that structure those systems play out in the lives of our communities.  In Race After Technology (2019), Ruha Benjamin shows how information systems have created an insidious system of oppression obfuscated by the technical nature of the systems involved.  The complex relationships and layers of encodings involved in the realization of any digital object are an additional obfuscating factor for the analysis of modern information objects and systems. 4
  • 5. DATA MODELING  A data model is a set of labels for categories, and a set of assumptions about how those categories will be handled in a computational system.  Every information system uses data models to structure data and to specify processing.  Data modeling necessarily reduces real- world entities into the set of attributes defined by a data model.  Data modeling therefore takes a position on what matters about those entities by elevating some aspects and leaving others out. 5
  • 6. THE BASIC REPRESENTAT ION MODEL A general model for information representation and encoding in digital objects. An organizing framework for critical readings of datasets and systems  Naming the entities and relationships involved at any level of representation or encoding  Highlighting the interconnections between information representation choices at the various levels. 6
  • 7. THE BASIC REPRESENTAT ION MODEL Expressions and encodings in various forms convey propositional content to some audience.  The content of a class roster could be expressed as a table of data, an XML document, or a series of sentences in natural language Symbol structures express semantic content in some context or encode other symbol structures within a computational system.  layers of encoding and representation in a digital system are by a series of is Encoded By relationships between Symbol Structures. We are material beings in a material world, we encounter information via patterned matter or energy that carries the inscription of symbol structures 7
  • 8. MODELING A POLICE ARREST RECORD DATASET Examples from an ongoing critical reading of the “Arrest Data from 2020 to Present” dataset published through the Los Angeles Open Data platform. Close readings of the dataset versions and data model documentation.  Metadata for the entire dataset and a table that describes each of the 25 columns of data provided in the dataset.  Structured queries designed around reading the metadata. 8
  • 9. COUNTING ROWS AS CRIMES Arrests are the primary entity in the dataset. There is an assumed correspondence between a row in the dataset and a criminal incident. Location information in the dataset reflects location of a criminal incident associated with an arrest, not the location where the arrest occurred. 9
  • 10. COUNTING ROWS AS CRIMES Some rows do not correspond to suspected criminal activity of the person described by that row. Filtering the dataset for the value “PARENT IN CUSTODY, NO CARETAKER AVAILABLE” in Charge Description gives 99 rows, all with Age values between 0 and 17.  These rows represent children taken into custody by the LAPD when one or both of their parents were arrested. 10
  • 11. COUNTING ROWS AS CRIMES Rows for children in the Arrest Dataset have a tendency for sparseness but still have location information.  66 of the 98 rows with Age of 0 have no Charge Description listed  Only 2 of the 98 rows with Age of 0 have location as (0,0), which indicates missing data  96 rows list a latitude and longitude for location 11
  • 12. ATTRIBUTES FOREGROUND LOCATION 10 of the 25 available attributes offer information about geographic location, at varying levels of granularity  Area ID, Area Name, Reporting District, Address, Cross Street, LAT, LON, Location, Booking Location, Booking Location Code. 12
  • 13. EXPORT FORMATS FOREGROUND LOCATION There are three main formats for downloading the Arrest Dataset:  CSV, KML, and Shapefile.  KML and Shapefile are both geographic data formats The dataset is positioned as geographic information. Criminal justice systems transform information into geographic information. This has a significant impact on how we understand places and people in our communities (Jefferson, 2020). 13
  • 14. DATATYPE OVER ACCURACY - TIME Arrest Date and Booking Date use the Floating Timestamp datatype. To conform with the datatype, values for this attribute must include a time, not just a date. Every time value listed for Arrest Date and Booking Date is “12:00:00 AM” Other attributes give times with a distribution of values that suggest that they are accurate transcriptions from the original arrest record  Time corresponds with Arrest Date  Booking Time corresponds with Booking Date 14
  • 15. DATATYPE OVER ACCURACY - LOCATION The dataset summary states, “Some location fields with missing data are noted as (0.0000°, 0.0000°).” But this is an actual location. This point appears in 4640 number of rows in the dataset. Every row in the dataset has a value for Location that matches the Point datatype, even in rows that were missing location data in the original arrest record. Maintaining conformance with the datatype has taken precedence over accuracy of the data.  Awareness of levels of representation and interactions between lets us analyze these cases 15
  • 16. CONCLUSI ONS Information science is called as a field to examine the ways in which social injustices are built into our information systems through data models. Critical data modeling is a method for analyzing data models and existing data objects in order to examine the sociotechnical commitments, underlying assumptions, and social and cultural consequences of information systems. The Basic Representation Model provides a logical framework for a critical interrogation of an information object. 16
  • 17. THANK YOU FOR ATTENDING A c o p y o f t h e r e c o r d i n g a n d a f o l l o w - u p s u r v e y w i l l b e e m a i l e d w i t h i n 2 4 h o u r s . S u b m i t a w e b i n a r p r o p o s a l a t h t t p s : / / w w w. a s i s t . o r g / m e e t i n g s - e v e n t s / w e b i n a r s / w e b i n a r s @ a s i s t . o r g