|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910746069403321 |
|
|
Titolo |
Social, cultural, and behavioral modeling : 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20-22, 2023, Proceedings / / Robert Thomson [and four others], editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2023] |
|
©2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (347 pages) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science ; ; Volume 14161 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Human behavior - Mathematical models |
Interactive computer systems |
Interpersonal relations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents -- Detecting Malign Influence -- Misogyny, Women in Power, and Patterns of Social Media Harassment -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Datasets -- 3.2 Slur Detection -- 4 Results -- 5 Limitations -- 6 Discussion and Future Work -- References -- Stereotype Content Dictionary: A Semantic Space of 3 Million Words and Phrases Using Google News Word2Vec Embeddings -- 1 Introduction -- 1.1 Background -- 2 Related Work -- 2.1 Traditional Measurement of Stereotype Content -- 2.2 Computational Measurement of Stereotype Content -- 3 Datasets and Methods -- 3.1 Determining Antonym Pairs from Stereotype Dictionaries -- 3.2 Identifying Stereotype Dimensions in Google News Embeddings -- 3.3 Projecting Word Embeddings on Stereotype Semantic Space -- 3.4 Model Validation -- 4 Result -- 4.1 Validation of Computational QT Model -- 4.2 Comparison Between QT Model and Fraser Model -- 5 Discussion and Future Work -- References -- Social Cybersecurity Analysis of the Telegram Information Environment During the 2022 Invasion of Ukraine -- 1 Introduction -- 2 Data -- 2.1 Telegram Overview -- 2.2 Collection -- 2.3 Data Overview -- 3 Methodology -- 3.1 Stance Detection -- 3.2 BEND Analysis -- 4 Results and Discussion -- 4.1 Network Overview -- 4.2 |
|
|
|
|
|
|
|
|
|
Stance Analysis -- 4.3 BEND Analysis of Maneuvers -- 5 Limitations and Future Work -- 6 Conclusion -- References -- The Dynamics of Political Narratives During the Russian Invasion of Ukraine -- 1 Introduction -- 2 Background and Related Work -- 3 Data -- 4 Methodology -- 5 Results -- 5.1 RQ1: Chinese Political Narratives Around RU -- 5.2 RQ2: Contribution of Camps to RU-Related Narrative Evolution -- 6 Discussion and Future Work -- References -- Anger Breeds Controversy: Analyzing Controversy and Emotions on Reddit -- 1 Introduction -- 2 Related Work -- 3 Methods. |
3.1 Data -- 3.2 Emotion Detection -- 4 Results -- 4.1 RQ1: Emotions in Controversial Comments -- 4.2 RQ2: Controversial Comments Change Emotions in Discussions -- 4.3 RQ3: Predicting Controversy from Emotions -- 5 Discussion and Conclusion -- References -- Building a Healthier Feed: Private Location Trace Intersection Driven Feed Recommendations -- 1 Introduction -- 2 A Social Recommendation Algorithm -- 2.1 An Extendable Paradigm -- 2.2 A View Towards Web3 -- 3 Validation and Demonstration -- 3.1 Reference Architecture -- 4 Discussion -- 4.1 Social Rankings Gamability -- 4.2 Sharing Incentives -- 4.3 Echo-Chambers -- 5 Conclusion -- References -- Classifying Policy Issue Frame Bias in Philippine Online News -- 1 Introduction -- 2 Methodology -- 2.1 Selection of Media Frame Corpus (MFC) Training Dataset -- 2.2 Selection of the Philippine Online News Dataset -- 2.3 Developing Classification Models -- 2.4 Classification of Policy Issue Frames on Philippine Dataset Using BERT -- 2.5 Testing the Difference of Policy Frames Among Media Outlet -- 3 Results and Discussion -- 3.1 Frame Classification on the Aggregated Philippine Dataset -- 3.2 Comparison of Frame Classification per Media Outlet -- 3.3 Comparison of Frame Classification per Media Outlet on Unambiguous Topics -- 3.4 Comparison of Frame Classification per Media Outlet on Ambiguous Topic -- 4 Conclusion -- References -- Dismantling Hate: Understanding Hate Speech Trends Against NBA Athletes -- 1 Introduction -- 2 Method -- 2.1 Hate Speech Detection -- 3 Results -- 4 Discussions and Conclusions -- References -- Feedback Loops and Complex Dynamics of Harmful Speech in Online Discussions -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data -- 3.2 Comment Classifications -- 3.3 Modeling Reddit Discussions -- 3.4 Measuring Feedback Loops with Mutual Granger Causality -- 4 Results. |
4.1 Evolution of Harmful Speech -- 4.2 Feedback Loops -- 4.3 Feedback Loops and Harmful Speech -- 5 Discussion and Conclusion -- References -- Chirping Diplomacy: Analyzing Chinese State Social-Cyber Maneuvers on Twitter -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data Collection -- 3.2 State-Affiliated Labels -- 3.3 Network Analysis with ORA -- 3.4 BEND Maneuvers with ORA -- 4 Results -- 4.1 Key Chinese State-Affiliated Actors -- 4.2 BEND Maneuvers Targeted at State Officials -- 5 Discussion -- References -- Vulnerability Dictionary: Language Use During Times of Crisis and Uncertainty -- 1 Introduction -- 2 Background -- 2.1 Psycholinguistic Dictionaries -- 2.2 Existing Vulnerability Measures -- 3 Methods -- 3.1 Identify Relevant Lexicons -- 3.2 Curate and Evaluate Word Selections for Each Lexicon -- 4 Result -- 4.1 Construct Validity and Cohen's Kappa -- 4.2 Accuracy and Generalizability -- 4.3 Discriminant Validity -- 5 Conclusion -- 6 Discussion and Limitation -- References -- Tracking China's Cross-Strait Bot Networks Against Taiwan -- 1 Introduction -- 2 Methods -- 2.1 Data -- 2.2 Tracking Bot Networks -- 3 Results -- 3.1 Communication Structure Network Analysis -- 3.2 Account Activity Analysis -- 3.3 URL Analysis -- 3.4 Bot Communities -- 3.5 Targeted Audiences -- 4 Conclusion -- References -- Assessing |
|
|
|
|
|
|
|
Media's Representation of Frustration Towards Venezuelan Migrants in Colombia -- 1 Introduction -- 1.1 Host Communities' Frustration Towards Migrants -- 1.2 Background Context of Migration Between Colombia and Venezuela -- 2 Methodology -- 2.1 Newspaper Data and Qualitative Coding -- 2.2 Venezuelan Migration Data -- 2.3 Research Hypotheses -- 3 Statistical Path Modeling -- 4 Discussion -- 5 Conclusion -- References -- Human Behavior Modeling -- Agent-Based Moral Interaction Simulations in Imbalanced Polarized Settings -- 1 Intro. |
2 Related Works -- 3 Methods -- 3.1 Assumptions -- 3.2 Agents -- 3.3 Emotion -- 3.4 Model -- 4 Results -- 5 Discussion and Limitations -- 6 Conclusion -- References -- Investigating the Use of Belief-Bias to Measure Acceptance of False Information -- 1 Background -- 1.1 Belief-Bias -- 1.2 Minimal Explanation Paradigm -- 2 Present Study -- 2.1 Methods -- 2.2 Results -- 2.3 Discussion -- References -- Simulation of Stance Perturbations -- 1 Background -- 2 Simulation Objectives -- 2.1 Research Questions -- 2.2 Contributions -- 3 Model Definition -- 3.1 Influence-Stance Tradeoff -- 3.2 Confederate Selection -- 3.3 Perturbation Strategy -- 4 Methodology -- 4.1 Virtual Experiments Setup -- 5 Results and Discussion -- 6 Validation -- 7 Limitations and Future Work -- 8 Conclusion -- References -- Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility -- 1 Introduction -- 2 Related Works -- 3 Dynamic Phishing Susceptibility Model -- 3.1 Cybersecurity Education and Forgetting Curve -- 4 Virtual Experiment -- 5 Discussion and Conclusion -- References -- Designing Organizations of Human and Non-Human Knowledge Workers -- 1 Introduction -- 1.1 Knowledge Work -- 1.2 Human Knowledge Workers -- 1.3 Non-Human Knowledge Workers -- 2 Organizational Technologies -- 3 An Example -- 3.1 POW-ER -- 3.2 An Accelerated Launch -- 3.3 Comparative Trials -- 3.4 Results -- 4 Discussion -- 5 Conclusion -- References -- Modeling Human Actions in the Cart-Pole Game Using Cognitive and Deep Reinforcement Learning Approach -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Game Design -- 3.2 Participants -- 3.3 Procedure -- 4 Results -- 5 Discussion and Conclusion -- References -- CCTFv1: Computational Modeling of Cyber Team Formation Strategies -- 1 Introduction -- 2 Implementation Methodology -- 2.1 Study Design -- 2.2 Study Parameters. |
3 Results and Analysis -- 3.1 Sample Results -- 3.2 Hypothesis Testing -- 4 Conclusion -- References -- Simulating Transport Mode Choices in Developing Countries -- 1 Introduction -- 2 Related Works -- 3 Simulation Model -- 3.1 Decision-Making Module -- 3.2 Social Influence -- 3.3 Validation -- 4 Virtual Experiment -- 5 Discussion and Future Work -- 6 Conclusions -- References -- User Identity Modeling to Characterize Communication Patterns of Domestic Extremists Behavior on Social Media -- 1 Introduction -- 2 Literature Review -- 2.1 Unsupervised Learning for Identifying Extremists Users -- 2.2 Supervised Learning for Detecting Hateful Rhetoric -- 3 Methodology -- 3.1 Data Collection and Processing -- 3.2 Theory-Driven Attributes of User Behavior -- 3.3 Identifying Behavior Classes via Unsupervised Learning -- 4 Results and Discussion -- 4.1 Cluster Performance Evaluation -- 4.2 Visualization of User Behavior Categories -- 4.3 Cluster Topical Analysis -- 4.4 Moral Values Analysis -- 4.5 Psychometric Analysis -- 5 Conclusion -- References -- Understanding Clique Formation in Social Networks - An Agent-Based Model of Social Preferences in Fixed and Dynamic Networks -- 1 Introduction -- 2 Empirical Background for this Work -- 3 Social Preference Formation -- 3.1 Preference Inference per Iteration -- 3.2 Memory Growth and |
|
|
|
|
|
|
|
|
Memory Decay Through Iterations -- 4 Demonstrations and Results -- 5 Conclusion -- References -- A Bayesian Approach of Predicting the Movement of Internally Displaced Persons -- 1 Introduction -- 2 Problem Description -- 2.1 Background -- 2.2 Data -- 2.3 Problem Formulation -- 3 Model and Bayesian Technique -- 3.1 Model -- 3.2 Approximate Bayesian Computation (ABC) -- 4 Results -- 4.1 Setup -- 4.2 Weights Estimation -- 4.3 Prediction of IDPs at Potential Destinations Other than Camps -- 5 Discussion -- References. |
Social-Cyber Behavior Modeling. |
|
|
|
|
|
| |