SlideShare ist ein Scribd-Unternehmen logo
1 von 33
On the Application of Social Data
Science to Address Societal
Challenges
Presenting: Miriam Fernandez
@miriam_fs
fernandezmiriam
@miriamfs
1
Who we are?
2
“All human beings
are born free and equal in dignity and
rights. They are endowed
with reason and conscience and
should act towards one another in
a spirit of brotherhood”
Universal Declaration of Human Rights. Paris 10th Dec 1948
3
Discrimination
Extremism and Violence
Inequality
Polarisation
MisinformationClimate Crisis
Societal Challenges
Hate
Technology: Perpetuating and
Exacerbating the problem
5
Social
Data
Science
Social Data Science
6
7
Policing
8
9
10
Child Grooming
• Premeditated
behaviour intending
to secure the trust of
a minor as a first step
towards future
engagement in
sexual conduct.
Claire Lilley, Ruth Ball, Heather Vernon,
The experiences of 11-16 year olds on
social networking sites, NSPCC 2014
“findings show
that approximately
190,000 UK children
(1 in 58) will suffer contact
sexual abuse by a non-related
adult before turning 18, with
approximately 10,000 new child
victims of contact sexual abuse
being reported in the UK each
year.”
Child Grooming
11
Child Grooming
Olson’s psychological theory of luring communication (LCT)
Grooming data
• Classification results:
– Trust development: 79% P, 82% R, 81% F1
– Grooming stage: 88% P, 89% R, 88% F1
– Physical approach: 87% P, 89% R, 88% F1
Cano et al. Detecting child grooming behaviour patterns on social media. SocInfo 2014
12
13
Online Radicalisation
Social Media Propaganda and
Recruiting
Islamic State in Iraq and Syria (ISIS)
14
15
Radical Terminology: Usage
Divergence
112 pro-ISIS
Twitter
accounts
112 “general”
Twitter accounts
similar
terminology
Radical Terminology
Fernandez., et al. Contextual Semantics For Radicalisation Detection on Twitter. SW4SG Workshop. International
16
Semantic Graph-based Approach for
Pro-ISIS Stance Detection
Tweets
Conceptual.
Semantics.
Extraction
DBpedia
Semantic.Graph.
Representation
Frequent.Semantic.
Subgraph.Mining
Classifier.Training
ISIS
Syria
Jihadist Group
Country (Military Intervention Against ISIL, place, Syria)
Entities Concepts Semantic Relations
86.3 86.3
84.8
86
91.7
84.4 84.4
81
87.1
92.8
80
82
84
86
88
90
92
94
Unigrams Sentiment Topics Network Semantics
anti-ISIS pro-ISIS
Saif, H., et al. A semantic graph-based approach for radicalisation detection on social media. European semantic web conference. Springer, 2017
17
Micro or
Individual roots
Macro or
Global roots
Meso or
Group roots
Radicalisation
Influence
Content from
friends
Authored
posts
Content from news
and other websites
Radicalisation Influence
• Individual: similarity of own content to
radicalisation terminology
• Social: similarity of retweeted content from
followees to radicalization terminology
• Global: similarity of content shared from news
and websites to radicalization terminology
Fernandez, M.; Asif M; Alani, H. Understanding the roots of radicalisation on Twitter. WebScience 2018 Best paper award!
Cooperation
Social Science & Computer Science
18
Radicalisation Influence
Radicalisation Influence
Radicalisation Lexicon
w1
w2
w3
19
Social Influence
Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019.
• The network is the essence of social media
platforms.
• Harm propagates across the network, and
influences recipients over time.
• Need to protect and alert users to harmful
influences and influencers.
• Monitor and regulate the use of
networking recommendation algorithms.
Individual influence: similarity of own content to radicalisation terminology
Socialinfluence:similarityofretweeted
contenttoradicalisationterminology
Tools to measure radicalisation influence and behaviour
20
Challenges
Fernadez et al. Artificial Intelligence and Online Extremism: Challenges and Opportunities. Taylor and Francis. 2020.
Be very aware of
the challenges!
21
22
Extreme Misogyny
Justification of sexual violence "If a woman
gets impregnated by a rapist then the child will
have a high probability of reproductive success.
This is why it is so common for women to have
rape fantasies, and why a woman's fertility
skyrockets when she is being raped."
Attribution of blame “Primary Education is Essentially Hiring
Overpaid Whores to Babysit and Brainwash your Children”
Objectification of women "Every female is born
with the key to our salvation between her legs...
When they get imprisoned, their precious
resources waste away while we incels starve here.
The solution is for the government to employ
incels to rape female criminals."
23
24Farrell et all. Exploring Misogyny across the Manosphere in Reddit. WebScience 2019
Farrell et all. On the use of Jargon and Word Embeddings to Explore Identity within the Reddit's Manosphere. WebScience 2020
● Grounded on exploring feminist models at scale
● Utilising a dataset of 6M posts, 300K conversations on
Reddit
● Observing that data over a longer period of time (2011-
2018)
● Lexicon of Hate 1,300 annotated terms from 9 compiled
lexicons under 9 categories from feminist studies
● Using word embeddings to understand identify and culture
(jargon and neologisms).
Analysing the Manosphere
Groups
r/MGTOW
r/Braincels
r/BadWomensAnatomy
r/IncelsInAction
r/IncelTears
r/Trufemcels
r/IncelsWithoutHate
25
Misinformation
26
Types of Mis- and Dis- Information
7 Types of Mis- and Dis-information (Credit: Claire Wardle, First Draft)
27
Dimensions of combating online
misinformation
• Misinformation content detection
– Are misinformation content and sources
automatically identified? Are streams of information
automatically monitored? Is relevant corrective
information identified as well?
• Misinformation dynamics
– Are patterns of misinformation flow identified and
predicted? Is demographic and behavioural
information considered to understand and predict
misinformation dynamics?
• Content Validation
– Is misinformation validated and fact checked? Are
the users involved in the content validation process?
• Misinformation management
– Are citizens’ perceptions and behaviour with regards
to processing and sharing misinformation studied
and monitored? Are intervention strategies put in
place to handle the effects of misinformation?
Simply presenting people with
corrective information is likely to fail in
changing their salient beliefs and
opinions, or may, even, reinforce them
Fernandez et al. Online Misinformation Challenges and Future Directions. The 2018 Web Conference Companion.
28
Misinfo.me: Who is interacting with
misinformation?
Mensio et al. MisinfoMe: Who’s Interacting with Misinformation? In: 18th International Semantic Web Conference (ISWC 2019): Posters & Demos
29
30
Education
What is OUAnalyse?
We are hereHistory Future we can affect
StartOpening
VLE
A1 A3A2 End
VLE1 VLE2 VLE3VLE0 VLEn
Identify students at risk of failing the module as early as possible so that OU
intervention is efficient and meaningful.
https://analyse.kmi.open.ac.uk/AnalyseDashboard
31
Social Data Science to Address Societal
Challenges
• Understand the problems and their multiple dimensions
– Look at the problem from multiple lenses
• Computer Science
• Social Science
• Psychology
• Policy
• Law
• Understand the diversity of users & their behaviours
– Bring them closer to the proposed solutions (co-create!)
– User-Centric metrics
• Capture the context!
– Understand the semantics behind user needs and content meanings
• Ethics
32
33
On the Application of User Centric Data Science to
Address Societal Challenges
Miriam Fernandez
Knowledge Media Institute
Open University, UK
@miriam_fs
@miriamfs
Credit to all these fantastic people!

Weitere ähnliche Inhalte

Was ist angesagt?

Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication NiraliMakvana1
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1Dave King
 
Social media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaSocial media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaIan McCarthy
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaDavid Thompson
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyBill Densmore
 
Fanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked worldFanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked worldPOLIS LSE
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper handleyrr
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the GovernmentKady Chiu
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsLea Shanley
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive SummaryEvan Beck
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Ian McCarthy
 
Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Paul Bradshaw
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglyJosh Cowls
 
Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...Ian McCarthy
 
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590Nicholas Tancredi
 

Was ist angesagt? (19)

Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1
 
Social media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaSocial media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social media
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparency
 
Fanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked worldFanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked world
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive Summary
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...
 
Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 
Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...
 
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
 

Ähnlich wie Research seminar Queen Mary University of London (CogSci)

Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...Nadia Naffi, Ph.D.
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...Michelle Ferrier
 
Standing Against the Online White Nationalist Movement
Standing Against the Online White Nationalist MovementStanding Against the Online White Nationalist Movement
Standing Against the Online White Nationalist Movementkbesnoy
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocialMedia.org
 
Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)InterMedia Consulting
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentationMonte VanDyke
 
Education technology - a feminist space?
Education technology - a feminist space?Education technology - a feminist space?
Education technology - a feminist space?Helen Beetham
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...friendscb
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraDiane Rasmussen Pennington
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae Brandtzæg
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overloadGmeconline
 
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...Renee Hobbs
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
 
The Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for ScientistsThe Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for ScientistsCraig McClain
 
Externalization Case Study
Externalization Case StudyExternalization Case Study
Externalization Case StudyLeslie Lee
 
Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Domino Data Lab
 

Ähnlich wie Research seminar Queen Mary University of London (CogSci) (20)

Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
 
Standing Against the Online White Nationalist Movement
Standing Against the Online White Nationalist MovementStanding Against the Online White Nationalist Movement
Standing Against the Online White Nationalist Movement
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
 
Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
 
FINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptxFINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptx
 
Education technology - a feminist space?
Education technology - a feminist space?Education technology - a feminist space?
Education technology - a feminist space?
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 era
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
AIISC’s research in  Social Good/Social Harm,  Public Health and EpidemiologyAIISC’s research in  Social Good/Social Harm,  Public Health and Epidemiology
AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overload
 
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
 
The Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for ScientistsThe Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for Scientists
 
Externalization Case Study
Externalization Case StudyExternalization Case Study
Externalization Case Study
 
Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing
 

Mehr von Miriam Fernandez

Mining Social Media Data For Policing
Mining Social Media Data For PolicingMining Social Media Data For Policing
Mining Social Media Data For PolicingMiriam Fernandez
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media DataMiriam Fernandez
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsMiriam Fernandez
 
Slides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxSlides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxMiriam Fernandez
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for PolicingMiriam Fernandez
 
OUSocial OUSocMed conference
OUSocial OUSocMed conference OUSocial OUSocMed conference
OUSocial OUSocMed conference Miriam Fernandez
 
On the use of social media for evidence-based policing
On the use of social media for evidence-based policingOn the use of social media for evidence-based policing
On the use of social media for evidence-based policingMiriam Fernandez
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopMiriam Fernandez
 
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...Miriam Fernandez
 
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookMiriam Fernandez
 
Wm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalWm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalMiriam Fernandez
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Miriam Fernandez
 

Mehr von Miriam Fernandez (17)

Mining Social Media Data For Policing
Mining Social Media Data For PolicingMining Social Media Data For Policing
Mining Social Media Data For Policing
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
Slides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxSlides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptx
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for Policing
 
OUSocial OUSocMed conference
OUSocial OUSocMed conference OUSocial OUSocMed conference
OUSocial OUSocMed conference
 
On the use of social media for evidence-based policing
On the use of social media for evidence-based policingOn the use of social media for evidence-based policing
On the use of social media for evidence-based policing
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs Workshop
 
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
 
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
 
ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4
 
ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3
 
ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2
 
ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1
 
Wm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalWm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-final
 
CAEPIA 2011
CAEPIA 2011CAEPIA 2011
CAEPIA 2011
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Research seminar Queen Mary University of London (CogSci)

  • 1. On the Application of Social Data Science to Address Societal Challenges Presenting: Miriam Fernandez @miriam_fs fernandezmiriam @miriamfs 1
  • 3. “All human beings are born free and equal in dignity and rights. They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood” Universal Declaration of Human Rights. Paris 10th Dec 1948 3
  • 8. 8
  • 9. 9
  • 10. 10 Child Grooming • Premeditated behaviour intending to secure the trust of a minor as a first step towards future engagement in sexual conduct.
  • 11. Claire Lilley, Ruth Ball, Heather Vernon, The experiences of 11-16 year olds on social networking sites, NSPCC 2014 “findings show that approximately 190,000 UK children (1 in 58) will suffer contact sexual abuse by a non-related adult before turning 18, with approximately 10,000 new child victims of contact sexual abuse being reported in the UK each year.” Child Grooming 11
  • 12. Child Grooming Olson’s psychological theory of luring communication (LCT) Grooming data • Classification results: – Trust development: 79% P, 82% R, 81% F1 – Grooming stage: 88% P, 89% R, 88% F1 – Physical approach: 87% P, 89% R, 88% F1 Cano et al. Detecting child grooming behaviour patterns on social media. SocInfo 2014 12
  • 14. Social Media Propaganda and Recruiting Islamic State in Iraq and Syria (ISIS) 14
  • 15. 15
  • 16. Radical Terminology: Usage Divergence 112 pro-ISIS Twitter accounts 112 “general” Twitter accounts similar terminology Radical Terminology Fernandez., et al. Contextual Semantics For Radicalisation Detection on Twitter. SW4SG Workshop. International 16
  • 17. Semantic Graph-based Approach for Pro-ISIS Stance Detection Tweets Conceptual. Semantics. Extraction DBpedia Semantic.Graph. Representation Frequent.Semantic. Subgraph.Mining Classifier.Training ISIS Syria Jihadist Group Country (Military Intervention Against ISIL, place, Syria) Entities Concepts Semantic Relations 86.3 86.3 84.8 86 91.7 84.4 84.4 81 87.1 92.8 80 82 84 86 88 90 92 94 Unigrams Sentiment Topics Network Semantics anti-ISIS pro-ISIS Saif, H., et al. A semantic graph-based approach for radicalisation detection on social media. European semantic web conference. Springer, 2017 17
  • 18. Micro or Individual roots Macro or Global roots Meso or Group roots Radicalisation Influence Content from friends Authored posts Content from news and other websites Radicalisation Influence • Individual: similarity of own content to radicalisation terminology • Social: similarity of retweeted content from followees to radicalization terminology • Global: similarity of content shared from news and websites to radicalization terminology Fernandez, M.; Asif M; Alani, H. Understanding the roots of radicalisation on Twitter. WebScience 2018 Best paper award! Cooperation Social Science & Computer Science 18 Radicalisation Influence
  • 20. Social Influence Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019. • The network is the essence of social media platforms. • Harm propagates across the network, and influences recipients over time. • Need to protect and alert users to harmful influences and influencers. • Monitor and regulate the use of networking recommendation algorithms. Individual influence: similarity of own content to radicalisation terminology Socialinfluence:similarityofretweeted contenttoradicalisationterminology Tools to measure radicalisation influence and behaviour 20
  • 21. Challenges Fernadez et al. Artificial Intelligence and Online Extremism: Challenges and Opportunities. Taylor and Francis. 2020. Be very aware of the challenges! 21
  • 23. Justification of sexual violence "If a woman gets impregnated by a rapist then the child will have a high probability of reproductive success. This is why it is so common for women to have rape fantasies, and why a woman's fertility skyrockets when she is being raped." Attribution of blame “Primary Education is Essentially Hiring Overpaid Whores to Babysit and Brainwash your Children” Objectification of women "Every female is born with the key to our salvation between her legs... When they get imprisoned, their precious resources waste away while we incels starve here. The solution is for the government to employ incels to rape female criminals." 23
  • 24. 24Farrell et all. Exploring Misogyny across the Manosphere in Reddit. WebScience 2019 Farrell et all. On the use of Jargon and Word Embeddings to Explore Identity within the Reddit's Manosphere. WebScience 2020 ● Grounded on exploring feminist models at scale ● Utilising a dataset of 6M posts, 300K conversations on Reddit ● Observing that data over a longer period of time (2011- 2018) ● Lexicon of Hate 1,300 annotated terms from 9 compiled lexicons under 9 categories from feminist studies ● Using word embeddings to understand identify and culture (jargon and neologisms). Analysing the Manosphere Groups r/MGTOW r/Braincels r/BadWomensAnatomy r/IncelsInAction r/IncelTears r/Trufemcels r/IncelsWithoutHate
  • 26. 26
  • 27. Types of Mis- and Dis- Information 7 Types of Mis- and Dis-information (Credit: Claire Wardle, First Draft) 27
  • 28. Dimensions of combating online misinformation • Misinformation content detection – Are misinformation content and sources automatically identified? Are streams of information automatically monitored? Is relevant corrective information identified as well? • Misinformation dynamics – Are patterns of misinformation flow identified and predicted? Is demographic and behavioural information considered to understand and predict misinformation dynamics? • Content Validation – Is misinformation validated and fact checked? Are the users involved in the content validation process? • Misinformation management – Are citizens’ perceptions and behaviour with regards to processing and sharing misinformation studied and monitored? Are intervention strategies put in place to handle the effects of misinformation? Simply presenting people with corrective information is likely to fail in changing their salient beliefs and opinions, or may, even, reinforce them Fernandez et al. Online Misinformation Challenges and Future Directions. The 2018 Web Conference Companion. 28
  • 29. Misinfo.me: Who is interacting with misinformation? Mensio et al. MisinfoMe: Who’s Interacting with Misinformation? In: 18th International Semantic Web Conference (ISWC 2019): Posters & Demos 29
  • 31. What is OUAnalyse? We are hereHistory Future we can affect StartOpening VLE A1 A3A2 End VLE1 VLE2 VLE3VLE0 VLEn Identify students at risk of failing the module as early as possible so that OU intervention is efficient and meaningful. https://analyse.kmi.open.ac.uk/AnalyseDashboard 31
  • 32. Social Data Science to Address Societal Challenges • Understand the problems and their multiple dimensions – Look at the problem from multiple lenses • Computer Science • Social Science • Psychology • Policy • Law • Understand the diversity of users & their behaviours – Bring them closer to the proposed solutions (co-create!) – User-Centric metrics • Capture the context! – Understand the semantics behind user needs and content meanings • Ethics 32
  • 33. 33 On the Application of User Centric Data Science to Address Societal Challenges Miriam Fernandez Knowledge Media Institute Open University, UK @miriam_fs @miriamfs Credit to all these fantastic people!