By authors Les Gasser1,2
gasser@uiuc.edu
Gabriel Ripoche1, 3
gripoche@uiuc.edu
Walt Scacchi2
wscacchi@ics.uci.edu
Bryan Penne1
bpenne@uiuc.edu
Abstract
Open Source Software (OSS) is in regular widespread use supporting critical
applications and infrastructure, including the Internet and World Wide Web themselves. The communities of OSS users and developers are often interwoven. The deep engagement of users and developers, coupled with the openness of systems lead to community-based system design and re-design activities that are continuous. Continuous redesign is facilitated by communication and knowledge-
sharing infrastructures such as persistent chat rooms, newsgroups, issue-
reporting/tracking repositories, sharable design representations and many kinds of
"software informalisms." These tools are arenas for managing the extensive, varied,
multimedia community knowledge that forms the foundation and the substance of
system requirements. Active community-based design processes and knowledge repositories create new ways of learning about, representing, and defining systems that challenge current models of representation and design. This paper presents several aspects of our research into continuous, open, community-based design
practices. We discuss several new insights into how communities represent
knowledge and capture requirements that derive from our qualitative empirical
studies of large (ca. 2GB+) repositories of problem-report data, primarily from the
Mozilla project.
Summary of ICSE 2011 Panel on "What Industry wants from Research". This is a summary of all the presentations from that panel that I presented in an invited talk at the CSER meeting in Toronto, November, 2011.
The document proposes a methodology for using social network analysis to better understand human behaviors and elicit software requirements for online social networks. It begins with background on online social networks and their failures. It then outlines a novel methodology involving collecting real-world social network data through questionnaires, analyzing the network's structural characteristics like centrality measures, and examining how friendship strength and everyday habits are associated. The case study found unexpected centrality results and demonstrated how social network analysis can provide insights for improved software requirement elicitation.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
This doctoral research explores how users make sense of and use information when seeking information from web-based resources. The research examines user behaviors and strategies as they interact with information sources to identify examples of how users collect, evaluate, understand, interpret, and integrate new information. Three empirical studies were conducted involving participants completing information seeking tasks. The results provide insights into users' information interaction strategies and sensemaking activities. Implications for the design of technologies to better support sensemaking are discussed.
Mining Development Repositories to Study the Impact of Collaboration on Softw...Nicolas Bettenburg
This document proposes an approach to study the impact of collaboration on software systems through mining development repositories. The approach involves:
I. Extracting communication data such as source code comments, emails, and issue discussions from version control systems, mailing lists, and issue tracking systems.
II. Studying the impact of collaboration on software quality by computing social metrics from the extracted communication data and measuring their relationship to post-release defects.
III. Studying the impact of collaboration on the development community by analyzing data on how code contributions are managed, such as feedback and reviews, to understand how contributors, reviewers, and the software are affected by communication.
The document discusses designing learning environments using social software. It defines social software as web applications that support content, identity, and relationship management through user participation and interaction. The document then presents two perspectives on learning with social software: 1) how social software influences learners based on survey data showing near-ubiquitous usage among youth, and 2) how social software offers potential for designing new learning environments. It analyzes traditional research paradigms and proposes a new approach that generates both practical solutions and new theory by simultaneously developing a learning environment and conducting research.
2000 - CSCW - Conversation Trees and Threaded ChatsMarc Smith
The document discusses issues with traditional chat interfaces and proposes an alternative called Threaded Chat. Traditional chat ruptures connections between turns and replies by displaying messages in order of arrival rather than conversational order. Threaded Chat aims to address this by structuring messages as threaded responses like online forums, though designed for synchronous use. A study found Threaded Chat allowed equally effective but possibly more efficient discussions than traditional chat.
Summary of ICSE 2011 Panel on "What Industry wants from Research". This is a summary of all the presentations from that panel that I presented in an invited talk at the CSER meeting in Toronto, November, 2011.
The document proposes a methodology for using social network analysis to better understand human behaviors and elicit software requirements for online social networks. It begins with background on online social networks and their failures. It then outlines a novel methodology involving collecting real-world social network data through questionnaires, analyzing the network's structural characteristics like centrality measures, and examining how friendship strength and everyday habits are associated. The case study found unexpected centrality results and demonstrated how social network analysis can provide insights for improved software requirement elicitation.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
With the rapid growth of users in social networking services, data is generated in thousands of terabytes
every day. Practical frameworks for data extraction from social networking sites have not been well
investigated yet. In this paper, a methodology for data extraction with respect to Sina Weibo is discussed.
In order to design a proper method for data extraction, the properties of complex networks and the
challenges when extracting data from complex networks are discussed first. Then, the reason for choosing
Sina Weibo as the data source is given. After that, the methods for data gathering are introduced and the
techniques for data sampling and data clean-up are discussed. Over 1 million users and hundreds of
millions of social relations between them were extracted from Sina Weibo using the methods proposed in
this paper.
This doctoral research explores how users make sense of and use information when seeking information from web-based resources. The research examines user behaviors and strategies as they interact with information sources to identify examples of how users collect, evaluate, understand, interpret, and integrate new information. Three empirical studies were conducted involving participants completing information seeking tasks. The results provide insights into users' information interaction strategies and sensemaking activities. Implications for the design of technologies to better support sensemaking are discussed.
Mining Development Repositories to Study the Impact of Collaboration on Softw...Nicolas Bettenburg
This document proposes an approach to study the impact of collaboration on software systems through mining development repositories. The approach involves:
I. Extracting communication data such as source code comments, emails, and issue discussions from version control systems, mailing lists, and issue tracking systems.
II. Studying the impact of collaboration on software quality by computing social metrics from the extracted communication data and measuring their relationship to post-release defects.
III. Studying the impact of collaboration on the development community by analyzing data on how code contributions are managed, such as feedback and reviews, to understand how contributors, reviewers, and the software are affected by communication.
The document discusses designing learning environments using social software. It defines social software as web applications that support content, identity, and relationship management through user participation and interaction. The document then presents two perspectives on learning with social software: 1) how social software influences learners based on survey data showing near-ubiquitous usage among youth, and 2) how social software offers potential for designing new learning environments. It analyzes traditional research paradigms and proposes a new approach that generates both practical solutions and new theory by simultaneously developing a learning environment and conducting research.
2000 - CSCW - Conversation Trees and Threaded ChatsMarc Smith
The document discusses issues with traditional chat interfaces and proposes an alternative called Threaded Chat. Traditional chat ruptures connections between turns and replies by displaying messages in order of arrival rather than conversational order. Threaded Chat aims to address this by structuring messages as threaded responses like online forums, though designed for synchronous use. A study found Threaded Chat allowed equally effective but possibly more efficient discussions than traditional chat.
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
(Abstract and video links below)
ACM SIGSOFT Webinar May 4th, 2016
Distinguished lecture at ISR, UCI, April 2016.
UCI Video is available at: https://www.youtube.com/watch?v=Ujm4G7ayRQQ
Webinar link will be available shortly.
This talk is based on a short chapter to appear in a forthcoming book on "Perspectives on Data Science for Software Engineering", it can be preordered here:
http://goo.gl/Wi30Ra
Abstract:
Software analytics and the use of computational methods on "big" data in software engineering is transforming the ways software is developed, used, improved and deployed. Software engineering researchers and practitioners are witnessing an increasing trend in the availability of diverse trace and operational data and the methods to analyze it. This information is being used to paint a picture of how software is engineered and suggest ways it may be improved. But we have to remember that software engineering is inherently a socio-technical endeavour, with complex practices, activities and cultural aspects that cannot be externalized or captured by tools alone---in fact, they may be perturbed when trace data is surfaced and analyzed in a transparent manner.
In this talk, I will ask:
- Are researchers and practitioners adequately considering the unanticipated impacts that software analytics can have on software engineering processes and stakeholders?
- Are there important questions that are not being asked because the answers do not lie in the data that are readily available?
- Can we improve the application of software analytics using other methods that collect insights directly from participants in software engineering (e.g., through observations)?
I will explore these questions through specific examples. I hope to engage the audience in discussing how software analytics that depend on "big data" from tools, as well as methods that collect "thick" data from participants, can be mutually beneficial in improving software engineering research and practice.
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Margaret-Anne Storey
Audio+slide video is posted at http://margaretannestorey.wordpress.com.
Slides from a Keynote at Mining Software Repository Conference 2012, co-located with ICSE 2012 in Zurich, Switzerland.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
The document provides an overview and comparison of various social network analysis software platforms. It groups the tools into three categories: advanced/academic tools suited for complex analysis, accessible but advanced tools for general use with some advanced features, and simple easy-to-use tools. For each category it briefly profiles several representative tools, outlining their primary uses, environments, costs, and pros and cons.
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
This document discusses social computing, including its theoretical underpinnings, infrastructure, applications, and research issues. Social computing is a new paradigm that facilitates collaboration and social interactions using computing technology. It draws from fields like social informatics, human computer interaction, and social and psychological theories. Major application areas include online communities, intelligent interactive entertainment, and business/public sector systems. Key research issues involve representing social information and knowledge, modeling social behavior at individual and group levels, and analyzing and predicting social systems. Agent-based modeling and simulation are important approaches used in social computing.
Detecting fake news_with_weak_social_supervisionSuresh S
This document discusses using weak social supervision for detecting fake news on social media. It defines weak supervision and describes how social media data provides a new type of weak supervision called weak social supervision. Weak social supervision can be generated from three aspects of social media - users, posts, and networks. Recent works have shown that user-based, post-based, and network-based weak social supervision can be effective for fake news detection, even with limited labeled data. Weak social supervision is a promising approach for learning tasks where labeled data is scarce.
2009-C&T-NodeXL and social queries - a social media network analysis toolkitMarc Smith
This document introduces NodeXL, a network analysis toolkit implemented as an Excel add-in. NodeXL allows users to import social network data, calculate network metrics, and generate network graphs and visualizations within Excel. The document outlines NodeXL's key features, including importing data from sources like email and Twitter, calculating metrics like degree and centrality, and generating customizable node-link diagrams. It also discusses related work and provides an example analysis workflow using NodeXL to analyze an enterprise social network, revealing patterns in employee connections. NodeXL aims to make network analysis accessible to novice and expert users through a familiar spreadsheet interface.
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
This document proposes a framework for modeling and analyzing influence diffusion in multiplex online social networks (OSNs). It introduces coupling plans to represent how data spreads across overlapping users in multiple OSNs. Specifically, it proposes both lossless and lossy coupling plans to map multiple networks into a single network. Extensive tests on real and synthetic datasets show the coupling plans can effectively identify influential users by considering their roles across multiple OSNs. The framework provides insights into influence propagation in multiplex networks and can solve the minimum cost influence problem by exploiting algorithms for single networks.
The document describes a tool called the "Profanity Statistical Analyzer" that was developed to analyze webpages, social media posts, and blogs to detect and quantify the amount of profane or abusive language. The tool works by taking in content, tokenizing it, comparing the tokens to a dataset of abusive words, and reporting the results both as a percentage of abusive words and by highlighting which actual words were detected. The tool is meant to help users determine whether certain online content is appropriate for them to view by automatically analyzing the language used.
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
The document discusses detection and minimization of the influence of rumors on social networks. It proposes a model called DRIMUX (Dynamic Rumor Influence Minimization with User Experience) that aims to reduce the influence of a rumor by blocking a set of nodes in the network. A dynamic Ising propagation model is used that considers both global rumor characteristics and individual user tendencies. Additionally, the model incorporates a constraint on interference time to maintain user experience utility - nodes are only blocked for a tolerance time threshold to avoid decreasing the overall network utility. Algorithms based on survival theory and maximum probability principles are developed to formulate the problem and provide solutions.
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...Jacob Mack
The document discusses privacy and security issues with recommender systems as they become more contextual and utilize deep learning techniques. It proposes that as recommender systems are able to analyze more user data through cloud computing, there are increased risks of privacy breaches and data hacking. The researchers conducted a survey that found professionals have significant concerns about emerging technologies, privacy/security of recommender systems, and mobile device security. They propose further research into cryptographic methods like homomorphic encryption that could help secure user data processed by recommender systems.
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFACE
This document summarizes research on revisiting photo-based social authentication. The researchers:
1) Demonstrate a new attack on social authentication that matches photos from challenges to a collection of the victim's photos, which is more effective than face recognition attacks.
2) Conduct a user study showing people can identify friends in photos with unrecognizable faces over 99% of the time, whereas software fails.
3) Design a new social authentication system that selects "medium" photos software cannot recognize but people can, and transforms photos via overlays and perspective changes to block matching attacks while retaining human usability, passing 94.38% of challenges in a preliminary study.
This document summarizes a PhD research project exploring how online social media is used to support local governance. It describes a case study of a small community that uses online discussion forums to discuss local issues. Analysis identified five patterns of "governance conversation" including sharing information, providing feedback, coordinating responses, informally mediating issues, and engaging in discussion of complex problems. While no binding decisions were made online, the discussions supported governance action. The research examines how online tools can both facilitate instrumental problem-solving and support expressive deliberation that accommodates pluralism in local governance.
This document outlines a study on using deep learning models to detect cyberbullying across multiple social media platforms. It introduces cyberbullying as a problem affecting 10-40% of internet users and notes past work has focused on single platforms or topics. The study targets three social networks, three cyberbullying topics (personal attacks, racism, and sexism), and compares traditional machine learning models to deep neural networks including CNNs, LSTMs, and BLSTMs with attention. Experiments show BLSTMs with attention improve F1 scores for imbalanced datasets and are effective at cyberbullying detection across platforms and topics without feature engineering.
Week 2 of the Data Science course covers discussions on big data and statistical sampling, required reading from introductory data science and machine learning texts, and an assignment to visually describe the Haberman dataset in R. The roadmap provides guidance on discussions, recommended reading, optional activities, and instructions for submitting the visual assignment by the deadline. It also previews upcoming weeks focusing on machine learning, data visualization, and data ethics.
Data Cleaning for social media knowledge extractionMarco Brambilla
Social media platforms let users share their opinions through textual or multimedia content. In many settings, this becomes a valuable source of knowledge that can be exploited for specific business objectives. Brands and companies often ask to monitor social media as sources for understanding the stance, opinion, and sentiment of their customers, audience and potential audience. This is crucial for them because it let them understand the trends and future commercial and marketing opportunities.
However, all this relies on a solid and reliable data collection phase, that grants that all the analyses, extractions and predictions are applied on clean, solid and focused data. Indeed, the typical topic-based collection of social media content performed through keyword-based search typically entails very noisy results.
We recently implemented a simple study aiming at cleaning the data collected from social content, within specific domains or related to given topics of interest. We propose a basic method for data cleaning and removal of off-topic content based on supervised machine learning techniques, i.e. classification, over data collected from social media platforms based on keywords regarding a specific topic. We define a general method for this and then we validate it through an experiment of data extraction from Twitter, with respect to a set of famous cultural institutions in Italy, including theaters, museums, and other venues.
For this case, we collaborated with domain experts to label the dataset, and then we evaluated and compared the performance of classifiers that are trained with different feature extraction strategies.
Presenter: Betsey Merkel, The Institute for Open Economic Networks (I-Open) at the COINs-collaborative innovation networks Conference 2010, hosted by the Savannah College of Art & Design in Savannah, Georgia USA on October 7-9, 2010.
Title: Contextual Transmedia Communications: Content and Creativity in Complexity
Presenter: Betsey Merkel, The Institute for Open Economic Networks (I-Open) at the COINs-collaborative innovation networks Conference 2010, hosted by the Savannah College of Art & Design in Savannah, Georgia USA on October 7-9, 2010.
From the Abstract and a Presentation Overview: The human race is faced with engaging in exponential levels of complexity resulting from expanding populations, limited natural resources, and maturating cycles of the World Wide Web. Habits of capacity building - that of inventory, meaning, and experimentation -- remain at levels suited to an industrial age of linear scarcity. The results of this mismatch can be seen in widespread U.S. unemployment, poverty, and exponential natural systems failure. Disruptions such as these will continue to diminish our collective creative abilities to advance innovative enterprise unless we think and act differently. How and what we communicate affects the economic impact of creativity.
This document provides an overview of Peircean Semeiotic, which was conceived by Charles Sanders Peirce to fill a void in scientific methodology. Peirce developed a hierarchical System of Science to provide a framework for scientific inquiry. At the highest level of abstraction was mathematics, and lower levels included logic, scientific philosophy, and conventional science. Peirce's triadic sign and system of science could provide a framework for developing measures of effectiveness for information fusion and intelligent systems, but his work remains largely unknown.
What is the power of prayer and meditation to help each of us navigate our deficiencies and strengthen connectivity between mind and self? This paper begins to explore these intersections in parallel with scientific imaging of the functional brain.
Paper by MUSICIAN 2.0, 3.0, 4.0...
Developing Music
Careers in Uncertain Times
A Psycho-Spiritual-Musical Manifesto
Paper by Peter Spellman recommended by Gerd Leonhard.
About the author:
Building community in the civic space 2011Betsey Merkel
Building Collaborative Communities in the Civic Space
Accelerating innovation
in Open Source Economic Development
Updated May 2011
Created by Betsey Merkel, Co-Founder & Director, The Institute for Open Economic Networks (I-Open)
, Cleveland, Ohio USA 44103
http://i-open.posterous.com/
This document discusses the strategy of collaborative innovation networks (COINS) as an economic development tool for education, economic development, and workforce development. It proposes integrating COINS and a networked platform of civic forums, guided by research in collaboration science. This is intended to strengthen innovation in open source economic development by reconnecting people and ideas to legacy assets in colleges, universities, and libraries. The goal is to accelerate creativity, collaboration, and communication for addressing issues like education, employment, and sustainability on both local and global scales.
Lies, Damned Lies and Software Analytics: Why Big Data Needs Rich DataMargaret-Anne Storey
(Abstract and video links below)
ACM SIGSOFT Webinar May 4th, 2016
Distinguished lecture at ISR, UCI, April 2016.
UCI Video is available at: https://www.youtube.com/watch?v=Ujm4G7ayRQQ
Webinar link will be available shortly.
This talk is based on a short chapter to appear in a forthcoming book on "Perspectives on Data Science for Software Engineering", it can be preordered here:
http://goo.gl/Wi30Ra
Abstract:
Software analytics and the use of computational methods on "big" data in software engineering is transforming the ways software is developed, used, improved and deployed. Software engineering researchers and practitioners are witnessing an increasing trend in the availability of diverse trace and operational data and the methods to analyze it. This information is being used to paint a picture of how software is engineered and suggest ways it may be improved. But we have to remember that software engineering is inherently a socio-technical endeavour, with complex practices, activities and cultural aspects that cannot be externalized or captured by tools alone---in fact, they may be perturbed when trace data is surfaced and analyzed in a transparent manner.
In this talk, I will ask:
- Are researchers and practitioners adequately considering the unanticipated impacts that software analytics can have on software engineering processes and stakeholders?
- Are there important questions that are not being asked because the answers do not lie in the data that are readily available?
- Can we improve the application of software analytics using other methods that collect insights directly from participants in software engineering (e.g., through observations)?
I will explore these questions through specific examples. I hope to engage the audience in discussing how software analytics that depend on "big data" from tools, as well as methods that collect "thick" data from participants, can be mutually beneficial in improving software engineering research and practice.
Towards the Social Programmer (MSR 2012 Keynote by M. Storey)Margaret-Anne Storey
Audio+slide video is posted at http://margaretannestorey.wordpress.com.
Slides from a Keynote at Mining Software Repository Conference 2012, co-located with ICSE 2012 in Zurich, Switzerland.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
The document provides an overview and comparison of various social network analysis software platforms. It groups the tools into three categories: advanced/academic tools suited for complex analysis, accessible but advanced tools for general use with some advanced features, and simple easy-to-use tools. For each category it briefly profiles several representative tools, outlining their primary uses, environments, costs, and pros and cons.
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
This document discusses social computing, including its theoretical underpinnings, infrastructure, applications, and research issues. Social computing is a new paradigm that facilitates collaboration and social interactions using computing technology. It draws from fields like social informatics, human computer interaction, and social and psychological theories. Major application areas include online communities, intelligent interactive entertainment, and business/public sector systems. Key research issues involve representing social information and knowledge, modeling social behavior at individual and group levels, and analyzing and predicting social systems. Agent-based modeling and simulation are important approaches used in social computing.
Detecting fake news_with_weak_social_supervisionSuresh S
This document discusses using weak social supervision for detecting fake news on social media. It defines weak supervision and describes how social media data provides a new type of weak supervision called weak social supervision. Weak social supervision can be generated from three aspects of social media - users, posts, and networks. Recent works have shown that user-based, post-based, and network-based weak social supervision can be effective for fake news detection, even with limited labeled data. Weak social supervision is a promising approach for learning tasks where labeled data is scarce.
2009-C&T-NodeXL and social queries - a social media network analysis toolkitMarc Smith
This document introduces NodeXL, a network analysis toolkit implemented as an Excel add-in. NodeXL allows users to import social network data, calculate network metrics, and generate network graphs and visualizations within Excel. The document outlines NodeXL's key features, including importing data from sources like email and Twitter, calculating metrics like degree and centrality, and generating customizable node-link diagrams. It also discusses related work and provides an example analysis workflow using NodeXL to analyze an enterprise social network, revealing patterns in employee connections. NodeXL aims to make network analysis accessible to novice and expert users through a familiar spreadsheet interface.
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
This document proposes a framework for modeling and analyzing influence diffusion in multiplex online social networks (OSNs). It introduces coupling plans to represent how data spreads across overlapping users in multiple OSNs. Specifically, it proposes both lossless and lossy coupling plans to map multiple networks into a single network. Extensive tests on real and synthetic datasets show the coupling plans can effectively identify influential users by considering their roles across multiple OSNs. The framework provides insights into influence propagation in multiplex networks and can solve the minimum cost influence problem by exploiting algorithms for single networks.
The document describes a tool called the "Profanity Statistical Analyzer" that was developed to analyze webpages, social media posts, and blogs to detect and quantify the amount of profane or abusive language. The tool works by taking in content, tokenizing it, comparing the tokens to a dataset of abusive words, and reporting the results both as a percentage of abusive words and by highlighting which actual words were detected. The tool is meant to help users determine whether certain online content is appropriate for them to view by automatically analyzing the language used.
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
The document discusses detection and minimization of the influence of rumors on social networks. It proposes a model called DRIMUX (Dynamic Rumor Influence Minimization with User Experience) that aims to reduce the influence of a rumor by blocking a set of nodes in the network. A dynamic Ising propagation model is used that considers both global rumor characteristics and individual user tendencies. Additionally, the model incorporates a constraint on interference time to maintain user experience utility - nodes are only blocked for a tolerance time threshold to avoid decreasing the overall network utility. Algorithms based on survival theory and maximum probability principles are developed to formulate the problem and provide solutions.
Privacy and Cryptographic Security Issues within Mobile Recommender Syste...Jacob Mack
The document discusses privacy and security issues with recommender systems as they become more contextual and utilize deep learning techniques. It proposes that as recommender systems are able to analyze more user data through cloud computing, there are increased risks of privacy breaches and data hacking. The researchers conducted a survey that found professionals have significant concerns about emerging technologies, privacy/security of recommender systems, and mobile device security. They propose further research into cryptographic methods like homomorphic encryption that could help secure user data processed by recommender systems.
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFACE
This document summarizes research on revisiting photo-based social authentication. The researchers:
1) Demonstrate a new attack on social authentication that matches photos from challenges to a collection of the victim's photos, which is more effective than face recognition attacks.
2) Conduct a user study showing people can identify friends in photos with unrecognizable faces over 99% of the time, whereas software fails.
3) Design a new social authentication system that selects "medium" photos software cannot recognize but people can, and transforms photos via overlays and perspective changes to block matching attacks while retaining human usability, passing 94.38% of challenges in a preliminary study.
This document summarizes a PhD research project exploring how online social media is used to support local governance. It describes a case study of a small community that uses online discussion forums to discuss local issues. Analysis identified five patterns of "governance conversation" including sharing information, providing feedback, coordinating responses, informally mediating issues, and engaging in discussion of complex problems. While no binding decisions were made online, the discussions supported governance action. The research examines how online tools can both facilitate instrumental problem-solving and support expressive deliberation that accommodates pluralism in local governance.
This document outlines a study on using deep learning models to detect cyberbullying across multiple social media platforms. It introduces cyberbullying as a problem affecting 10-40% of internet users and notes past work has focused on single platforms or topics. The study targets three social networks, three cyberbullying topics (personal attacks, racism, and sexism), and compares traditional machine learning models to deep neural networks including CNNs, LSTMs, and BLSTMs with attention. Experiments show BLSTMs with attention improve F1 scores for imbalanced datasets and are effective at cyberbullying detection across platforms and topics without feature engineering.
Week 2 of the Data Science course covers discussions on big data and statistical sampling, required reading from introductory data science and machine learning texts, and an assignment to visually describe the Haberman dataset in R. The roadmap provides guidance on discussions, recommended reading, optional activities, and instructions for submitting the visual assignment by the deadline. It also previews upcoming weeks focusing on machine learning, data visualization, and data ethics.
Data Cleaning for social media knowledge extractionMarco Brambilla
Social media platforms let users share their opinions through textual or multimedia content. In many settings, this becomes a valuable source of knowledge that can be exploited for specific business objectives. Brands and companies often ask to monitor social media as sources for understanding the stance, opinion, and sentiment of their customers, audience and potential audience. This is crucial for them because it let them understand the trends and future commercial and marketing opportunities.
However, all this relies on a solid and reliable data collection phase, that grants that all the analyses, extractions and predictions are applied on clean, solid and focused data. Indeed, the typical topic-based collection of social media content performed through keyword-based search typically entails very noisy results.
We recently implemented a simple study aiming at cleaning the data collected from social content, within specific domains or related to given topics of interest. We propose a basic method for data cleaning and removal of off-topic content based on supervised machine learning techniques, i.e. classification, over data collected from social media platforms based on keywords regarding a specific topic. We define a general method for this and then we validate it through an experiment of data extraction from Twitter, with respect to a set of famous cultural institutions in Italy, including theaters, museums, and other venues.
For this case, we collaborated with domain experts to label the dataset, and then we evaluated and compared the performance of classifiers that are trained with different feature extraction strategies.
Presenter: Betsey Merkel, The Institute for Open Economic Networks (I-Open) at the COINs-collaborative innovation networks Conference 2010, hosted by the Savannah College of Art & Design in Savannah, Georgia USA on October 7-9, 2010.
Title: Contextual Transmedia Communications: Content and Creativity in Complexity
Presenter: Betsey Merkel, The Institute for Open Economic Networks (I-Open) at the COINs-collaborative innovation networks Conference 2010, hosted by the Savannah College of Art & Design in Savannah, Georgia USA on October 7-9, 2010.
From the Abstract and a Presentation Overview: The human race is faced with engaging in exponential levels of complexity resulting from expanding populations, limited natural resources, and maturating cycles of the World Wide Web. Habits of capacity building - that of inventory, meaning, and experimentation -- remain at levels suited to an industrial age of linear scarcity. The results of this mismatch can be seen in widespread U.S. unemployment, poverty, and exponential natural systems failure. Disruptions such as these will continue to diminish our collective creative abilities to advance innovative enterprise unless we think and act differently. How and what we communicate affects the economic impact of creativity.
This document provides an overview of Peircean Semeiotic, which was conceived by Charles Sanders Peirce to fill a void in scientific methodology. Peirce developed a hierarchical System of Science to provide a framework for scientific inquiry. At the highest level of abstraction was mathematics, and lower levels included logic, scientific philosophy, and conventional science. Peirce's triadic sign and system of science could provide a framework for developing measures of effectiveness for information fusion and intelligent systems, but his work remains largely unknown.
What is the power of prayer and meditation to help each of us navigate our deficiencies and strengthen connectivity between mind and self? This paper begins to explore these intersections in parallel with scientific imaging of the functional brain.
Paper by MUSICIAN 2.0, 3.0, 4.0...
Developing Music
Careers in Uncertain Times
A Psycho-Spiritual-Musical Manifesto
Paper by Peter Spellman recommended by Gerd Leonhard.
About the author:
Building community in the civic space 2011Betsey Merkel
Building Collaborative Communities in the Civic Space
Accelerating innovation
in Open Source Economic Development
Updated May 2011
Created by Betsey Merkel, Co-Founder & Director, The Institute for Open Economic Networks (I-Open)
, Cleveland, Ohio USA 44103
http://i-open.posterous.com/
This document discusses the strategy of collaborative innovation networks (COINS) as an economic development tool for education, economic development, and workforce development. It proposes integrating COINS and a networked platform of civic forums, guided by research in collaboration science. This is intended to strengthen innovation in open source economic development by reconnecting people and ideas to legacy assets in colleges, universities, and libraries. The goal is to accelerate creativity, collaboration, and communication for addressing issues like education, employment, and sustainability on both local and global scales.
Valdis Krebs, Founder and Chief Scientist, orgnet.com 03-24-09 InterviewBetsey Merkel
A conversation about networks with Valdis Krebs
Valdis Krebs shares his insights into what we can learn from corruption networks, some ways to think about building employment networks, and his insights into today's research environment in social network mapping and analysis.
Betsey Merkel from I-Open provided invaluable contributions to the success of the COINs2010 conference through her social media campaign, live video streaming of sessions, and video interviews with participants. Her activities greatly increased the international appeal and lasting impact of the conference. The letter recommends Betsey for her instrumental role in organizing social networking and connecting a global live audience to the conference sessions and discussions.
The document discusses how to get customers to "buy now" by understanding the jobs they need to accomplish. It explains that while an organization's purpose drives "buy in", functionality and outcomes are needed to make purchases. The document outlines four categories of customer jobs - behaviors, skills, beliefs, identity - and stresses focusing offers on the most concrete jobs. It emphasizes taking the perspective of the most valued customer to understand what job they want a product to help them complete.
Betsey O'Hagan (Merkel) Recommendation Letter 2000Betsey Merkel
Betsey O'Hagan (Merkel) Recommendation Letter 2000
This is my favorite recommendation written by colleague Dr. Paul Gothard III, Professor of Music, Lake Erie College. Paul and I worked together over many years to build a well loved monthly concert program in combination with regional and international performing artists on the campus of Lake Erie College. Together, the Coryton Ensemble and the LEC Department of Music commissioned and premiered the new works of global and local composers. To the delight of local audiences, the historic and acoustically renowned Morley Music Hall on campus became a welcome performance home for an ensemble of musicians from across Northeast Ohio.
The Art of Earning -- WISE Symposium, Syracuse, NYTara Gentile
You might have learned how to build a business. But have you learned how to earn money?
It's not easy to make the transition from paycheck to entrepreneurship. Learn how to make money beautifully.
El documento habla sobre el turismo y la sostenibilidad en Costa Rica. Explica que aunque Costa Rica apostó por la protección del medio ambiente hace 50 años reservando más del 25% de su territorio para parques nacionales, en la actualidad existe una brecha entre el discurso de sostenibilidad y la realidad debido a la falta de regulación y control en la industria turística, lo que amenaza los esfuerzos iniciales por conservar el medio ambiente. Se necesita retomar el objetivo original de desarrollo sostenible y ecoturismo
Social Media in Higher Education - Barriers & Digital LiteracyNigel Robertson
The document discusses barriers to using social media and developing digital literacy in higher education. It identifies several types of barriers, including perceptual barriers where people see no value, structural barriers like policies blocking access, and lack of awareness of possibilities. Developing digital literacy requires a permissive culture with leadership support, professional development opportunities, and engaging with social tools to learn. Overcoming these barriers could provide opportunities for research collaboration, lifelong learning through personal networks, and active learning through new models.
The role of COINS in the Civic Space: Building a pathway to shared prosperity Betsey Merkel
Betsey Merkel, Co-Founder and Director, The Institute for Open Economic Networks (I-Open), presented a summary of this material at the COINS 2009 conference hosted by the Savannah College of Art & Design (SCAD) October 10, 2009 More http://www.coins2009.com/
The presentation describes a collaborative strategy for colleges, universities, and libraries in a networked model of I-Open Civic Forums to strengthen their role as conveners, connectors, and leaders in national and global prosperity. More http://i-open-2.near-time.net
The presentation describes an accelerated model of Civic Forums capable of incorporating COINS and CONDOR to connect legacy assets to innovation for education, economic, and workforce development. Our strategy is based on I-Open's experience in the last six years building face-to-face and online collaborative communities for enterprise collaboration. Learn more about our work at I-Open http://i-open.org
Learn more about COINS and CONDOR on the Swarm Creativity blog http://swarmcreativity.blogspot.com/
The document discusses file system implementation and structure. It covers topics like directory implementation using linear lists and hash tables, different allocation methods like contiguous, linked and indexed allocation, free space management using bit vectors and linked lists, improving efficiency through caching, and recovery methods like consistency checking and log-structured file systems. It also provides an overview of the Sun Network File System (NFS) including its architecture, mount protocol, and remote operations.
How content strategy fits into the user experienceNick Finck
The document summarizes Nick Finck's presentation on how content strategy fits into the user experience. It discusses how user experience happens across discovery, planning, design, build, and evaluation phases. Content strategy delivers key artifacts like personas, page description diagrams, and content templates that support user experience work. Finck explains how content strategy fits alongside other disciplines like information architecture, interaction design, and user interface design to collectively improve the user experience.
This document discusses strategies for developing and deploying free/open source software. It provides an overview of free/open source software development and findings from studies on open source projects. It discusses how open source processes could help improve closed source systems and presents strategies like sharing requirements and designs, improving communities and careers, and establishing an "open university" to encourage open source adoption and research.
The document summarizes Tamara Lopez's PhD research proposal on reasoning about flaws in software design. The research aims to analyze software failures by taking a situational approach between the broad scope of systemic analyses and narrow focus of means analyses. It will apply qualitative methods to examine how failures manifest and are addressed in software development. The goal is to better understand why some software fails and other succeeds.
OPEN SOURCE TECHNOLOGY: AN EMERGING AND VITAL PARADIGM IN INSTITUTIONS OF LEA...ijcsit
Open Source Software is the major rival in the software market previously dominated by proprietary software products. Open Source Software(OSS) is available in various forms including web servers, Enterprise Resource Planning systems (ERPs), Academic management systems and network management systems and the development and uptake of such software by both commercial and non-commercial companies and institutions is still on the rise. The availability of OSS applications for every common type of enterprise, minimal licensing issues and availability of source code as well as ease of access has made the technology even more attractive in learning and teaching of software based courses in institutions of learning. Through embracing this technology, institutions of learning have been able to minimize general operations cost that could have otherwise been incurred in procuring similar proprietary software. Students and teaching staff can nowadays interact and modify the readily available source code hence making learning and teaching more practical
This document discusses the use of open source technology in institutions of learning in Kenya. It finds that students and teaching staff widely use open source software and tools in learning and teaching due to factors like ease of access, lack of vendor dependency, and enhancement of the learning process. Open source allows students to access source codes and modify software, supporting the learning of software development skills. Institutions also benefit from the flexibility and cost-effectiveness of open source. The study concludes that open source has become an important part of learning and operations in Kenyan educational institutions.
Personal dashboards for individual learning and project awareness in social s...Wolfgang Reinhardt
The document discusses the concept and implementation of personal dashboards within the eCopSoft collaborative development environment. It aims to enhance awareness, learning, and coordination for developers working on multiple projects. There are three types of dashboards proposed: 1) a community dashboard, 2) a project dashboard, and 3) a my-eCopSoft dashboard for individual users. The dashboards will combine and display data from different eCopSoft tools and projects through customizable "pods". This will provide developers with an integrated view of their work across multiple teams and contexts.
The document describes a Semantic Wiki system called SoWiSE that was developed to help software developers collaborate more effectively. SoWiSE combines Wiki and Semantic Web technologies to allow developers to tag and search software documentation based on ontologies. It was built as an Eclipse plugin to integrate with the developer's IDE. SoWiSE enhances an existing Wiki plugin for Eclipse called EclipseWiki by adding semantic search capabilities and customizations for software development tasks.
Mining developer communication data streamscsandit
This paper explores the concepts of modelling a software development project as a process that
results in the creation of a continuous stream of data. In terms of the Jazz repository used in this
research, one aspect of that stream of data would be developer communication. Such data can
be used to create an evolving social network characterized by a range of metrics. This paper
presents the application of data stream mining techniques to identify the most useful metrics for
predicting build outcomes. Results are presented from applying the Hoeffding Tree
classification method used in conjunction with the Adaptive Sliding Window (ADWIN) method
for detecting concept drift. The results indicate that only a small number of the available metrics
considered have any significance for predicting the outcome of a build
This document discusses lessons that can be learned from open source software projects and applied to commercial software development. It summarizes that open source projects typically have:
1) Core teams of 15 or fewer people who contribute the majority of code changes and enhancements.
2) Extensive informal communication between developers, through mailing lists and chat sites, which aids coordination.
3) Improved customer support due to many users providing help and feedback.
The document recommends commercial projects emulate open source practices like increasing interaction between developers, whether co-located or distributed, and between developers and users.
Quantitative And Qualitative Evaluation Of F/Oss Volunteer Participation In D...ijseajournal
- A small core team is typically surrounded by a larger community of volunteers participating in defect reporting and resolution for open source projects.
- Defect reporting is widely dispersed and mostly contributed by occasional external volunteers, while defect resolution is more concentrated among regular contributors mainly from the core team.
- On average, 91% of volunteers only contribute once, twice or thrice by reporting defects, while a small percentage are regular contributors. Anonymous volunteers also make up about 30% of defect reports on average.
The document summarizes a research paper that proposes a framework for integrating human-computer interaction (HCI) processes into distributed software development. It begins by discussing how HCI and software development have traditionally evolved independently. It then presents a proposed HCI process framework that includes four phases made up of analysis, design, implementation, and evaluation activities. Each activity involves specific methods, skills, and deliverables. The framework is meant to facilitate communication between HCI and development teams. The document also analyzes gaps between HCI and distributed development approaches and priorities. It argues that integrating the two fields could help deliver higher quality products that better meet users' needs.
This document provides information about Aleksandra Pawlik's PhD research project which aims to explore how best to support scientific end-user software development. The research will focus on identifying problematic and successful tools/techniques used by scientific developers through case studies of projects that transition from limited to extended contexts or involve software professionals. Qualitative methods like interviews and observation will be used to understand the challenges and how support can be improved.
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
This document discusses machine learning techniques for filtering unwanted messages in online social networks. It proposes a content-based filtering system that allows users to control the messages posted on their walls by filtering out unwanted messages. The system uses a machine learning-based classifier to automatically categorize short text messages based on their content. It also includes a blacklist feature to block specific users from posting if they consistently share unwanted messages. The goal is to give users better control over their social media experience by reducing noise and unwanted content on their walls.
Open Source Software: Perspectives for Development (World Bank & Paul Dravis)Paul Dravis
Open Source Software: Perspectives for Development addresses 1) the opportunities and challenges from the dramatic growth of open source software, 2) how developing country policy makers and other key stakeholders make informed decisions and 3) the benefits, costs and implications of choosing open source solutions.
This document discusses the sustainability of the ISA (Investigation/Study/Assay) tools and framework. It provides an overview of the ISA tools' code activity and releases, user community involvement and uptake over time, longevity through funding, and ecosystem of partners. It notes both positive and negative indicators for the tools' sustainability and discusses the need for sustainable scientific software more broadly.
The document summarizes the Horizon Report, an annual publication that examines emerging technologies likely to impact higher education. It discusses the research process, highlighting key trends and challenges in teaching and learning. Examples are provided for technologies that are likely to emerge within the next 1-2 years like grassroots video and collaboration tools, and within the next 3-5 years like mobile broadband, data mashups, collective intelligence, and social operating systems.
The document proposes an Interactive Application Service (IAS) that uses cloud computing and social networking technologies to allow researchers to easily discover, share, and access applications from anywhere at any time. The IAS architecture includes a cloud infrastructure layer, IAS service layer, and social networking front-end layer. Users can run applications in the cloud through the social networking portal. The IAS has been implemented on the GeoChronos portal to enable earth observation scientists to share applications and data.
The Unifying Power of Social Technologies by Betsey O'HaganBetsey Merkel
"The Unifying Power of Social Technologies" by Betsey O'Hagan presented at Council of Ohio Audubon Chapters (COAC) Business Meeting & 50 Year Anniversary Celebration at the Novak Education Center, 382 Townline Road in Aurora, Ohio on Sunday, March 3, 2019.
WCAS Audience Metrics 2017 by Betsey Merkel, ConsultantBetsey Merkel
Case Study: Activity Assessment and eMetrics for a Conservation Organization. Programs, Membership, Donations, and eMetrics 2017. An overview of Western Cuyahoga Audubon chapter activities, audiences, and trends. By Betsey Merkel, WCAS Consultant, Jan 15, 2018.
The Council of Ohio Audubon Chapters (COAC) PlatformBetsey Merkel
The Council of Ohio Audubon Chapters (COAC) Platform-Capacity Building for 21st Century Conservation Projects by Betsey Merkel, digital strategist consultant, and presented at the COAC Quarterly Workshop June 3, 2018 at Miami University Regionals-Hamilton, Ohio.
This document provides a summary of Betsey Merkel's results from the Fascination Advantage assessment. The assessment determined that Betsey's primary advantage is Passion and her secondary advantage is Innovation, making her archetype "The Catalyst". As a Catalyst, Betsey is described as out-of-the-box, social, and energizing. Her report provides tips on how to maximize her advantages when communicating and interacting with others based on her personality assessment results.
Anita Campbell, CEO, Small Business Trends 04-16-10 Interview.docBetsey Merkel
The document the user was looking for has been moved. The I-Open document is no longer available at its original location and can now be found at http://www.scribd.com/I-Open. Users should go to that URL to access the relocated I-Open document.
This document discusses how people have become the new media in today's socially connected world. It notes that audiences are now active rather than captive, and form peer connections over brand connections. It advocates that brands engage in social media by studying the space, listening to conversations, publishing engaging content, interacting with audiences, influencing key social media users, and activating audiences to inspire real-world actions. The document provides examples of how brands have successfully engaged audiences and generated business results through social media campaigns.
Bruce Perens: OS Landmark Case TestimonyBetsey Merkel
From Bruce Perens: Inside Open Source's Historic Victory — Datamation.com http://tinyurl.com/y8urk7o
Bruce Perens, creator of the Open Source Definition, the manifesto of Open Source and the criterion for Open Source software licensing, was an expert witness in the Jacobsen v. Katzer court case. An unusual glimpse into testimony authored by Bruce Perens that is traditionally silenced. A community grateful thank you to Open Source developer and physicist, Bob Jacobsen for his landmark win requesting obfuscation be replaced with attribution in this landmark case. You can read the story about the legal wrangling that produced a historic victory for Open Source at http://tinyurl.com/y8urk7o
This recipe is for a Stone Fence Applesauce Cake that was published in AARP magazine in October 1979. It calls for creaming margarine and sugars together, then beating in eggs. Unsweetened applesauce and shredded carrots are added alternately with a combination of all-purpose and whole wheat flours, baking soda, and spices. Walnuts and raisins are folded into the batter before baking in a greased bundt pan at 350 degrees F for 1 hour and 30 minutes. Once cooled, the cake is sprinkled with confectioners' sugar.
This document discusses how communities can be built and strengthened through network weaving. It describes how a regional economic development organization in Appalachian Ohio called ACEnet mapped the social and economic connections in the local food industry to better understand the network. The document outlines that improved connectivity starts with mapping the existing network to understand it, and then iteratively improving connectivity by introducing disconnected groups and facilitating collaboration between nodes. It describes the typical phases a community network goes through, from scattered fragments to a multi-hub small world network. It emphasizes the important role of network weavers in intentionally facilitating new connections to create a more vibrant and resilient community network.
The End of Footbinding in China as an Example of the Power of Networks, by June Holley, Network Weaver
june@networkweaving.com
How do we make a difference? How do we help bring about transformative change?
The story of the end of footbinding is a great
example of the way networks can be mobilized to bring about dramatic change in a very short period of time.
I Open Interview Questions [I Open Education]Betsey Merkel
Interview questions designed 2009 by Betsey Merkel, Co-Founder and Director, I-Open for I-Open interviews. Attribution for design guidance: Susan Altshuler, Dennis Coughlin. Innovation Framework & Strategic Doing maps: Ed Morrison
Modern Brand Building Stop Campaigning and Start CommittingBetsey Merkel
The document discusses modern brand building and the evolution from campaigning to committing. It argues that brands should stop changing their message for short-term gains and instead build their brand on core principles that remain consistent over time. This committing approach leads to brand loyalty while campaigning does not. The document provides suggestions for brands to start committing such as defining what they stand for and creating coherent brand experiences and stories over time.
Building Community In The Civic Space-revitalizing communities in America.Betsey Merkel
I-Open teaches communities how to build open, neutral civic spaces to encourage new conversations and collaboration. Collaborative communities form around shared interests and opportunities and can operate both in-person and online using tools like social media. I-Open has launched several collaborative communities in Northeast Ohio addressing issues like technology, energy, and transparency, with the goal of building trust and networks globally. Next steps include learning more about civic spaces and communities and exploring examples like RealNEO and the Lakewood Observer.
Building Community In The Civic Space 1228363486781910 9Betsey Merkel
I-Open develops civic spaces and collaborative communities to facilitate collaboration both online and face-to-face. The document discusses how civic spaces are important for trust building and networking. It provides examples of collaborative communities in Northeast Ohio and how social media tools can expand these communities globally. The document encourages readers to get involved in these communities and learn new skills around networks, strategic doing, and enterprise collaboration.
Bruce has prepared this presentation for the July 9, 2009 Midtown Brews conversation. Join in face to face or on our live broadcast and chat Thur July 9 6PM - 7PM EDT http://www.livestream.com/midtownbrews
This document provides an introduction to the concept of systematic innovation in philanthropy. It begins with three short stories that illustrate how taking a more systematic approach to innovation can improve social impact. The introduction argues that while flashes of inspiration drive many advances, they are unpredictable and difficult to manage consistently. Research shows that a systematic, disciplined process of innovation typically yields more productive, scalable, and sustainable ideas over time. The document aims to explore how philanthropy can adopt practices and processes to intentionally foster innovation as a management strategy, rather than relying on sporadic flashes of creativity.
This 3 sentence summary provides the key details from the document:
The document discusses a presentation given by Ed Morrison and the Institute for Open Economic Networks (I-Open) at a workshop on Open Source Economic Development held in April 2008 at Punderson Lake Park, Ohio. The material in the presentation is copyrighted by I-Open and Ed Morrison and is distributed under a Creative Commons license allowing others to modify, copy and use the material commercially with attribution.
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineCIOWomenMagazine
In this article, we will dive into the extraordinary life of Ellen Burstyn, where the curtains rise on a story that's far more attractive than any script.
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
𝐔𝐧𝐯𝐞𝐢𝐥 𝐭𝐡𝐞 𝐅𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐄𝐧𝐞𝐫𝐠𝐲 𝐄𝐟𝐟𝐢𝐜𝐢𝐞𝐧𝐜𝐲 𝐰𝐢𝐭𝐡 𝐍𝐄𝐖𝐍𝐓𝐈𝐃𝐄’𝐬 𝐋𝐚𝐭𝐞𝐬𝐭 𝐎𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬
Explore the details in our newly released product manual, which showcases NEWNTIDE's advanced heat pump technologies. Delve into our energy-efficient and eco-friendly solutions tailored for diverse global markets.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
Part 2 Deep Dive: Navigating the 2024 Slowdownjeffkluth1
Introduction
The global retail industry has weathered numerous storms, with the financial crisis of 2008 serving as a poignant reminder of the sector's resilience and adaptability. However, as we navigate the complex landscape of 2024, retailers face a unique set of challenges that demand innovative strategies and a fundamental shift in mindset. This white paper contrasts the impact of the 2008 recession on the retail sector with the current headwinds retailers are grappling with, while offering a comprehensive roadmap for success in this new paradigm.
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
Profiles of Iconic Fashion Personalities.pdfTTop Threads
The fashion industry is dynamic and ever-changing, continuously sculpted by trailblazing visionaries who challenge norms and redefine beauty. This document delves into the profiles of some of the most iconic fashion personalities whose impact has left a lasting impression on the industry. From timeless designers to modern-day influencers, each individual has uniquely woven their thread into the rich fabric of fashion history, contributing to its ongoing evolution.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...BBPMedia1
Nathalie zal delen hoe DEI en ESG een fundamentele rol kunnen spelen in je merkstrategie en je de juiste aansluiting kan creëren met je doelgroep. Door middel van voorbeelden en simpele handvatten toont ze hoe dit in jouw organisatie toegepast kan worden.
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
Understanding Continuous Design in F/OSS Projects
1. Understanding Continuous Design in F/OSS Projects
Les Gasser1,2 Walt Scacchi2
gasser@uiuc.edu wscacchi@ics.uci.edu
Gabriel Ripoche1, 3 Bryan Penne1
gripoche@uiuc.edu bpenne@uiuc.edu
1
Graduate School of Library and Information Science
University of Illinois at Urbana-Champaign
501 E. Daniel St., Champaign, IL 61820, USA
Phone: +1 217 265 5021 / Fax: +1 217 244 3302
2
Institute for Software Research
University of California at Irvine
ICS2 242, UCI, Irvine, CA, 92697-3425
Phone: +1 949 824 4130 / Fax: +1 949 824 1715
3
LIMSI-CNRS / Université Paris XI
BP 133, 91403 Orsay Cedex, France
Phone: +33 1 69 85 81 01 / Fax: +33 1 69 85 80 88
Abstract
Open Source Software (OSS) is in regular widespread use supporting critical
applications and infrastructure, including the Internet and World Wide Web
themselves. The communities of OSS users and developers are often interwoven.
The deep engagement of users and developers, coupled with the openness of
systems lead to community-based system design and re-design activities that are
continuous. Continuous redesign is facilitated by communication and knowledge-
sharing infrastructures such as persistent chat rooms, newsgroups, issue-
reporting/tracking repositories, sharable design representations and many kinds of
"software informalisms." These tools are arenas for managing the extensive, varied,
multimedia community knowledge that forms the foundation and the substance of
system requirements. Active community-based design processes and knowledge
repositories create new ways of learning about, representing, and defining systems
that challenge current models of representation and design. This paper presents
several aspects of our research into continuous, open, community-based design
practices. We discuss several new insights into how communities represent
knowledge and capture requirements that derive from our qualitative empirical
studies of large (ca. 2GB+) repositories of problem-report data, primarily from the
Mozilla project.
Keywords
Continuous design; Open source software; Knowledge management; Knowledge
representation; Community knowledge; Specification.
1/6
2. 1 Introduction
In current research we are studying software maintenance work, bug reporting, and repair in Free/Open Source
Software (F/OSS) communities, giving special attention to factors such as knowledge exchange, effectiveness of
tool support, social network structures, and organization of project activity. More specifically, we are examining
how these factors affect such outcome variables as the time taken to resolve reported problems, the ability to
detect interdependent and duplicate problems, the effective scope of repairs (the degree to which the community
can address the entire range of software problems that appear, rather than just selected subsets), and the general
quality of software.
Answering these questions is important to a number of scientific, government, or industrial communities. U.S.
science agencies continue to make substantial (multi-million dollar per year) investments in complex software
systems supporting research in natural and physical sciences (e.g., Bioinformatics, National Virtual Observatory)
via computational science test-beds (e.g., Tera-Grid, CyberInfrastructure), which software is intended as
free/open source [13,10]. E-Government initiatives around the world are increasingly advocating or mandating
the use of F/OSS in their system design and development efforts [5,8]. Also, industrial firms in the U.S. that
develop complex software systems for internal applications or external products are under economic pressure to
improve their software productivity and quality, while reducing their costs. F/OSS is increasingly cited as one of
the most promising and most widely demonstrated approach to the reuse of software [4] in ways that can make
the design and development of complex software faster, better, and cheaper [22].
However, in each of these cases, there is no existing framework or guideline for how to design, manage, or
evaluate F/OSS software systems and processes. Moreover we don’t have a clear picture of how these
“consumers” might best expend their scarce resources for continuous system design and redesign [16], or how
they might redesign their own processes to assess and take advantage of F/OSS technologies [15].
Our research process is based on qualitative and computational analysis of large corpuses of longitudinal data
from Web sites, public repositories, online discussion forums, and online artifacts from F/OSS development
projects. Projects analyzed include networked computer games, Internet/Web infrastructure, X-ray
astronomy/deep space imaging, and academic software research. We have access to a number of large
collections of current data from these projects, comprising at least six repositories of problem report/analysis
activity, with a total of over 500,000 reports, containing approximately 5 million individual comments, and
involving over 60,000 reporters and developers.
We are using both human-based grounded-theory and computational methods (such as automated concept
extraction, data and text-mining, process modeling) to empirically discover, identify and comparatively analyze
patterns of continuous software design in the projects under study [14]. More specifically, we are looking for
design episodes, basic design processes (such as collective sense making, negotiation, information seeking, and
conflict management), design-management activities, and design-support/design-management infrastructure.
For example, we are using statistical text-analysis tools to automatically extract episodes of design activity when
traces of those activities can be characterized with specific “language models”. We are also developing ways of
automatically extracting and coding change data from large corpuses to mechanically develop explicit,
generalized process models of design processes, and link specific steps or paths in these process models back to
the underlying data from which they are derived.
2 Continuous Design in F/OSS
In doing this research we have begun to find that the work represented in these repositories goes far beyond
software repair and maintenance (“bug fixing”). Concepts such as “bug” and “repair” connote some deviation
from an accepted standard of function or behavior, and restoration of performance to that standard. However, it
seems that much of the work we see in our data involves continuous distributed collective software specification
and design [7] instead of bug fixing. We are seeing some clear trends that run somewhat contrary to
conventional wisdom and normative software development practice for large systems, for example:
1. Specifications of software function, usability, structure, etc. are not (and in fact cannot be) known when
software is designed and released. Instead, software artifacts capture and track the emerging preferences of
their co-emerging user communities in a continuing cycle of innovation. Explicit, formal specifications or
formal design processes almost never exist. The code itself, coupled with persistent traces of extended
discussions and debates, constitute the current and evolving “specification”.
2. Software builders rely on shared collections of “software development informalisms” [17]—which are
assemblages of semi-structured and relatively informal knowledge-sharing tools, representations and
practices—instead of rather more formal development processes and specifications.
2/6
3. We believe this is a fundamentally new type of software design process [2], as it effectively links many
interacting, continuous, open, collective processes—which could easily become chaotic—to produce the
surprisingly efficient, stable, useful, circumscribed artifacts that result from many F/OSS projects. Our data on
these patterns of design also suggests that specific software system designs and design management practices co-
evolve with the emerging teamwork patterns, broader community-wide design practices, and the collective
discourse that constitutes the meaning and embodies the purpose for how the F/OSS systems are built. In fact,
what we are seeing here is a type of “emergent knowledge process” [9].
These observations are significant because this is not a prediction that follows from the current principles of
software design, software engineering, and software evolution [21], which generally see a sequential (waterfall
model), or an iterative and incremental (spiral model) design process and development life cycle [18]. In contrast,
we observe that F/OSS software is produced in a manner that can be more productive, higher quality, and lower
cost than current principles of software engineering suggest [22].
These observations are also surprising, because they suggest that even though F/OSS development projects don't
rely on explicit representations or formal notations for designs [24], they can achieve comparable or better
results by relying on specific patterns of social interaction and discourse to mature and harden informal or
conversational system descriptions into stable, sustainable, widely used software systems of acceptable quality to
their user-developers [6,23,17,19]. Thus these F/OSS projects have no need to “fake” a rational design process,
as is all too common in software engineering [12]. Instead, F/OSS projects seem to rely on enacting a collective
capability for distributed design and organizing [11].
The question that emerges from these previous observations is the following: how does a globally dispersed
community of F/OSS developers design and redesign complex software systems in a continuously emergent
manner? Early analysis of these continuous design processes has led us to two hypotheses about how
communities understand and represent knowledge of the artifacts they “design in use” [3].
3 Continuous Design and Community Knowledge
3.1 Construction of Community Knowledge
Community knowledge of software artifacts is transformed from linear/learned to continuous/constructed.
A standard software process of “specify, design, build, test, release, maintain” effectively separates users at the
point of release from the specification/design process and means that they can only indirectly learn about
artifacts: knowledge of design, function, and structures is communicated to users through manuals, training,
instructions, etc. In the ongoing design processes we are seeing, the community continuously constructs its
artifact knowledge in concert with the development of the artifact itself. Using initial seeds and prototypes, the
community continuously, collectively develops and transforms its knowledge of what the target artifact is, how it
works, what it should be, and how it should work. What is not yet well understood are the specific processes of
this development and transformation. However, we observed the following points:
Community knowledge is constructed from a multiplicity of viewpoints, representations, and experiences
Because of the wide variety of people participating in F/OSS projects (users, “power” users, developers, testers,
etc.), the knowledge development/transformation process is characterized by extreme multiplicity of viewpoints,
representations, experiences, and usages.
Community knowledge development is enacted through knowledge management environments
F/OSS design/development processes are made possible and enacted by shared, structured, and (more or less)
complex knowledge management environments that persistently capture traces of design and analysis processes.
These systems—which range from simple newsgroups to complex problem repositories and compiled
documents—allow the community to accumulate, organize, make sense of, and use the wide variety of
knowledge contributed by the many people involved.
The artifact (and knowledge about it) is constructed through a dynamic network of social processes
The relatively “linear with feedback loops” structure of the more standard software development process is
replaced by a network of (largely social) processes arranged in a highly dynamic topology, including: design,
construction, testing, releasing, work coordination, critiquing, use, suggesting, specification, tool-building, triage,
negotiation, evaluation, etc. Compared to processes represented in a rational design scenario, processes
constituting F/OSS design/development are varied and numerous, and dynamically and loosely articulated.
3/6
4. 3.2 Representation of Community Knowledge
Community representation of knowledge is transformed from bounded, faithful reflections to massive,
contentious assemblages.
Standard models of knowledge representation underlying problem report systems assume a conventional relation
between problem reports on the one hand, and the use and testing experiences they represent on the other hand.
In this view, documents bear a relationship to an experiential life-world, and documents represent things, events,
and experiences through this relationship. Empirical examination of the actual processes of continuous collective
software design is instead revealing a quite different underlying representation model.
Documents record viewpoints, and these viewpoints are subject to multiple interpretations
Many comments are typically made on each problem report (an average of 10 comments per report in Bugzilla1).
These comments often contradict or conflict with each other, and some comments are not interpretable by some
readers and respondents. Moreover problems are reported more than once in different ways, and it is often
difficult to correlate or link these reports and their underlying manifestations.
The scope of documentation is unknowable
Duplicate bug reports are not always linked, index terms differ, and since the documentation system itself is a
large, open system, its state at any moment is being revised. Therefore, knowledge is incomplete in the sense that
there might be “more out there”, but that this potential knowledge is not accessible to the community as a whole.
For example, separate groups might work for months on related problems (even identical problems sometimes)
before realizing that their work is related and creating the “missing link”.
The fidelity of relationship between documents and experiences is uncertain
Problem reports are textual discourses that purport to describe aspects of problems; they are not the problems
themselves. Numerous debates in the Bugzilla corpus involve negotiation over the “proper” interpretation or
referent of a problem report (e.g. Which underlying cause or manifestation does it refer to? Which experience is
“real” and which is incorrect?) Thus it is in general not a routine matter to directly and unambiguously match a
problem description with an experience or a cause.
The relevant life-world is unknowable
Users have widely varying styles of use and functional requirements, which are in general impossible to fully
describe in a distributed context. This multiplicity, diversity, and distribution together mean that the scope of
experience underlying problem descriptions is not knowable.
Taken together, these four observations mean that standard notions of representation fail to capture what is really
going on in collective continuous design contexts such as the F/OSS projects we are studying, and new models
are needed.
4 Conclusions
These results provide new perspectives on community-wide practices of capturing and managing software design
knowledge, on how knowledge is articulated, breaks down and is reconstituted, and on how it is shared and
propagated. This research provides a conceptual shift in understanding how system development and use are
bound together with the richness, variety, and temporal evolution of the socio-technical contexts provided by the
global software industry.
Acknowledgements
We gratefully acknowledge the contributions made by Bob Sandusky. This material is based upon work
supported by the National Science Foundation under Grant No. 0205346. Any opinions, findings, and
conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily
reflect the views of the National Science Foundation.
1
Statistic obtained from a snapshot of Bugzilla taken in March 2002 (over 128,000 bug reports).
4/6
5. References
[1] Augustin, L., Bressler, D., Smith, G., Accelerating Software Development through Collaboration. In
Proceedings of the 24th International Conference on Software Engineering, Orlando, FL, pp 559-563. May
2002.
[2] Benkler, Y., Coase's Penguin, or Linux and the Nature of the Firm. 112 Yale Law Journal (2002-03).
http://www.benkler.org/CoasesPenguin.html.
[3] Bodker, S., Computer Applications as Mediators of Design and Use - A Developmental Perspective. Report
DAIMI PB-542, Computer Science Department, Aarhus University. October 1999.
[4] Brown, A.W., Booch G., Reusing Open-Source Software and Practices: The Impact of Open-Source on
Commercial Vendors. In Proceedings of the 7th International Conference on Software Reuse. Lecture Notes
in Computer Science, vol. 2319, pp 123-136. 2002.
[5] EGovOS, The Center for Open Source & Government. http://www.egovos.org. 2003.
[6] Elliott, M., Scacchi, W., Free Software Development: Cooperation and Conflict in a Virtual Organizational
Culture. In Koch, S. (ed.), Free/Open Source Software Development. IDEA Publishing Group. 2004 (to
appear).
[7] Gasser, L., Penne, B., Transformation of Sensemaking in Networked Organizations. Paper prepared for:
First International Conference on the Economic and Social Implications of Information Technology,
Washington, D.C. January 27-28, 2003.
[8] Hahn R. (ed.), Government Policy toward Open Source Software. AEI-Brookings Joint Center for
Regulatory Studies, Washington D.C. November 2002.
[9] Markus, M.L., Majchrzak, A., Gasser, L., A Design Theory for Systems that Support Emergent Knowledge
Processes. MIS Quarterly, 26(3). 2002.
[10] NSF-BRAPC, National Science Foundation Blue Ribbon Advisory Panel on Cyberinfrastructure,
Revolutionizing Science and Engineering through Cyber-Infrastructure. February 2003.
[11] Orlikowski, W.J., Knowing in Practice: Enacting a Collective Capability in Distributed Organizing.
Organization Science, 13(3), pp 249-273. May-June 2002.
[12] Parnas, D.L., Clements, P.C., A Rational Design Process: How and Why to Fake it. IEEE Trans. Software
Engineering, 12(2), pp 251-257. 1986.
[13] PITAC (Presidents Information Technology Advisory Committee), Developing Open Source Software to
Advance High End Computing. October 2000.
[14] Ripoche, G., Gasser, L., Scalable Automatic Extraction of Process Models for Understanding F/OSS Bug
Repair. To appear in Proceedings of the 16th International Conference on Software & Systems Engineering
and their Applications (ICSSEA-03). December 2003.
[15] Scacchi, W., Understanding Software Process Redesign using Modeling, Analysis and Simulation,
Software Process--Improvement and Practice. 5(2/3), pp 183-195. 2000.
[16] Scacchi, W., Understanding the Social, Technological, and Policy Implications of Open Source Software
Development. Position paper presented at the NSF Workshop on Open Source Software. January 2002.
[17] Scacchi, W., Understanding the Requirements for Developing Open Source Software Systems. IEE
Proceedings: Software, 149(1), pp 24-39. February 2002.
[18] Scacchi, W., Process Models in Software Engineering. In Marciniak, J. (ed.), Encyclopedia of Software
Engineering, 2nd Edition, pp 993-1005, Wiley. 2002.
[19] Scacchi, W., Open EC/B: A Case Study in Electronic Commerce and Open Source Software Development.
Working paper, Institute for Software Research, UC Irvine. July 2002.
[20] Scacchi, W., Free/Open Source Software Development Practices in the Computer Game Community.
Submitted for publication. April 2003.
[21] Scacchi, W., Understanding Free/Open Source Software Evolution: Applying, Breaking and Rethinking the
Laws of Software Evolution. Submitted for publication. April 2003.
5/6
6. [22] Scacchi, W., When is Free/Open Source Software Development Faster, Better, and Cheaper than Software
Engineering? In Koch, S. (ed.), Free/Open Source Software Development. IDEA Publishing Group, 2004
(to appear).
[23] Truex, D., Baskerville, R., Klein, H., Growing Systems in an Emergent Organization. Communications of
the ACM, 42(8), pp 117-123. 1999.
[24] Vixie, P., Software Engineering. In DiBona, C., Ockman, S., Stone, M. (eds.), Open Sources: Voices from
the Open Source Revolution. pp 91-100, O’Reilly, Sebastopol, CA. 1999.
6/6