SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 1 Issue 12 ǁ September. 2017 ǁ PP 25-26
| Volume 1 | Issue 12 | www.ijrtem.com | 25 |
Computational Social Science
1
Matthew N. O. Sadiku || 1
Sarhan M. Musa || 2
Osama M. Musa
1
Roy G. Perry College of Engineering Prairie View A & M University Prairie View, TX77446
2
Ashland Inc. Bridgewater, NJ 08807
ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with
computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists
contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and
model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief
introduction to computational social science.
Key Words: computational social science, social-computational systems, social simulation models, agent-based models
I. INTRODUCTION
The ongoing worldwide computerization has created new opportunities for researchers. The increasingly powerful instruments of
computational have attracted considerable interests from researchers in relevant fields. Computing technologies such as data
mining, machine learning, and statistics have been developed. The development of this field created new scientific disciplines
like: computational biology, computational chemistry, computational economics, computational electrodynamics, computational
electromagnetics, computational finance, computational economics, computational fluid dynamics, computational geophysics,
computational mechanics, computational physics, computational science, computational mathematics, computational sociology,
and computational statistics [1]. Computational social science (CSS) can span all the five traditional social science disciplines:
psychology, anthropology, economics, political science, and sociology. It is to be the work of teams of computer scientists and
social scientists. It is a multidisciplinary field that includes include computational economics, computational sociology, distributed
algorithms, statistics, machine learning, data mining, and several substantive social science fields, including sociology,
economics, psychology, political science, and marketing. Computational social scientists develop tools that enable studying how
humans think, feel, or behave in social situations (psychology), relate to each other (sociology), govern themselves (political
science), handle wealth (socioeconomics), and create culture (anthropology) [2].
II. APPLICATIONS
Computational social science is providing tools to process the vast amount of data emanating from social networking websites. It
is taking place in places like Google, Yahoo, and the National Security Agency. Computational social science includes five core
techniques: automated information extraction, geospatial analysis, complexity modeling, social simulation models, and social
network analysis [3]. One reason human societies are complex is that there are several non-linear interactions between people.
Society emerges from a constant, dynamic change. Agent-based simulations and models are developed by social scientist to
explore social behavior and economic systems. The models are basically a form of mathematical model written in computer code.
Early programming frameworks used languages such as FORTRAN, Basic, Pascal, and C. Recent efforts employ C++, Java, and
Phyton [4]. Social scientists also use computing and informatics to explore social aspects of human-computer interaction.
Anthropologists are using CSS methods to model social dynamics, test anthropological theory, and inform policy. Social networks
are important in social sciences. The data in such networks can be massive and unstructured. It may require using big data
architecture and the funneling method that handles the manageability of the data. Such data come in pictures, online purchases,
mobile transactions, etc. The era of big data has made it possible for researchers to achieve transformations on how we study
social phenomena [5,6].
III. ISSUES AND CHALLENGES
Although computational social science can be a great benefit, we must be aware of its challenges, risks, and potential for abuse by
governments and private entities. Without resolving these ethical issues and obstacles that stand in the way of a computational
social science, advancements in CSS may put the public at a risk. Understanding computational social science in both of its forms
within the IC is an important and contemporary challenge. In social and economic interactions, there are possibilities for conflicts
to arise. For example, there has been Internet presence of hate and extremist groups. CSS requires technical skills beyond the
traditional confines of social science and may need collaboration with computer scientists. (For example, social scientists are
trained to handle big data.) Such an interdisciplinary effort is often challenging due to different backgrounds of the researchers
involved. CSS models are usually developed by highly specialized multidisciplinary team of experts and may take months. This
Computational Social Science..
| Volume 1 | Issue 12 | www.ijrtem.com | 26 |
way of building models is slow and may not reflect the dynamicity of the social space. Crowd sourced modeling may be a solution
to this problem [7].
The vast quantities of data used for computational social science analysis today are mainly being controlled by business and
government. Computational social science may make surveillance, profiling of individuals, and targeting easily accessible. The
potential damage from inappropriate disclosure of information is evident. As computational social science develops, issues
concerning methodology and ethics should to be considered. Ethics deals with how information is accessed and how the
information gained it is used. Guidelines and regulation must set the limits on the collection, retention, use, and disclosure of
personal sensitive information [8]. Computational social science raises inescapable questions about the privacy and politics of data
science research, particularly when it focuses on applications in government and the private sector. The privacy issue must be
resolved by developing technologies that protect privacy while preserving data essential for research.
IV. CONCLUSION
Computational social science is practice-oriented discipline, where theoretical concerns have been pushed to the background. The
emergence of the data-driven computational social science has been slow, mainly spearheaded by computer scientists and social
scientists. Powerful computer simulations have been a particular boon to the young field. Computational social science, with its
focus on large-scale data and social media data, offers great opportunities with serious research challenges. The potential value of
CSS is gaining attention in several disciplines. To meet the need for computational social scientists, courses and degrees are being
offered on CSS at various universities. Graduate students are required to have as background a bachelor's degree in social
sciences, computer science, engineering, or a relevant discipline. Additional information on CSS is available in several books in
Amazon.com.
REFERENCES
[1] R. C. Damaceanu, Applied Computational Mathematics in Social Sciences. Emirate of Sharjah, United Arab Emirates, Bentham
Science Publishers, 2010.
[2] M. Strohmaier and C. Wagner, “Computational social science for the world wide web,” IEEE Intelligent Systems, September/October
2014, pp. 84-88.
[3] B. F. Welles and I. Meirelles, “Visualizing computational social science: the multiple lives of a complex image,” Science
Communication, vol. 37, no. 1, 2014, pp. 34-58.
[4] L. A. Kuznar, “High-fidelity computational social science in anthropology: prospects for developing a comparative framework,”
Social Science Computer Review, vol. 24, no. 1, Spring 2006, pp. 15-29.
[5] E. Ch’ng, “The value of using big data technologies in computational social science,” Proceedings of the 2014 International
Conference on Big Data Science and Computing, Beijing, China, August 2014.
[6] R. M. Chang, R. J. Kauffman, and Y. Kwon, “Understanding the paradigm shift to computational social science in the presence of big
data,” Decision Support Systems, vol. 63, 2014, pp. 67-80.
[7] A. Ruvinsky and A. Roberts, “Building computational social science models from crowd insight,” Proceedings of the IEEE
International Conference on Multimedia and Expo Workshops, October 2013.
[8] A. Oboler, K. Welsh, and L. Cruz, “The danger of big data: social media as computational social science,” Peer-Reviewed Journal on
the Internet, vol. 17, no. 7, July 2012.
AUTHORS
Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie View A&M
University, Prairie View, Texas. He is the author of several books and papers. His areas of research interest include
computational electromagnetics and computer networks. He is a fellow of IEEE.
Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M University, Texas. He has
been the director of Prairie View Networking Academy, Texas, since 2004. He is an LTD Sprint and Boeing Welliver Fellow.
Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also serves as a member
of the Advisory Board at Manhattan College’s Department of Electrical and Computer Engineering as well as a member of the
Board of Trustees at Chemists' Club of NYC. Additionally, he sits on the Advisory Board of the International Journal of
Humanitarian Technology (IJHT).

Más contenido relacionado

La actualidad más candente

The Internet is a magnifying glass
The Internet is a magnifying glassThe Internet is a magnifying glass
The Internet is a magnifying glassSorin Adam Matei
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysisu3037519
 
Sorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum VitaeSorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum VitaeSorin Adam Matei
 
Network Theory
Network TheoryNetwork Theory
Network TheorySon Maroon
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network AnalysisOlivier Serrat
 
UMN - Social Computing Collaborative
UMN - Social Computing CollaborativeUMN - Social Computing Collaborative
UMN - Social Computing Collaborativenorapaul
 
Social computing meet & greet
Social computing meet & greetSocial computing meet & greet
Social computing meet & greetAngela Brandt
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslideskcarter14
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNAMYRA School of Business
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation Ratnesh Shah
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network TheorySocialphysicist
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorIAEME Publication
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesIIIT Hyderabad
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottiercitasa
 

La actualidad más candente (20)

The Internet is a magnifying glass
The Internet is a magnifying glassThe Internet is a magnifying glass
The Internet is a magnifying glass
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Sorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum VitaeSorin Adam Matei Curriculum Vitae
Sorin Adam Matei Curriculum Vitae
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
 
UMN - Social Computing Collaborative
UMN - Social Computing CollaborativeUMN - Social Computing Collaborative
UMN - Social Computing Collaborative
 
Social computing meet & greet
Social computing meet & greetSocial computing meet & greet
Social computing meet & greet
 
Karenclassslides
KarenclassslidesKarenclassslides
Karenclassslides
 
Netsci10 report
Netsci10 reportNetsci10 report
Netsci10 report
 
2014 ATHS Summer
2014 ATHS Summer2014 ATHS Summer
2014 ATHS Summer
 
Making the invisible visible through SNA
Making the invisible visible through SNAMaking the invisible visible through SNA
Making the invisible visible through SNA
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
11 15
11 1511 15
11 15
 
Multimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behaviorMultimode network based efficient and scalable learning of collective behavior
Multimode network based efficient and scalable learning of collective behavior
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & Challenges
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Dan Trottier
Dan TrottierDan Trottier
Dan Trottier
 

Similar a Computational Social Science

Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...The Higher Education Academy
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencySimon Buckingham Shum
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...AIRCC Publishing Corporation
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...ijcsit
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceChristine Williams
 
Analíticas del aprendizaje: una perspectiva crítica
Analíticas del aprendizaje: una perspectiva críticaAnalíticas del aprendizaje: una perspectiva crítica
Analíticas del aprendizaje: una perspectiva críticaCENT
 
Social Computing
Social ComputingSocial Computing
Social ComputingMike Tan
 
Social Science Landscape for Web Observatories
Social Science Landscape for Web ObservatoriesSocial Science Landscape for Web Observatories
Social Science Landscape for Web ObservatoriesDavid De Roure
 
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Sebastian Benthall
 
Understanding everyday users’ perception of socio-technical issues through s...
Understanding everyday users’ perception of  socio-technical issues through s...Understanding everyday users’ perception of  socio-technical issues through s...
Understanding everyday users’ perception of socio-technical issues through s...Ahreum lee
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremhaifa rzem
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusvafopoulos
 
Data socialscienceprogramme
Data socialscienceprogrammeData socialscienceprogramme
Data socialscienceprogrammedan mcquillan
 
Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...Sociology@Essex
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)Han Woo PARK
 
Social Machines Paradigm
Social Machines ParadigmSocial Machines Paradigm
Social Machines ParadigmDavid De Roure
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Han Woo PARK
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING ijcsit
 

Similar a Computational Social Science (20)

Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...Making our mark: the important role of social scientists in the ‘era of big d...
Making our mark: the important role of social scientists in the ‘era of big d...
 
Learning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • AgencyLearning Informatics: AI • Analytics • Accountability • Agency
Learning Informatics: AI • Analytics • Accountability • Agency
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
 
A Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer ScienceA Survey On Recent Research Areas In Computer Science
A Survey On Recent Research Areas In Computer Science
 
Analíticas del aprendizaje: una perspectiva crítica
Analíticas del aprendizaje: una perspectiva críticaAnalíticas del aprendizaje: una perspectiva crítica
Analíticas del aprendizaje: una perspectiva crítica
 
Social Computing
Social ComputingSocial Computing
Social Computing
 
Social Science Landscape for Web Observatories
Social Science Landscape for Web ObservatoriesSocial Science Landscape for Web Observatories
Social Science Landscape for Web Observatories
 
Ijciet 10 02_032
Ijciet 10 02_032Ijciet 10 02_032
Ijciet 10 02_032
 
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
 
Understanding everyday users’ perception of socio-technical issues through s...
Understanding everyday users’ perception of  socio-technical issues through s...Understanding everyday users’ perception of  socio-technical issues through s...
Understanding everyday users’ perception of socio-technical issues through s...
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janus
 
Data socialscienceprogramme
Data socialscienceprogrammeData socialscienceprogramme
Data socialscienceprogramme
 
Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...Scraping the Social? Issues in real-time social research (Departmental Semina...
Scraping the Social? Issues in real-time social research (Departmental Semina...
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)
 
Social Machines Paradigm
Social Machines ParadigmSocial Machines Paradigm
Social Machines Paradigm
 
Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)Tfsc disc 2014 si proposal (30 june2014)
Tfsc disc 2014 si proposal (30 june2014)
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
 

Más de journal ijrtem

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...journal ijrtem
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...journal ijrtem
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...journal ijrtem
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0journal ijrtem
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERjournal ijrtem
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...journal ijrtem
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principlesjournal ijrtem
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management journal ijrtem
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...journal ijrtem
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessjournal ijrtem
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...journal ijrtem
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...journal ijrtem
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...journal ijrtem
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident journal ijrtem
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management journal ijrtem
 

Más de journal ijrtem (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...
 
ORGANIC FOODS
ORGANIC FOODSORGANIC FOODS
ORGANIC FOODS
 
MOLECULAR COMPUTING
MOLECULAR COMPUTINGMOLECULAR COMPUTING
MOLECULAR COMPUTING
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principles
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management
 

Último

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Último (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Computational Social Science

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 1 Issue 12 ǁ September. 2017 ǁ PP 25-26 | Volume 1 | Issue 12 | www.ijrtem.com | 25 | Computational Social Science 1 Matthew N. O. Sadiku || 1 Sarhan M. Musa || 2 Osama M. Musa 1 Roy G. Perry College of Engineering Prairie View A & M University Prairie View, TX77446 2 Ashland Inc. Bridgewater, NJ 08807 ABSTRACT : Computational social science (CSS) is an academic discipline that combines the traditional social sciences with computer science. While social scientists provide research questions, data sources, and acquisition methods, computer scientists contribute mathematical models and computational tools. CSS uses computationally methods and statistical tools to analyze and model social phenomena, social structures, and human social behavior. The purpose of this paper is to provide a brief introduction to computational social science. Key Words: computational social science, social-computational systems, social simulation models, agent-based models I. INTRODUCTION The ongoing worldwide computerization has created new opportunities for researchers. The increasingly powerful instruments of computational have attracted considerable interests from researchers in relevant fields. Computing technologies such as data mining, machine learning, and statistics have been developed. The development of this field created new scientific disciplines like: computational biology, computational chemistry, computational economics, computational electrodynamics, computational electromagnetics, computational finance, computational economics, computational fluid dynamics, computational geophysics, computational mechanics, computational physics, computational science, computational mathematics, computational sociology, and computational statistics [1]. Computational social science (CSS) can span all the five traditional social science disciplines: psychology, anthropology, economics, political science, and sociology. It is to be the work of teams of computer scientists and social scientists. It is a multidisciplinary field that includes include computational economics, computational sociology, distributed algorithms, statistics, machine learning, data mining, and several substantive social science fields, including sociology, economics, psychology, political science, and marketing. Computational social scientists develop tools that enable studying how humans think, feel, or behave in social situations (psychology), relate to each other (sociology), govern themselves (political science), handle wealth (socioeconomics), and create culture (anthropology) [2]. II. APPLICATIONS Computational social science is providing tools to process the vast amount of data emanating from social networking websites. It is taking place in places like Google, Yahoo, and the National Security Agency. Computational social science includes five core techniques: automated information extraction, geospatial analysis, complexity modeling, social simulation models, and social network analysis [3]. One reason human societies are complex is that there are several non-linear interactions between people. Society emerges from a constant, dynamic change. Agent-based simulations and models are developed by social scientist to explore social behavior and economic systems. The models are basically a form of mathematical model written in computer code. Early programming frameworks used languages such as FORTRAN, Basic, Pascal, and C. Recent efforts employ C++, Java, and Phyton [4]. Social scientists also use computing and informatics to explore social aspects of human-computer interaction. Anthropologists are using CSS methods to model social dynamics, test anthropological theory, and inform policy. Social networks are important in social sciences. The data in such networks can be massive and unstructured. It may require using big data architecture and the funneling method that handles the manageability of the data. Such data come in pictures, online purchases, mobile transactions, etc. The era of big data has made it possible for researchers to achieve transformations on how we study social phenomena [5,6]. III. ISSUES AND CHALLENGES Although computational social science can be a great benefit, we must be aware of its challenges, risks, and potential for abuse by governments and private entities. Without resolving these ethical issues and obstacles that stand in the way of a computational social science, advancements in CSS may put the public at a risk. Understanding computational social science in both of its forms within the IC is an important and contemporary challenge. In social and economic interactions, there are possibilities for conflicts to arise. For example, there has been Internet presence of hate and extremist groups. CSS requires technical skills beyond the traditional confines of social science and may need collaboration with computer scientists. (For example, social scientists are trained to handle big data.) Such an interdisciplinary effort is often challenging due to different backgrounds of the researchers involved. CSS models are usually developed by highly specialized multidisciplinary team of experts and may take months. This
  • 2. Computational Social Science.. | Volume 1 | Issue 12 | www.ijrtem.com | 26 | way of building models is slow and may not reflect the dynamicity of the social space. Crowd sourced modeling may be a solution to this problem [7]. The vast quantities of data used for computational social science analysis today are mainly being controlled by business and government. Computational social science may make surveillance, profiling of individuals, and targeting easily accessible. The potential damage from inappropriate disclosure of information is evident. As computational social science develops, issues concerning methodology and ethics should to be considered. Ethics deals with how information is accessed and how the information gained it is used. Guidelines and regulation must set the limits on the collection, retention, use, and disclosure of personal sensitive information [8]. Computational social science raises inescapable questions about the privacy and politics of data science research, particularly when it focuses on applications in government and the private sector. The privacy issue must be resolved by developing technologies that protect privacy while preserving data essential for research. IV. CONCLUSION Computational social science is practice-oriented discipline, where theoretical concerns have been pushed to the background. The emergence of the data-driven computational social science has been slow, mainly spearheaded by computer scientists and social scientists. Powerful computer simulations have been a particular boon to the young field. Computational social science, with its focus on large-scale data and social media data, offers great opportunities with serious research challenges. The potential value of CSS is gaining attention in several disciplines. To meet the need for computational social scientists, courses and degrees are being offered on CSS at various universities. Graduate students are required to have as background a bachelor's degree in social sciences, computer science, engineering, or a relevant discipline. Additional information on CSS is available in several books in Amazon.com. REFERENCES [1] R. C. Damaceanu, Applied Computational Mathematics in Social Sciences. Emirate of Sharjah, United Arab Emirates, Bentham Science Publishers, 2010. [2] M. Strohmaier and C. Wagner, “Computational social science for the world wide web,” IEEE Intelligent Systems, September/October 2014, pp. 84-88. [3] B. F. Welles and I. Meirelles, “Visualizing computational social science: the multiple lives of a complex image,” Science Communication, vol. 37, no. 1, 2014, pp. 34-58. [4] L. A. Kuznar, “High-fidelity computational social science in anthropology: prospects for developing a comparative framework,” Social Science Computer Review, vol. 24, no. 1, Spring 2006, pp. 15-29. [5] E. Ch’ng, “The value of using big data technologies in computational social science,” Proceedings of the 2014 International Conference on Big Data Science and Computing, Beijing, China, August 2014. [6] R. M. Chang, R. J. Kauffman, and Y. Kwon, “Understanding the paradigm shift to computational social science in the presence of big data,” Decision Support Systems, vol. 63, 2014, pp. 67-80. [7] A. Ruvinsky and A. Roberts, “Building computational social science models from crowd insight,” Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, October 2013. [8] A. Oboler, K. Welsh, and L. Cruz, “The danger of big data: social media as computational social science,” Peer-Reviewed Journal on the Internet, vol. 17, no. 7, July 2012. AUTHORS Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie View A&M University, Prairie View, Texas. He is the author of several books and papers. His areas of research interest include computational electromagnetics and computer networks. He is a fellow of IEEE. Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M University, Texas. He has been the director of Prairie View Networking Academy, Texas, since 2004. He is an LTD Sprint and Boeing Welliver Fellow. Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also serves as a member of the Advisory Board at Manhattan College’s Department of Electrical and Computer Engineering as well as a member of the Board of Trustees at Chemists' Club of NYC. Additionally, he sits on the Advisory Board of the International Journal of Humanitarian Technology (IJHT).