SlideShare una empresa de Scribd logo
1 de 33
On the Application of Social Data
Science to Address Societal
Challenges
Presenting: Miriam Fernandez
@miriam_fs
fernandezmiriam
@miriamfs
1
Who we are?
2
“All human beings
are born free and equal in dignity and
rights. They are endowed
with reason and conscience and
should act towards one another in
a spirit of brotherhood”
Universal Declaration of Human Rights. Paris 10th Dec 1948
3
Discrimination
Extremism and Violence
Inequality
Polarisation
MisinformationClimate Crisis
Societal Challenges
Hate
Technology: Perpetuating and
Exacerbating the problem
5
Social
Data
Science
Social Data Science
6
7
Policing
8
9
10
Child Grooming
• Premeditated
behaviour intending
to secure the trust of
a minor as a first step
towards future
engagement in
sexual conduct.
Claire Lilley, Ruth Ball, Heather Vernon,
The experiences of 11-16 year olds on
social networking sites, NSPCC 2014
“findings show
that approximately
190,000 UK children
(1 in 58) will suffer contact
sexual abuse by a non-related
adult before turning 18, with
approximately 10,000 new child
victims of contact sexual abuse
being reported in the UK each
year.”
Child Grooming
11
Child Grooming
Olson’s psychological theory of luring communication (LCT)
Grooming data
• Classification results:
– Trust development: 79% P, 82% R, 81% F1
– Grooming stage: 88% P, 89% R, 88% F1
– Physical approach: 87% P, 89% R, 88% F1
Cano et al. Detecting child grooming behaviour patterns on social media. SocInfo 2014
12
13
Online Radicalisation
Social Media Propaganda and
Recruiting
Islamic State in Iraq and Syria (ISIS)
14
15
Radical Terminology: Usage
Divergence
112 pro-ISIS
Twitter
accounts
112 “general”
Twitter accounts
similar
terminology
Radical Terminology
Fernandez., et al. Contextual Semantics For Radicalisation Detection on Twitter. SW4SG Workshop. International
16
Semantic Graph-based Approach for
Pro-ISIS Stance Detection
Tweets
Conceptual.
Semantics.
Extraction
DBpedia
Semantic.Graph.
Representation
Frequent.Semantic.
Subgraph.Mining
Classifier.Training
ISIS
Syria
Jihadist Group
Country (Military Intervention Against ISIL, place, Syria)
Entities Concepts Semantic Relations
86.3 86.3
84.8
86
91.7
84.4 84.4
81
87.1
92.8
80
82
84
86
88
90
92
94
Unigrams Sentiment Topics Network Semantics
anti-ISIS pro-ISIS
Saif, H., et al. A semantic graph-based approach for radicalisation detection on social media. European semantic web conference. Springer, 2017
17
Micro or
Individual roots
Macro or
Global roots
Meso or
Group roots
Radicalisation
Influence
Content from
friends
Authored
posts
Content from news
and other websites
Radicalisation Influence
• Individual: similarity of own content to
radicalisation terminology
• Social: similarity of retweeted content from
followees to radicalization terminology
• Global: similarity of content shared from news
and websites to radicalization terminology
Fernandez, M.; Asif M; Alani, H. Understanding the roots of radicalisation on Twitter. WebScience 2018 Best paper award!
Cooperation
Social Science & Computer Science
18
Radicalisation Influence
Radicalisation Influence
Radicalisation Lexicon
w1
w2
w3
19
Social Influence
Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019.
• The network is the essence of social media
platforms.
• Harm propagates across the network, and
influences recipients over time.
• Need to protect and alert users to harmful
influences and influencers.
• Monitor and regulate the use of
networking recommendation algorithms.
Individual influence: similarity of own content to radicalisation terminology
Socialinfluence:similarityofretweeted
contenttoradicalisationterminology
Tools to measure radicalisation influence and behaviour
20
Challenges
Fernadez et al. Artificial Intelligence and Online Extremism: Challenges and Opportunities. Taylor and Francis. 2020.
Be very aware of
the challenges!
21
22
Extreme Misogyny
Justification of sexual violence "If a woman
gets impregnated by a rapist then the child will
have a high probability of reproductive success.
This is why it is so common for women to have
rape fantasies, and why a woman's fertility
skyrockets when she is being raped."
Attribution of blame “Primary Education is Essentially Hiring
Overpaid Whores to Babysit and Brainwash your Children”
Objectification of women "Every female is born
with the key to our salvation between her legs...
When they get imprisoned, their precious
resources waste away while we incels starve here.
The solution is for the government to employ
incels to rape female criminals."
23
24Farrell et all. Exploring Misogyny across the Manosphere in Reddit. WebScience 2019
Farrell et all. On the use of Jargon and Word Embeddings to Explore Identity within the Reddit's Manosphere. WebScience 2020
● Grounded on exploring feminist models at scale
● Utilising a dataset of 6M posts, 300K conversations on
Reddit
● Observing that data over a longer period of time (2011-
2018)
● Lexicon of Hate 1,300 annotated terms from 9 compiled
lexicons under 9 categories from feminist studies
● Using word embeddings to understand identify and culture
(jargon and neologisms).
Analysing the Manosphere
Groups
r/MGTOW
r/Braincels
r/BadWomensAnatomy
r/IncelsInAction
r/IncelTears
r/Trufemcels
r/IncelsWithoutHate
25
Misinformation
26
Types of Mis- and Dis- Information
7 Types of Mis- and Dis-information (Credit: Claire Wardle, First Draft)
27
Dimensions of combating online
misinformation
• Misinformation content detection
– Are misinformation content and sources
automatically identified? Are streams of information
automatically monitored? Is relevant corrective
information identified as well?
• Misinformation dynamics
– Are patterns of misinformation flow identified and
predicted? Is demographic and behavioural
information considered to understand and predict
misinformation dynamics?
• Content Validation
– Is misinformation validated and fact checked? Are
the users involved in the content validation process?
• Misinformation management
– Are citizens’ perceptions and behaviour with regards
to processing and sharing misinformation studied
and monitored? Are intervention strategies put in
place to handle the effects of misinformation?
Simply presenting people with
corrective information is likely to fail in
changing their salient beliefs and
opinions, or may, even, reinforce them
Fernandez et al. Online Misinformation Challenges and Future Directions. The 2018 Web Conference Companion.
28
Misinfo.me: Who is interacting with
misinformation?
Mensio et al. MisinfoMe: Who’s Interacting with Misinformation? In: 18th International Semantic Web Conference (ISWC 2019): Posters & Demos
29
30
Education
What is OUAnalyse?
We are hereHistory Future we can affect
StartOpening
VLE
A1 A3A2 End
VLE1 VLE2 VLE3VLE0 VLEn
Identify students at risk of failing the module as early as possible so that OU
intervention is efficient and meaningful.
https://analyse.kmi.open.ac.uk/AnalyseDashboard
31
Social Data Science to Address Societal
Challenges
• Understand the problems and their multiple dimensions
– Look at the problem from multiple lenses
• Computer Science
• Social Science
• Psychology
• Policy
• Law
• Understand the diversity of users & their behaviours
– Bring them closer to the proposed solutions (co-create!)
– User-Centric metrics
• Capture the context!
– Understand the semantics behind user needs and content meanings
• Ethics
32
33
On the Application of User Centric Data Science to
Address Societal Challenges
Miriam Fernandez
Knowledge Media Institute
Open University, UK
@miriam_fs
@miriamfs
Credit to all these fantastic people!

Más contenido relacionado

La actualidad más candente

An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
Connie White
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
Kady Chiu
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
Lea Shanley
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive Summary
Evan Beck
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...
Ian McCarthy
 

La actualidad más candente (19)

Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1
 
Social media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaSocial media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social media
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Newsout: 30 examples of government transparency
Newsout: 30 examples of government transparencyNewsout: 30 examples of government transparency
Newsout: 30 examples of government transparency
 
Fanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked worldFanning The Flames: Reporting on terror in the a networked world
Fanning The Flames: Reporting on terror in the a networked world
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Opportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis InformaticsOpportunities and Challenges in Crisis Informatics
Opportunities and Challenges in Crisis Informatics
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive Summary
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...
 
Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 
Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...Leveraging social capital in university-industry knowledge transfer strategie...
Leveraging social capital in university-industry knowledge transfer strategie...
 
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
Diverse Social Media Networks in Public Safety PowerPoint for CCHE 590
 

Similar a Research seminar Queen Mary University of London (CogSci)

lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
Monte VanDyke
 
The Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for ScientistsThe Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for Scientists
Craig McClain
 
Externalization Case Study
Externalization Case StudyExternalization Case Study
Externalization Case Study
Leslie Lee
 

Similar a Research seminar Queen Mary University of London (CogSci) (20)

Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
Disrupting Hate Discourses Through the Adoption of the ‘Get Ready to Act Agai...
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
 
Standing Against the Online White Nationalist Movement
Standing Against the Online White Nationalist MovementStanding Against the Online White Nationalist Movement
Standing Against the Online White Nationalist Movement
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
 
Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)Safe Social Media project (Paper presented april 14th, Vienna)
Safe Social Media project (Paper presented april 14th, Vienna)
 
lis 3201 Final presentation
lis 3201 Final presentationlis 3201 Final presentation
lis 3201 Final presentation
 
FINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptxFINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptx
 
Education technology - a feminist space?
Education technology - a feminist space?Education technology - a feminist space?
Education technology - a feminist space?
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...Information disorder: Toward an interdisciplinary framework for research and ...
Information disorder: Toward an interdisciplinary framework for research and ...
 
Health (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 eraHealth (mis)information behaviour in the COVID-19 era
Health (mis)information behaviour in the COVID-19 era
 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
 
AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
AIISC’s research in  Social Good/Social Harm,  Public Health and EpidemiologyAIISC’s research in  Social Good/Social Harm,  Public Health and Epidemiology
AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overload
 
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...Media Education in the Era of Algorithmic Personalization: Facing  Polarizati...
Media Education in the Era of Algorithmic Personalization: Facing Polarizati...
 
Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011Social Media in Crisis Management: ISCRAM Summer School 2011
Social Media in Crisis Management: ISCRAM Summer School 2011
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
 
The Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for ScientistsThe Benefits and Barriers for Social Media for Scientists
The Benefits and Barriers for Social Media for Scientists
 
Externalization Case Study
Externalization Case StudyExternalization Case Study
Externalization Case Study
 
Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing Data Science Popup Austin: The Science of Sharing
Data Science Popup Austin: The Science of Sharing
 

Más de Miriam Fernandez

ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
Miriam Fernandez
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Miriam Fernandez
 

Más de Miriam Fernandez (17)

Mining Social Media Data For Policing
Mining Social Media Data For PolicingMining Social Media Data For Policing
Mining Social Media Data For Policing
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
Slides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxSlides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptx
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for Policing
 
OUSocial OUSocMed conference
OUSocial OUSocMed conference OUSocial OUSocMed conference
OUSocial OUSocMed conference
 
On the use of social media for evidence-based policing
On the use of social media for evidence-based policingOn the use of social media for evidence-based policing
On the use of social media for evidence-based policing
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs Workshop
 
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
 
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
 
ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4
 
ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3
 
ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2
 
ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1
 
Wm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalWm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-final
 
CAEPIA 2011
CAEPIA 2011CAEPIA 2011
CAEPIA 2011
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Research seminar Queen Mary University of London (CogSci)

  • 1. On the Application of Social Data Science to Address Societal Challenges Presenting: Miriam Fernandez @miriam_fs fernandezmiriam @miriamfs 1
  • 3. “All human beings are born free and equal in dignity and rights. They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood” Universal Declaration of Human Rights. Paris 10th Dec 1948 3
  • 8. 8
  • 9. 9
  • 10. 10 Child Grooming • Premeditated behaviour intending to secure the trust of a minor as a first step towards future engagement in sexual conduct.
  • 11. Claire Lilley, Ruth Ball, Heather Vernon, The experiences of 11-16 year olds on social networking sites, NSPCC 2014 “findings show that approximately 190,000 UK children (1 in 58) will suffer contact sexual abuse by a non-related adult before turning 18, with approximately 10,000 new child victims of contact sexual abuse being reported in the UK each year.” Child Grooming 11
  • 12. Child Grooming Olson’s psychological theory of luring communication (LCT) Grooming data • Classification results: – Trust development: 79% P, 82% R, 81% F1 – Grooming stage: 88% P, 89% R, 88% F1 – Physical approach: 87% P, 89% R, 88% F1 Cano et al. Detecting child grooming behaviour patterns on social media. SocInfo 2014 12
  • 14. Social Media Propaganda and Recruiting Islamic State in Iraq and Syria (ISIS) 14
  • 15. 15
  • 16. Radical Terminology: Usage Divergence 112 pro-ISIS Twitter accounts 112 “general” Twitter accounts similar terminology Radical Terminology Fernandez., et al. Contextual Semantics For Radicalisation Detection on Twitter. SW4SG Workshop. International 16
  • 17. Semantic Graph-based Approach for Pro-ISIS Stance Detection Tweets Conceptual. Semantics. Extraction DBpedia Semantic.Graph. Representation Frequent.Semantic. Subgraph.Mining Classifier.Training ISIS Syria Jihadist Group Country (Military Intervention Against ISIL, place, Syria) Entities Concepts Semantic Relations 86.3 86.3 84.8 86 91.7 84.4 84.4 81 87.1 92.8 80 82 84 86 88 90 92 94 Unigrams Sentiment Topics Network Semantics anti-ISIS pro-ISIS Saif, H., et al. A semantic graph-based approach for radicalisation detection on social media. European semantic web conference. Springer, 2017 17
  • 18. Micro or Individual roots Macro or Global roots Meso or Group roots Radicalisation Influence Content from friends Authored posts Content from news and other websites Radicalisation Influence • Individual: similarity of own content to radicalisation terminology • Social: similarity of retweeted content from followees to radicalization terminology • Global: similarity of content shared from news and websites to radicalization terminology Fernandez, M.; Asif M; Alani, H. Understanding the roots of radicalisation on Twitter. WebScience 2018 Best paper award! Cooperation Social Science & Computer Science 18 Radicalisation Influence
  • 20. Social Influence Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019. • The network is the essence of social media platforms. • Harm propagates across the network, and influences recipients over time. • Need to protect and alert users to harmful influences and influencers. • Monitor and regulate the use of networking recommendation algorithms. Individual influence: similarity of own content to radicalisation terminology Socialinfluence:similarityofretweeted contenttoradicalisationterminology Tools to measure radicalisation influence and behaviour 20
  • 21. Challenges Fernadez et al. Artificial Intelligence and Online Extremism: Challenges and Opportunities. Taylor and Francis. 2020. Be very aware of the challenges! 21
  • 23. Justification of sexual violence "If a woman gets impregnated by a rapist then the child will have a high probability of reproductive success. This is why it is so common for women to have rape fantasies, and why a woman's fertility skyrockets when she is being raped." Attribution of blame “Primary Education is Essentially Hiring Overpaid Whores to Babysit and Brainwash your Children” Objectification of women "Every female is born with the key to our salvation between her legs... When they get imprisoned, their precious resources waste away while we incels starve here. The solution is for the government to employ incels to rape female criminals." 23
  • 24. 24Farrell et all. Exploring Misogyny across the Manosphere in Reddit. WebScience 2019 Farrell et all. On the use of Jargon and Word Embeddings to Explore Identity within the Reddit's Manosphere. WebScience 2020 ● Grounded on exploring feminist models at scale ● Utilising a dataset of 6M posts, 300K conversations on Reddit ● Observing that data over a longer period of time (2011- 2018) ● Lexicon of Hate 1,300 annotated terms from 9 compiled lexicons under 9 categories from feminist studies ● Using word embeddings to understand identify and culture (jargon and neologisms). Analysing the Manosphere Groups r/MGTOW r/Braincels r/BadWomensAnatomy r/IncelsInAction r/IncelTears r/Trufemcels r/IncelsWithoutHate
  • 26. 26
  • 27. Types of Mis- and Dis- Information 7 Types of Mis- and Dis-information (Credit: Claire Wardle, First Draft) 27
  • 28. Dimensions of combating online misinformation • Misinformation content detection – Are misinformation content and sources automatically identified? Are streams of information automatically monitored? Is relevant corrective information identified as well? • Misinformation dynamics – Are patterns of misinformation flow identified and predicted? Is demographic and behavioural information considered to understand and predict misinformation dynamics? • Content Validation – Is misinformation validated and fact checked? Are the users involved in the content validation process? • Misinformation management – Are citizens’ perceptions and behaviour with regards to processing and sharing misinformation studied and monitored? Are intervention strategies put in place to handle the effects of misinformation? Simply presenting people with corrective information is likely to fail in changing their salient beliefs and opinions, or may, even, reinforce them Fernandez et al. Online Misinformation Challenges and Future Directions. The 2018 Web Conference Companion. 28
  • 29. Misinfo.me: Who is interacting with misinformation? Mensio et al. MisinfoMe: Who’s Interacting with Misinformation? In: 18th International Semantic Web Conference (ISWC 2019): Posters & Demos 29
  • 31. What is OUAnalyse? We are hereHistory Future we can affect StartOpening VLE A1 A3A2 End VLE1 VLE2 VLE3VLE0 VLEn Identify students at risk of failing the module as early as possible so that OU intervention is efficient and meaningful. https://analyse.kmi.open.ac.uk/AnalyseDashboard 31
  • 32. Social Data Science to Address Societal Challenges • Understand the problems and their multiple dimensions – Look at the problem from multiple lenses • Computer Science • Social Science • Psychology • Policy • Law • Understand the diversity of users & their behaviours – Bring them closer to the proposed solutions (co-create!) – User-Centric metrics • Capture the context! – Understand the semantics behind user needs and content meanings • Ethics 32
  • 33. 33 On the Application of User Centric Data Science to Address Societal Challenges Miriam Fernandez Knowledge Media Institute Open University, UK @miriam_fs @miriamfs Credit to all these fantastic people!