SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Identifying and Characterizing
User Communities on Twitter
during Crisis Events
Adi$	
  Gupta,	
  Anupam	
  Joshi,	
  
	
  Ponnurangam	
  Kumaraguru	
  
	
  

Oct.	
  29,	
  2012	
  
UMSOCIAL	
  @	
  CIKM’12	
  
Outline
 Problem	
  Statement	
  
 Introduc$on	
  
 Data	
  
 Methodology	
  
 Results	
  
 Future	
  Work	
  
 References	
  

2	
  
Problem Statement
 To	
  iden$fy	
  and	
  characterize	
  user	
  
communi$es	
  on	
  TwiRer	
  during	
  crisis	
  events,	
  
using	
  semi-­‐automated	
  techniques.	
  

3	
  
Data: Three 2011 Crisis Events

Event:	
  Hurricane	
  Irene	
  
Tweets	
  collected:	
  	
  90,237	
  
Users:	
  55,718	
  

Event:	
  Earthquake	
  in	
  VA	
  
Tweets	
  collected:	
  277,604	
  
Users:	
  219,621	
  

Event:	
  England	
  Riots	
  
Tweets	
  collected:	
  1,165,628	
  
Users:	
  546,966	
  

4	
  
Our Contributions
 Defined	
  a	
  novel	
  similarity	
  metric	
  to	
  compute	
  
similari$es	
  between	
  users	
  based	
  on	
  their	
  links,	
  
content	
  posted	
  and	
  meta	
  data.	
  
	
  
 Applied	
  spectral	
  clustering	
  to	
  obtain	
  
communi$es	
  of	
  users	
  formed	
  during	
  three	
  
different	
  crisis	
  events.	
  
	
  
 Showed	
  most	
  central	
  people	
  (by	
  degree	
  
centrality)	
  represent	
  what	
  users	
  in	
  the	
  cluster	
  
are	
  talking	
  about	
  with	
  81%	
  accuracy	
  on	
  
average.	
  
5	
  
Methodology

 STEP	
  1:	
  Computer	
  User*User	
  Similarity	
  Matrix	
  
	
  
 STEP	
  2:	
  Use	
  spectral	
  clustering	
  to	
  obtain	
  
communi$es	
  of	
  users	
  
	
  
 STEP	
  3:	
  Use	
  degree	
  centrality	
  to	
  compute	
  top	
  
users	
  in	
  each	
  cluster	
  
6	
  
Methodology
 user*user	
  similarity	
  matrix,	
  U[i,j]	
  
- 	
  Content	
  Similarity,	
  C[i,j]	
  
  Computed	
  based	
  on	
  common	
  words,	
  hashtags	
  and	
  URLs	
  
in	
  tweets	
  

- Link	
  Similarity,	
  L[i,j]	
  
  Based	
  on	
  users	
  retweet,	
  men$on	
  or	
  reply	
  to	
  each	
  other	
  
tweets	
  or	
  a	
  common	
  third	
  person’s	
  tweet	
  

- Meta-­‐data	
  Similarity,	
  M[i,j]	
  
  Similarity	
  between	
  two	
  users	
  based	
  on	
  their	
  loca$on	
  
(country,	
  state	
  or	
  city)	
  

 U[i,j]	
  =	
  C[i,j]	
  +	
  L[i,j]	
  +	
  M[i,j],	
  for	
  each	
  user	
  i	
  and	
  j	
  
7	
  
Top Users Identification
 Use	
  degree	
  centrality	
  

- Social	
  Network	
  Analysis	
  metric	
  
- Number	
  of	
  links	
  incident	
  upon	
  a	
  node	
  (i.e.,	
  the	
  
number	
  of	
  $es	
  that	
  a	
  node	
  has)	
  
	
  

 In	
  each	
  cluster	
  obtained	
  	
  
- We	
  compute	
  the	
  top	
  30	
  users	
  using	
  degree	
  
centrality	
  

8	
  
Evaluation Metrics
 Modularity	
  
- How	
  good	
  is	
  the	
  division	
  of	
  the	
  network	
  in	
  
communi$es	
  
	
  

 Mean	
  average	
  precision	
  

- With	
  how	
  much	
  precision	
  can	
  we	
  say	
  that	
  the	
  
influencers	
  in	
  the	
  cluster	
  represent	
  the	
  en$re	
  
cluster	
  

	
  
9	
  
Results: Modularity score
 The	
  modularity	
  score	
  greater	
  than	
  0.5	
  for	
  all	
  
events	
  
- Hurricane	
  Irene	
  =	
  0.67	
  
- England	
  Riots	
  =	
  0.51	
  
- Virginia	
  Earthquake	
  =	
  0.53	
  
	
  

 We	
  conclude	
  that	
  the	
  division	
  of	
  graph	
  into	
  
communi$es	
  is	
  of	
  good	
  quality	
  

10	
  
Results: MAP Performance

•  Top	
  users	
  based	
  on	
  degree	
  centrality	
  represent	
  the	
  opinions	
  and	
  
topic	
  of	
  the	
  en$re	
  cluster	
  during	
  crisis	
  events.	
  
•  In	
  case,	
  of	
  a	
  random	
  TwiRer	
  sample,	
  the	
  above	
  is	
  not	
  true.	
  
11	
  
Results: Characterization
Events

Community 1

Community 2

Community 3

Hurricane
Irene

hurricane, irene, http, jada, song,
brenda, butistillloveu, photos,
icanhonestlysay, check,
neverapologizefor, video, scandal,
angelina, jolie, storm, nick, college,
bahamas, puerto

irene, hurricane, http, coast, category, bahamas, east, puerto,
storm, rico, winds, advisory,
issued, fore- cast, heads, track,
path, update, moving, number

hurricane, irene, http, puerto, coast,
storm, rico, news, track, winds, bahamas, category, east, forecast, advisory, florida, update, issued, tropical, latest

England
Riots

londonriots, http, ukriots, police,
london, riots, people, hackney, riot
ers, news, fire, dont, riot, cameron,
riotcleanup, birmingham, looting,
croydon, night, stop

londonriots, http, ukriots, police,
london, riots, people, rioters,
cameron, hackney, news, fire,
dont, riot, looting, prayforlondon,
birm- ingham, manchesterriots,
stop, riot- cleanup

londonriots, http, ukriots, police, riots, london, people, rioters, hackney, cameron, riot, birmingham,
news, fire, riotcleanup, dont, looting,
make, manchesterriots, stop, rioting

Virginia
Earthquake

earthquake, http, today, quake,
east, coast, earth, richmond,
washington, august, virginia, news,
campbell, glen, monument, heard,
norwegian, alaska, new york, video

earthquake, http, east, coast, virginia, washington, felt, magnitude,
news, monument, feel, damage,
today, nuclear, quake, epicenter,
people, school, video

earthquake, http, coast, east,
washington, felt, virginia, news,
damage, today, magnitude,
monument, feel, quake, people,
video, area, breaking, shit, nuclear

Hurricane	
  Irene	
  
•  Community	
  1:	
  Contains	
  spam	
  words	
  –	
  spammers	
  dominate	
  this	
  cluster	
  
•  Community	
  2	
  and	
  3	
  contain	
  similar	
  words	
  
•  Analyze	
  the	
  corresponding	
  top	
  central	
  users	
  (next	
  slide)	
  

12	
  
Results: Characterization
C2:Username

C2:Description

C3:Username

C3:Description

top_tw_science

none

YaekoAvilez3837

none

top_trend_world

none

MarxInbody5668

none

Neednewsnow

none

KerrieRamagano3

none

iBreakings

none

AureliaHickman1

none

metofficestorm

Official Met Office page for latest information on tropical storms,
hurricanes, typhoons and cyclones

LenitaBross5906

none

RES911CU

RES911CU Bringing you the latest news/weather from around the world &
country using over 1000 news sources

BeckieSteakley4

none

qianafgtt

none

KirbyPietig6221

none

Georgeannla47

none

GailSterner5774

none

moneyworlds

none

LeroyRasheed

none

LinJosh2011

none

ClorindaKan1926

none

top_trend_uk

none

StaceeRosebure2

none

ShareWith911

Emergency Information Sharing Network connecting 911,First Responders
and Citizens before, during and after emergencies of all shapes and sizes.

VaniaAsmus

none

Hurricane	
  Irene	
  
•  Community	
  2:	
  formed	
  of	
  official	
  news	
  media,	
  emergency	
  and	
  alert	
  profiles	
  
(ShareWith911,	
  metofficestorm,	
  RES911CU,	
  Neednewsnow)	
  
•  Community	
  3:	
  formed	
  with	
  common	
  or	
  general	
  users	
  of	
  TwiRer	
  (KerrieRamagano3,	
  
YaekoAvilez3837,	
  AureliaHickman1)	
  
13	
  
Conclusions
 The	
  results	
  obtained	
  with	
  the	
  case	
  study	
  of	
  
three	
  events	
  show	
  the	
  poten$al	
  of	
  applying	
  
spectral	
  clustering	
  and	
  centrality	
  measures,	
  
to	
  iden$fy	
  community	
  of	
  users	
  and	
  the	
  
prominent	
  top	
  users	
  in	
  each	
  community,	
  
during	
  crisis	
  events.	
  
	
  

14	
  
Future Work
 Construct	
  weighted	
  similarity	
  metrics	
  to	
  
compute	
  similarity	
  between	
  users	
  
	
  
 Include	
  behavioral	
  features	
  of	
  users	
  in	
  
similarity	
  metric	
  construc$on	
  
	
  
 Conduct	
  a	
  more	
  generic	
  experiment	
  with	
  
more	
  crisis	
  events	
  

15	
  
References
  Gupta	
  et	
  al.	
  Credibility	
  ranking	
  of	
  tweets	
  during	
  high	
  impact	
  events.	
  In	
  Proceedings	
  of	
  the	
  1st	
  
Workshop	
  on	
  Privacy	
  and	
  Security	
  in	
  Online	
  Social	
  Media,	
  PSOSM	
  ’12.	
  
  Java	
  et	
  al.	
  Detec$ng	
  Communi$es	
  via	
  Simultaneous	
  Clustering	
  of	
  Graphs	
  and	
  Folksonomies.	
  In	
  
Proceedings	
  of	
  the	
  Tenth	
  Workshop	
  on	
  Web	
  Mining	
  and	
  Web	
  Usage	
  Analysis	
  (WebKDD).	
  ACM,	
  
August	
  2008.	
  
  Kwak	
  et	
  al.	
  What	
  is	
  twiRer,	
  a	
  social	
  network	
  or	
  a	
  news	
  media?	
  In	
  Proceedings	
  of	
  the	
  19th	
  
interna$onal	
  conference	
  on	
  World	
  wide	
  web,	
  WWW	
  ’10.	
  ACM.	
  
  Longueville	
  et	
  al.	
  “omg,	
  from	
  here,	
  i	
  can	
  see	
  the	
  flames!”:	
  a	
  use	
  case	
  of	
  mining	
  loca$on	
  based	
  
social	
  networks	
  to	
  acquire	
  spa$o-­‐temporal	
  data	
  on	
  forest	
  fires,	
  LBSN,	
  2009.	
  
  Mendoza	
  et	
  al.	
  TwiRer	
  under	
  crisis:	
  can	
  we	
  trust	
  what	
  we	
  rt?	
  In	
  Proceedings	
  of	
  the	
  First	
  
Workshop	
  on	
  Social	
  Media	
  Analy$cs,	
  SOMA	
  ’10.	
  
  Newman	
  et	
  al.	
  Analysis	
  of	
  weighted	
  networks.	
  Phys	
  Rev	
  E	
  Stat	
  Nonlin	
  Sor	
  MaRer	
  Phys,	
  70(5	
  Pt	
  
2),	
  Nov.	
  2004.	
  
  Shi	
  et	
  al.	
  Normalized	
  cuts	
  and	
  image	
  segmenta$on.	
  In	
  Proceedings	
  of	
  the	
  1997	
  Conference	
  on	
  
Computer	
  Vision	
  and	
  PaRern	
  Recogni$on	
  (CVPR	
  ’97).	
  	
  
  Vieweg	
  et	
  al.	
  Microblogging	
  during	
  two	
  natural	
  hazards	
  events:	
  what	
  twiRer	
  may	
  contribute	
  to	
  
situa$onal	
  awareness.	
  In	
  CHI	
  ’10.	
  	
  
  Wang	
  et	
  al.	
  Detec$ng	
  community	
  kernels	
  in	
  large	
  social	
  networks.	
  In	
  Proceedings	
  of	
  
Interna$onal	
  Conference	
  on	
  Data	
  Mining,	
  ICDM	
  ’11.	
  	
  
  Welch	
  et	
  al.	
  Topical	
  seman$cs	
  of	
  twiRer	
  links.	
  In	
  Proceedings	
  of	
  the	
  fourth	
  interna$onal	
  
conference	
  on	
  Web	
  search	
  and	
  data	
  mining,	
  WSDM	
  ’11.	
  

16	
  
Thank you
Contact:	
  
adi$g@iiitd.ac.in	
  
joshi@cs.umbc.edu	
  [ebiquity.umbc.edu]	
  
pk@iiitd.ac.in	
  [precog.iiitd.edu.in]	
  

17	
  
For any further information, please write to
pk@iiitd.ac.in
precog.iiitd.edu.in

18	
  

Mais conteúdo relacionado

Mais procurados

00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and OverviewDuke Network Analysis Center
 
British Red Cross Adapts Social Strategy for Campaign Success
British Red Cross Adapts Social Strategy for Campaign SuccessBritish Red Cross Adapts Social Strategy for Campaign Success
British Red Cross Adapts Social Strategy for Campaign SuccessBrandwatch
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media American Red Cross
 
Tonje Switzer Project Practicum
Tonje Switzer Project PracticumTonje Switzer Project Practicum
Tonje Switzer Project PracticumTonje Wold-Switzer
 
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...IIIT Hyderabad
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedVikramank Singh
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and OverviewDuke Network Analysis Center
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...Duke Network Analysis Center
 
Community Detection in Social Networks: A Brief Overview
Community Detection in Social Networks: A Brief OverviewCommunity Detection in Social Networks: A Brief Overview
Community Detection in Social Networks: A Brief OverviewSatyaki Sikdar
 
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...COMRADES project
 
Twaster final project report
Twaster final project reportTwaster final project report
Twaster final project reportUgurcan Akpulat
 

Mais procurados (18)

00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
British Red Cross Adapts Social Strategy for Campaign Success
British Red Cross Adapts Social Strategy for Campaign SuccessBritish Red Cross Adapts Social Strategy for Campaign Success
British Red Cross Adapts Social Strategy for Campaign Success
 
Pirc net poster
Pirc net posterPirc net poster
Pirc net poster
 
The case for integrating crisis response with social media
The case for integrating crisis response with social media The case for integrating crisis response with social media
The case for integrating crisis response with social media
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
01 Network Data Collection
01 Network Data Collection01 Network Data Collection
01 Network Data Collection
 
Tonje Switzer Project Practicum
Tonje Switzer Project PracticumTonje Switzer Project Practicum
Tonje Switzer Project Practicum
 
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
Designing and Evaluating Techniques to
 Mitigate Misinformation Spread on 
Mi...
 
Ppt
PptPpt
Ppt
 
IIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressedIIT+Research+Report+(1).compressed
IIT+Research+Report+(1).compressed
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
 
Community Detection in Social Networks: A Brief Overview
Community Detection in Social Networks: A Brief OverviewCommunity Detection in Social Networks: A Brief Overview
Community Detection in Social Networks: A Brief Overview
 
24 The Evolution of Network Thinking
24 The Evolution of Network Thinking24 The Evolution of Network Thinking
24 The Evolution of Network Thinking
 
05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats05 Whole Network Descriptive Stats
05 Whole Network Descriptive Stats
 
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support for ...
 
Twaster final project report
Twaster final project reportTwaster final project report
Twaster final project report
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 

Destaque

Study Guide for Joe Tye's book The Florence Prescription
Study Guide for Joe Tye's book The Florence PrescriptionStudy Guide for Joe Tye's book The Florence Prescription
Study Guide for Joe Tye's book The Florence PrescriptionJoe Tye
 
How to Read and Code 19th-Century British Postmarks in TEI
How to Read and Code 19th-Century British Postmarks in TEIHow to Read and Code 19th-Century British Postmarks in TEI
How to Read and Code 19th-Century British Postmarks in TEIElisa Beshero-Bondar
 
Personal Footprint Account – degrowth conference 2014 – open space presentation
Personal Footprint Account – degrowth conference 2014 – open space presentationPersonal Footprint Account – degrowth conference 2014 – open space presentation
Personal Footprint Account – degrowth conference 2014 – open space presentationWilli Schroll
 
How to Build a Customer-Driven Growth Engine
How to Build a Customer-Driven Growth EngineHow to Build a Customer-Driven Growth Engine
How to Build a Customer-Driven Growth EngineQualtrics
 
IoT and applied Social Capital Theory
IoT and applied Social Capital TheoryIoT and applied Social Capital Theory
IoT and applied Social Capital TheoryWilli Schroll
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenturegogo6
 
Python as part of a production machine learning stack by Michael Manapat PyDa...
Python as part of a production machine learning stack by Michael Manapat PyDa...Python as part of a production machine learning stack by Michael Manapat PyDa...
Python as part of a production machine learning stack by Michael Manapat PyDa...PyData
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 
Luigi presentation NYC Data Science
Luigi presentation NYC Data ScienceLuigi presentation NYC Data Science
Luigi presentation NYC Data ScienceErik Bernhardsson
 
A Beginner's Guide to Building Data Pipelines with Luigi
A Beginner's Guide to Building Data Pipelines with LuigiA Beginner's Guide to Building Data Pipelines with Luigi
A Beginner's Guide to Building Data Pipelines with LuigiGrowth Intelligence
 
Students, Computers and Learning: Making the Connection (Andreas Schleiche...
Students, Computers and Learning: Making the Connection  (Andreas Schleiche...Students, Computers and Learning: Making the Connection  (Andreas Schleiche...
Students, Computers and Learning: Making the Connection (Andreas Schleiche...EduSkills OECD
 

Destaque (11)

Study Guide for Joe Tye's book The Florence Prescription
Study Guide for Joe Tye's book The Florence PrescriptionStudy Guide for Joe Tye's book The Florence Prescription
Study Guide for Joe Tye's book The Florence Prescription
 
How to Read and Code 19th-Century British Postmarks in TEI
How to Read and Code 19th-Century British Postmarks in TEIHow to Read and Code 19th-Century British Postmarks in TEI
How to Read and Code 19th-Century British Postmarks in TEI
 
Personal Footprint Account – degrowth conference 2014 – open space presentation
Personal Footprint Account – degrowth conference 2014 – open space presentationPersonal Footprint Account – degrowth conference 2014 – open space presentation
Personal Footprint Account – degrowth conference 2014 – open space presentation
 
How to Build a Customer-Driven Growth Engine
How to Build a Customer-Driven Growth EngineHow to Build a Customer-Driven Growth Engine
How to Build a Customer-Driven Growth Engine
 
IoT and applied Social Capital Theory
IoT and applied Social Capital TheoryIoT and applied Social Capital Theory
IoT and applied Social Capital Theory
 
Industrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of AccentureIndustrial Internet of Things by Edy Liongosari of Accenture
Industrial Internet of Things by Edy Liongosari of Accenture
 
Python as part of a production machine learning stack by Michael Manapat PyDa...
Python as part of a production machine learning stack by Michael Manapat PyDa...Python as part of a production machine learning stack by Michael Manapat PyDa...
Python as part of a production machine learning stack by Michael Manapat PyDa...
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
Luigi presentation NYC Data Science
Luigi presentation NYC Data ScienceLuigi presentation NYC Data Science
Luigi presentation NYC Data Science
 
A Beginner's Guide to Building Data Pipelines with Luigi
A Beginner's Guide to Building Data Pipelines with LuigiA Beginner's Guide to Building Data Pipelines with Luigi
A Beginner's Guide to Building Data Pipelines with Luigi
 
Students, Computers and Learning: Making the Connection (Andreas Schleiche...
Students, Computers and Learning: Making the Connection  (Andreas Schleiche...Students, Computers and Learning: Making the Connection  (Andreas Schleiche...
Students, Computers and Learning: Making the Connection (Andreas Schleiche...
 

Semelhante a Identifying and Characterizing User Communities on Twitter during Crisis Events

Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...Amit Sheth
 
Noshir Contractor - WebSci'09 - Society On-Line
Noshir Contractor - WebSci'09 - Society On-LineNoshir Contractor - WebSci'09 - Society On-Line
Noshir Contractor - WebSci'09 - Society On-Linebutest
 
What's Up? - Windows phone application concept
What's Up? - Windows phone application conceptWhat's Up? - Windows phone application concept
What's Up? - Windows phone application conceptAngelica Rosenzweig
 
Damage Assessment from Social Media Imagery Data During Disasters
Damage Assessment from Social Media Imagery Data During DisastersDamage Assessment from Social Media Imagery Data During Disasters
Damage Assessment from Social Media Imagery Data During DisastersMuhammad Imran
 
Multimedia rescue 161018
Multimedia rescue 161018Multimedia rescue 161018
Multimedia rescue 161018Ramesh Jain
 
Wikimedia 2009 Redux Bay Chi
Wikimedia 2009 Redux Bay ChiWikimedia 2009 Redux Bay Chi
Wikimedia 2009 Redux Bay ChiMicah Alpern
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - CybercultureKim Flintoff
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)SocialMediaMining
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Marc Smith
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...JayaramB11
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
 
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)Classifying Crisis Information Relevancy with Semantics (ESWC 2018)
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)Prashant Khare
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Subhajit Sahu
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Subhajit Sahu
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdfclientmentailai
 
The Mathematics of Memes
The Mathematics of MemesThe Mathematics of Memes
The Mathematics of MemesThomas House
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network TheorySocialphysicist
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 

Semelhante a Identifying and Characterizing User Communities on Twitter during Crisis Events (20)

Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
 
Noshir Contractor - WebSci'09 - Society On-Line
Noshir Contractor - WebSci'09 - Society On-LineNoshir Contractor - WebSci'09 - Society On-Line
Noshir Contractor - WebSci'09 - Society On-Line
 
What's Up? - Windows phone application concept
What's Up? - Windows phone application conceptWhat's Up? - Windows phone application concept
What's Up? - Windows phone application concept
 
Damage Assessment from Social Media Imagery Data During Disasters
Damage Assessment from Social Media Imagery Data During DisastersDamage Assessment from Social Media Imagery Data During Disasters
Damage Assessment from Social Media Imagery Data During Disasters
 
Examples of Real-World Big Data Application
Examples of Real-World Big Data ApplicationExamples of Real-World Big Data Application
Examples of Real-World Big Data Application
 
Multimedia rescue 161018
Multimedia rescue 161018Multimedia rescue 161018
Multimedia rescue 161018
 
GDRR Opening Workshop - PANEL SESSION: Disrupting Priorities of Engineering S...
GDRR Opening Workshop - PANEL SESSION: Disrupting Priorities of Engineering S...GDRR Opening Workshop - PANEL SESSION: Disrupting Priorities of Engineering S...
GDRR Opening Workshop - PANEL SESSION: Disrupting Priorities of Engineering S...
 
Wikimedia 2009 Redux Bay Chi
Wikimedia 2009 Redux Bay ChiWikimedia 2009 Redux Bay Chi
Wikimedia 2009 Redux Bay Chi
 
LECTURE 5 - Cyberculture
LECTURE 5 - CybercultureLECTURE 5 - Cyberculture
LECTURE 5 - Cyberculture
 
Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)Social Media Mining - Chapter 4 (Network Models)
Social Media Mining - Chapter 4 (Network Models)
 
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
Autobiography, Mobile Social Life-Logging and the Transition from Ephemeral t...
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
 
Week 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to coWeek 6 GuidancePsychological ResearchThere are many ways to co
Week 6 GuidancePsychological ResearchThere are many ways to co
 
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)Classifying Crisis Information Relevancy with Semantics (ESWC 2018)
Classifying Crisis Information Relevancy with Semantics (ESWC 2018)
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
 
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
Massively Parallel Simulations of Spread of Infectious Diseases over Realisti...
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
The Mathematics of Memes
The Mathematics of MemesThe Mathematics of Memes
The Mathematics of Memes
 
An Introduction to Network Theory
An Introduction to Network TheoryAn Introduction to Network Theory
An Introduction to Network Theory
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 

Mais de IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

Mais de IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Identifying and Characterizing User Communities on Twitter during Crisis Events

  • 1. Identifying and Characterizing User Communities on Twitter during Crisis Events Adi$  Gupta,  Anupam  Joshi,    Ponnurangam  Kumaraguru     Oct.  29,  2012   UMSOCIAL  @  CIKM’12  
  • 2. Outline  Problem  Statement    Introduc$on    Data    Methodology    Results    Future  Work    References   2  
  • 3. Problem Statement  To  iden$fy  and  characterize  user   communi$es  on  TwiRer  during  crisis  events,   using  semi-­‐automated  techniques.   3  
  • 4. Data: Three 2011 Crisis Events Event:  Hurricane  Irene   Tweets  collected:    90,237   Users:  55,718   Event:  Earthquake  in  VA   Tweets  collected:  277,604   Users:  219,621   Event:  England  Riots   Tweets  collected:  1,165,628   Users:  546,966   4  
  • 5. Our Contributions  Defined  a  novel  similarity  metric  to  compute   similari$es  between  users  based  on  their  links,   content  posted  and  meta  data.      Applied  spectral  clustering  to  obtain   communi$es  of  users  formed  during  three   different  crisis  events.      Showed  most  central  people  (by  degree   centrality)  represent  what  users  in  the  cluster   are  talking  about  with  81%  accuracy  on   average.   5  
  • 6. Methodology  STEP  1:  Computer  User*User  Similarity  Matrix      STEP  2:  Use  spectral  clustering  to  obtain   communi$es  of  users      STEP  3:  Use  degree  centrality  to  compute  top   users  in  each  cluster   6  
  • 7. Methodology  user*user  similarity  matrix,  U[i,j]   -   Content  Similarity,  C[i,j]     Computed  based  on  common  words,  hashtags  and  URLs   in  tweets   - Link  Similarity,  L[i,j]     Based  on  users  retweet,  men$on  or  reply  to  each  other   tweets  or  a  common  third  person’s  tweet   - Meta-­‐data  Similarity,  M[i,j]     Similarity  between  two  users  based  on  their  loca$on   (country,  state  or  city)    U[i,j]  =  C[i,j]  +  L[i,j]  +  M[i,j],  for  each  user  i  and  j   7  
  • 8. Top Users Identification  Use  degree  centrality   - Social  Network  Analysis  metric   - Number  of  links  incident  upon  a  node  (i.e.,  the   number  of  $es  that  a  node  has)      In  each  cluster  obtained     - We  compute  the  top  30  users  using  degree   centrality   8  
  • 9. Evaluation Metrics  Modularity   - How  good  is  the  division  of  the  network  in   communi$es      Mean  average  precision   - With  how  much  precision  can  we  say  that  the   influencers  in  the  cluster  represent  the  en$re   cluster     9  
  • 10. Results: Modularity score  The  modularity  score  greater  than  0.5  for  all   events   - Hurricane  Irene  =  0.67   - England  Riots  =  0.51   - Virginia  Earthquake  =  0.53      We  conclude  that  the  division  of  graph  into   communi$es  is  of  good  quality   10  
  • 11. Results: MAP Performance •  Top  users  based  on  degree  centrality  represent  the  opinions  and   topic  of  the  en$re  cluster  during  crisis  events.   •  In  case,  of  a  random  TwiRer  sample,  the  above  is  not  true.   11  
  • 12. Results: Characterization Events Community 1 Community 2 Community 3 Hurricane Irene hurricane, irene, http, jada, song, brenda, butistillloveu, photos, icanhonestlysay, check, neverapologizefor, video, scandal, angelina, jolie, storm, nick, college, bahamas, puerto irene, hurricane, http, coast, category, bahamas, east, puerto, storm, rico, winds, advisory, issued, fore- cast, heads, track, path, update, moving, number hurricane, irene, http, puerto, coast, storm, rico, news, track, winds, bahamas, category, east, forecast, advisory, florida, update, issued, tropical, latest England Riots londonriots, http, ukriots, police, london, riots, people, hackney, riot ers, news, fire, dont, riot, cameron, riotcleanup, birmingham, looting, croydon, night, stop londonriots, http, ukriots, police, london, riots, people, rioters, cameron, hackney, news, fire, dont, riot, looting, prayforlondon, birm- ingham, manchesterriots, stop, riot- cleanup londonriots, http, ukriots, police, riots, london, people, rioters, hackney, cameron, riot, birmingham, news, fire, riotcleanup, dont, looting, make, manchesterriots, stop, rioting Virginia Earthquake earthquake, http, today, quake, east, coast, earth, richmond, washington, august, virginia, news, campbell, glen, monument, heard, norwegian, alaska, new york, video earthquake, http, east, coast, virginia, washington, felt, magnitude, news, monument, feel, damage, today, nuclear, quake, epicenter, people, school, video earthquake, http, coast, east, washington, felt, virginia, news, damage, today, magnitude, monument, feel, quake, people, video, area, breaking, shit, nuclear Hurricane  Irene   •  Community  1:  Contains  spam  words  –  spammers  dominate  this  cluster   •  Community  2  and  3  contain  similar  words   •  Analyze  the  corresponding  top  central  users  (next  slide)   12  
  • 13. Results: Characterization C2:Username C2:Description C3:Username C3:Description top_tw_science none YaekoAvilez3837 none top_trend_world none MarxInbody5668 none Neednewsnow none KerrieRamagano3 none iBreakings none AureliaHickman1 none metofficestorm Official Met Office page for latest information on tropical storms, hurricanes, typhoons and cyclones LenitaBross5906 none RES911CU RES911CU Bringing you the latest news/weather from around the world & country using over 1000 news sources BeckieSteakley4 none qianafgtt none KirbyPietig6221 none Georgeannla47 none GailSterner5774 none moneyworlds none LeroyRasheed none LinJosh2011 none ClorindaKan1926 none top_trend_uk none StaceeRosebure2 none ShareWith911 Emergency Information Sharing Network connecting 911,First Responders and Citizens before, during and after emergencies of all shapes and sizes. VaniaAsmus none Hurricane  Irene   •  Community  2:  formed  of  official  news  media,  emergency  and  alert  profiles   (ShareWith911,  metofficestorm,  RES911CU,  Neednewsnow)   •  Community  3:  formed  with  common  or  general  users  of  TwiRer  (KerrieRamagano3,   YaekoAvilez3837,  AureliaHickman1)   13  
  • 14. Conclusions  The  results  obtained  with  the  case  study  of   three  events  show  the  poten$al  of  applying   spectral  clustering  and  centrality  measures,   to  iden$fy  community  of  users  and  the   prominent  top  users  in  each  community,   during  crisis  events.     14  
  • 15. Future Work  Construct  weighted  similarity  metrics  to   compute  similarity  between  users      Include  behavioral  features  of  users  in   similarity  metric  construc$on      Conduct  a  more  generic  experiment  with   more  crisis  events   15  
  • 16. References   Gupta  et  al.  Credibility  ranking  of  tweets  during  high  impact  events.  In  Proceedings  of  the  1st   Workshop  on  Privacy  and  Security  in  Online  Social  Media,  PSOSM  ’12.     Java  et  al.  Detec$ng  Communi$es  via  Simultaneous  Clustering  of  Graphs  and  Folksonomies.  In   Proceedings  of  the  Tenth  Workshop  on  Web  Mining  and  Web  Usage  Analysis  (WebKDD).  ACM,   August  2008.     Kwak  et  al.  What  is  twiRer,  a  social  network  or  a  news  media?  In  Proceedings  of  the  19th   interna$onal  conference  on  World  wide  web,  WWW  ’10.  ACM.     Longueville  et  al.  “omg,  from  here,  i  can  see  the  flames!”:  a  use  case  of  mining  loca$on  based   social  networks  to  acquire  spa$o-­‐temporal  data  on  forest  fires,  LBSN,  2009.     Mendoza  et  al.  TwiRer  under  crisis:  can  we  trust  what  we  rt?  In  Proceedings  of  the  First   Workshop  on  Social  Media  Analy$cs,  SOMA  ’10.     Newman  et  al.  Analysis  of  weighted  networks.  Phys  Rev  E  Stat  Nonlin  Sor  MaRer  Phys,  70(5  Pt   2),  Nov.  2004.     Shi  et  al.  Normalized  cuts  and  image  segmenta$on.  In  Proceedings  of  the  1997  Conference  on   Computer  Vision  and  PaRern  Recogni$on  (CVPR  ’97).       Vieweg  et  al.  Microblogging  during  two  natural  hazards  events:  what  twiRer  may  contribute  to   situa$onal  awareness.  In  CHI  ’10.       Wang  et  al.  Detec$ng  community  kernels  in  large  social  networks.  In  Proceedings  of   Interna$onal  Conference  on  Data  Mining,  ICDM  ’11.       Welch  et  al.  Topical  seman$cs  of  twiRer  links.  In  Proceedings  of  the  fourth  interna$onal   conference  on  Web  search  and  data  mining,  WSDM  ’11.   16  
  • 17. Thank you Contact:   adi$g@iiitd.ac.in   joshi@cs.umbc.edu  [ebiquity.umbc.edu]   pk@iiitd.ac.in  [precog.iiitd.edu.in]   17  
  • 18. For any further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in 18