top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Social, cultural, and behavioral modeling : 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20-22, 2023, Proceedings / / Robert Thomson [and four others], editors
Social, cultural, and behavioral modeling : 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20-22, 2023, Proceedings / / Robert Thomson [and four others], editors
Edizione [1st ed.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (347 pages)
Disciplina 153
Collana Lecture notes in computer science
Soggetto topico Human behavior - Mathematical models
Interactive computer systems
Interpersonal relations
ISBN 3-031-43129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Detecting Malign Influence -- Misogyny, Women in Power, and Patterns of Social Media Harassment -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Datasets -- 3.2 Slur Detection -- 4 Results -- 5 Limitations -- 6 Discussion and Future Work -- References -- Stereotype Content Dictionary: A Semantic Space of 3 Million Words and Phrases Using Google News Word2Vec Embeddings -- 1 Introduction -- 1.1 Background -- 2 Related Work -- 2.1 Traditional Measurement of Stereotype Content -- 2.2 Computational Measurement of Stereotype Content -- 3 Datasets and Methods -- 3.1 Determining Antonym Pairs from Stereotype Dictionaries -- 3.2 Identifying Stereotype Dimensions in Google News Embeddings -- 3.3 Projecting Word Embeddings on Stereotype Semantic Space -- 3.4 Model Validation -- 4 Result -- 4.1 Validation of Computational QT Model -- 4.2 Comparison Between QT Model and Fraser Model -- 5 Discussion and Future Work -- References -- Social Cybersecurity Analysis of the Telegram Information Environment During the 2022 Invasion of Ukraine -- 1 Introduction -- 2 Data -- 2.1 Telegram Overview -- 2.2 Collection -- 2.3 Data Overview -- 3 Methodology -- 3.1 Stance Detection -- 3.2 BEND Analysis -- 4 Results and Discussion -- 4.1 Network Overview -- 4.2 Stance Analysis -- 4.3 BEND Analysis of Maneuvers -- 5 Limitations and Future Work -- 6 Conclusion -- References -- The Dynamics of Political Narratives During the Russian Invasion of Ukraine -- 1 Introduction -- 2 Background and Related Work -- 3 Data -- 4 Methodology -- 5 Results -- 5.1 RQ1: Chinese Political Narratives Around RU -- 5.2 RQ2: Contribution of Camps to RU-Related Narrative Evolution -- 6 Discussion and Future Work -- References -- Anger Breeds Controversy: Analyzing Controversy and Emotions on Reddit -- 1 Introduction -- 2 Related Work -- 3 Methods.
3.1 Data -- 3.2 Emotion Detection -- 4 Results -- 4.1 RQ1: Emotions in Controversial Comments -- 4.2 RQ2: Controversial Comments Change Emotions in Discussions -- 4.3 RQ3: Predicting Controversy from Emotions -- 5 Discussion and Conclusion -- References -- Building a Healthier Feed: Private Location Trace Intersection Driven Feed Recommendations -- 1 Introduction -- 2 A Social Recommendation Algorithm -- 2.1 An Extendable Paradigm -- 2.2 A View Towards Web3 -- 3 Validation and Demonstration -- 3.1 Reference Architecture -- 4 Discussion -- 4.1 Social Rankings Gamability -- 4.2 Sharing Incentives -- 4.3 Echo-Chambers -- 5 Conclusion -- References -- Classifying Policy Issue Frame Bias in Philippine Online News -- 1 Introduction -- 2 Methodology -- 2.1 Selection of Media Frame Corpus (MFC) Training Dataset -- 2.2 Selection of the Philippine Online News Dataset -- 2.3 Developing Classification Models -- 2.4 Classification of Policy Issue Frames on Philippine Dataset Using BERT -- 2.5 Testing the Difference of Policy Frames Among Media Outlet -- 3 Results and Discussion -- 3.1 Frame Classification on the Aggregated Philippine Dataset -- 3.2 Comparison of Frame Classification per Media Outlet -- 3.3 Comparison of Frame Classification per Media Outlet on Unambiguous Topics -- 3.4 Comparison of Frame Classification per Media Outlet on Ambiguous Topic -- 4 Conclusion -- References -- Dismantling Hate: Understanding Hate Speech Trends Against NBA Athletes -- 1 Introduction -- 2 Method -- 2.1 Hate Speech Detection -- 3 Results -- 4 Discussions and Conclusions -- References -- Feedback Loops and Complex Dynamics of Harmful Speech in Online Discussions -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data -- 3.2 Comment Classifications -- 3.3 Modeling Reddit Discussions -- 3.4 Measuring Feedback Loops with Mutual Granger Causality -- 4 Results.
4.1 Evolution of Harmful Speech -- 4.2 Feedback Loops -- 4.3 Feedback Loops and Harmful Speech -- 5 Discussion and Conclusion -- References -- Chirping Diplomacy: Analyzing Chinese State Social-Cyber Maneuvers on Twitter -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data Collection -- 3.2 State-Affiliated Labels -- 3.3 Network Analysis with ORA -- 3.4 BEND Maneuvers with ORA -- 4 Results -- 4.1 Key Chinese State-Affiliated Actors -- 4.2 BEND Maneuvers Targeted at State Officials -- 5 Discussion -- References -- Vulnerability Dictionary: Language Use During Times of Crisis and Uncertainty -- 1 Introduction -- 2 Background -- 2.1 Psycholinguistic Dictionaries -- 2.2 Existing Vulnerability Measures -- 3 Methods -- 3.1 Identify Relevant Lexicons -- 3.2 Curate and Evaluate Word Selections for Each Lexicon -- 4 Result -- 4.1 Construct Validity and Cohen's Kappa -- 4.2 Accuracy and Generalizability -- 4.3 Discriminant Validity -- 5 Conclusion -- 6 Discussion and Limitation -- References -- Tracking China's Cross-Strait Bot Networks Against Taiwan -- 1 Introduction -- 2 Methods -- 2.1 Data -- 2.2 Tracking Bot Networks -- 3 Results -- 3.1 Communication Structure Network Analysis -- 3.2 Account Activity Analysis -- 3.3 URL Analysis -- 3.4 Bot Communities -- 3.5 Targeted Audiences -- 4 Conclusion -- References -- Assessing Media's Representation of Frustration Towards Venezuelan Migrants in Colombia -- 1 Introduction -- 1.1 Host Communities' Frustration Towards Migrants -- 1.2 Background Context of Migration Between Colombia and Venezuela -- 2 Methodology -- 2.1 Newspaper Data and Qualitative Coding -- 2.2 Venezuelan Migration Data -- 2.3 Research Hypotheses -- 3 Statistical Path Modeling -- 4 Discussion -- 5 Conclusion -- References -- Human Behavior Modeling -- Agent-Based Moral Interaction Simulations in Imbalanced Polarized Settings -- 1 Intro.
2 Related Works -- 3 Methods -- 3.1 Assumptions -- 3.2 Agents -- 3.3 Emotion -- 3.4 Model -- 4 Results -- 5 Discussion and Limitations -- 6 Conclusion -- References -- Investigating the Use of Belief-Bias to Measure Acceptance of False Information -- 1 Background -- 1.1 Belief-Bias -- 1.2 Minimal Explanation Paradigm -- 2 Present Study -- 2.1 Methods -- 2.2 Results -- 2.3 Discussion -- References -- Simulation of Stance Perturbations -- 1 Background -- 2 Simulation Objectives -- 2.1 Research Questions -- 2.2 Contributions -- 3 Model Definition -- 3.1 Influence-Stance Tradeoff -- 3.2 Confederate Selection -- 3.3 Perturbation Strategy -- 4 Methodology -- 4.1 Virtual Experiments Setup -- 5 Results and Discussion -- 6 Validation -- 7 Limitations and Future Work -- 8 Conclusion -- References -- Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility -- 1 Introduction -- 2 Related Works -- 3 Dynamic Phishing Susceptibility Model -- 3.1 Cybersecurity Education and Forgetting Curve -- 4 Virtual Experiment -- 5 Discussion and Conclusion -- References -- Designing Organizations of Human and Non-Human Knowledge Workers -- 1 Introduction -- 1.1 Knowledge Work -- 1.2 Human Knowledge Workers -- 1.3 Non-Human Knowledge Workers -- 2 Organizational Technologies -- 3 An Example -- 3.1 POW-ER -- 3.2 An Accelerated Launch -- 3.3 Comparative Trials -- 3.4 Results -- 4 Discussion -- 5 Conclusion -- References -- Modeling Human Actions in the Cart-Pole Game Using Cognitive and Deep Reinforcement Learning Approach -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Game Design -- 3.2 Participants -- 3.3 Procedure -- 4 Results -- 5 Discussion and Conclusion -- References -- CCTFv1: Computational Modeling of Cyber Team Formation Strategies -- 1 Introduction -- 2 Implementation Methodology -- 2.1 Study Design -- 2.2 Study Parameters.
3 Results and Analysis -- 3.1 Sample Results -- 3.2 Hypothesis Testing -- 4 Conclusion -- References -- Simulating Transport Mode Choices in Developing Countries -- 1 Introduction -- 2 Related Works -- 3 Simulation Model -- 3.1 Decision-Making Module -- 3.2 Social Influence -- 3.3 Validation -- 4 Virtual Experiment -- 5 Discussion and Future Work -- 6 Conclusions -- References -- User Identity Modeling to Characterize Communication Patterns of Domestic Extremists Behavior on Social Media -- 1 Introduction -- 2 Literature Review -- 2.1 Unsupervised Learning for Identifying Extremists Users -- 2.2 Supervised Learning for Detecting Hateful Rhetoric -- 3 Methodology -- 3.1 Data Collection and Processing -- 3.2 Theory-Driven Attributes of User Behavior -- 3.3 Identifying Behavior Classes via Unsupervised Learning -- 4 Results and Discussion -- 4.1 Cluster Performance Evaluation -- 4.2 Visualization of User Behavior Categories -- 4.3 Cluster Topical Analysis -- 4.4 Moral Values Analysis -- 4.5 Psychometric Analysis -- 5 Conclusion -- References -- Understanding Clique Formation in Social Networks - An Agent-Based Model of Social Preferences in Fixed and Dynamic Networks -- 1 Introduction -- 2 Empirical Background for this Work -- 3 Social Preference Formation -- 3.1 Preference Inference per Iteration -- 3.2 Memory Growth and Memory Decay Through Iterations -- 4 Demonstrations and Results -- 5 Conclusion -- References -- A Bayesian Approach of Predicting the Movement of Internally Displaced Persons -- 1 Introduction -- 2 Problem Description -- 2.1 Background -- 2.2 Data -- 2.3 Problem Formulation -- 3 Model and Bayesian Technique -- 3.1 Model -- 3.2 Approximate Bayesian Computation (ABC) -- 4 Results -- 4.1 Setup -- 4.2 Weights Estimation -- 4.3 Prediction of IDPs at Potential Destinations Other than Camps -- 5 Discussion -- References.
Social-Cyber Behavior Modeling.
Record Nr. UNINA-9910746069403321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social, cultural, and behavioral modeling : 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20-22, 2023, Proceedings / / Robert Thomson [and four others], editors
Social, cultural, and behavioral modeling : 16th International Conference, SBP-BRiMS 2023, Pittsburgh, PA, USA, September 20-22, 2023, Proceedings / / Robert Thomson [and four others], editors
Edizione [1st ed.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (347 pages)
Disciplina 153
Collana Lecture notes in computer science
Soggetto topico Human behavior - Mathematical models
Interactive computer systems
Interpersonal relations
ISBN 3-031-43129-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Detecting Malign Influence -- Misogyny, Women in Power, and Patterns of Social Media Harassment -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Datasets -- 3.2 Slur Detection -- 4 Results -- 5 Limitations -- 6 Discussion and Future Work -- References -- Stereotype Content Dictionary: A Semantic Space of 3 Million Words and Phrases Using Google News Word2Vec Embeddings -- 1 Introduction -- 1.1 Background -- 2 Related Work -- 2.1 Traditional Measurement of Stereotype Content -- 2.2 Computational Measurement of Stereotype Content -- 3 Datasets and Methods -- 3.1 Determining Antonym Pairs from Stereotype Dictionaries -- 3.2 Identifying Stereotype Dimensions in Google News Embeddings -- 3.3 Projecting Word Embeddings on Stereotype Semantic Space -- 3.4 Model Validation -- 4 Result -- 4.1 Validation of Computational QT Model -- 4.2 Comparison Between QT Model and Fraser Model -- 5 Discussion and Future Work -- References -- Social Cybersecurity Analysis of the Telegram Information Environment During the 2022 Invasion of Ukraine -- 1 Introduction -- 2 Data -- 2.1 Telegram Overview -- 2.2 Collection -- 2.3 Data Overview -- 3 Methodology -- 3.1 Stance Detection -- 3.2 BEND Analysis -- 4 Results and Discussion -- 4.1 Network Overview -- 4.2 Stance Analysis -- 4.3 BEND Analysis of Maneuvers -- 5 Limitations and Future Work -- 6 Conclusion -- References -- The Dynamics of Political Narratives During the Russian Invasion of Ukraine -- 1 Introduction -- 2 Background and Related Work -- 3 Data -- 4 Methodology -- 5 Results -- 5.1 RQ1: Chinese Political Narratives Around RU -- 5.2 RQ2: Contribution of Camps to RU-Related Narrative Evolution -- 6 Discussion and Future Work -- References -- Anger Breeds Controversy: Analyzing Controversy and Emotions on Reddit -- 1 Introduction -- 2 Related Work -- 3 Methods.
3.1 Data -- 3.2 Emotion Detection -- 4 Results -- 4.1 RQ1: Emotions in Controversial Comments -- 4.2 RQ2: Controversial Comments Change Emotions in Discussions -- 4.3 RQ3: Predicting Controversy from Emotions -- 5 Discussion and Conclusion -- References -- Building a Healthier Feed: Private Location Trace Intersection Driven Feed Recommendations -- 1 Introduction -- 2 A Social Recommendation Algorithm -- 2.1 An Extendable Paradigm -- 2.2 A View Towards Web3 -- 3 Validation and Demonstration -- 3.1 Reference Architecture -- 4 Discussion -- 4.1 Social Rankings Gamability -- 4.2 Sharing Incentives -- 4.3 Echo-Chambers -- 5 Conclusion -- References -- Classifying Policy Issue Frame Bias in Philippine Online News -- 1 Introduction -- 2 Methodology -- 2.1 Selection of Media Frame Corpus (MFC) Training Dataset -- 2.2 Selection of the Philippine Online News Dataset -- 2.3 Developing Classification Models -- 2.4 Classification of Policy Issue Frames on Philippine Dataset Using BERT -- 2.5 Testing the Difference of Policy Frames Among Media Outlet -- 3 Results and Discussion -- 3.1 Frame Classification on the Aggregated Philippine Dataset -- 3.2 Comparison of Frame Classification per Media Outlet -- 3.3 Comparison of Frame Classification per Media Outlet on Unambiguous Topics -- 3.4 Comparison of Frame Classification per Media Outlet on Ambiguous Topic -- 4 Conclusion -- References -- Dismantling Hate: Understanding Hate Speech Trends Against NBA Athletes -- 1 Introduction -- 2 Method -- 2.1 Hate Speech Detection -- 3 Results -- 4 Discussions and Conclusions -- References -- Feedback Loops and Complex Dynamics of Harmful Speech in Online Discussions -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data -- 3.2 Comment Classifications -- 3.3 Modeling Reddit Discussions -- 3.4 Measuring Feedback Loops with Mutual Granger Causality -- 4 Results.
4.1 Evolution of Harmful Speech -- 4.2 Feedback Loops -- 4.3 Feedback Loops and Harmful Speech -- 5 Discussion and Conclusion -- References -- Chirping Diplomacy: Analyzing Chinese State Social-Cyber Maneuvers on Twitter -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Data Collection -- 3.2 State-Affiliated Labels -- 3.3 Network Analysis with ORA -- 3.4 BEND Maneuvers with ORA -- 4 Results -- 4.1 Key Chinese State-Affiliated Actors -- 4.2 BEND Maneuvers Targeted at State Officials -- 5 Discussion -- References -- Vulnerability Dictionary: Language Use During Times of Crisis and Uncertainty -- 1 Introduction -- 2 Background -- 2.1 Psycholinguistic Dictionaries -- 2.2 Existing Vulnerability Measures -- 3 Methods -- 3.1 Identify Relevant Lexicons -- 3.2 Curate and Evaluate Word Selections for Each Lexicon -- 4 Result -- 4.1 Construct Validity and Cohen's Kappa -- 4.2 Accuracy and Generalizability -- 4.3 Discriminant Validity -- 5 Conclusion -- 6 Discussion and Limitation -- References -- Tracking China's Cross-Strait Bot Networks Against Taiwan -- 1 Introduction -- 2 Methods -- 2.1 Data -- 2.2 Tracking Bot Networks -- 3 Results -- 3.1 Communication Structure Network Analysis -- 3.2 Account Activity Analysis -- 3.3 URL Analysis -- 3.4 Bot Communities -- 3.5 Targeted Audiences -- 4 Conclusion -- References -- Assessing Media's Representation of Frustration Towards Venezuelan Migrants in Colombia -- 1 Introduction -- 1.1 Host Communities' Frustration Towards Migrants -- 1.2 Background Context of Migration Between Colombia and Venezuela -- 2 Methodology -- 2.1 Newspaper Data and Qualitative Coding -- 2.2 Venezuelan Migration Data -- 2.3 Research Hypotheses -- 3 Statistical Path Modeling -- 4 Discussion -- 5 Conclusion -- References -- Human Behavior Modeling -- Agent-Based Moral Interaction Simulations in Imbalanced Polarized Settings -- 1 Intro.
2 Related Works -- 3 Methods -- 3.1 Assumptions -- 3.2 Agents -- 3.3 Emotion -- 3.4 Model -- 4 Results -- 5 Discussion and Limitations -- 6 Conclusion -- References -- Investigating the Use of Belief-Bias to Measure Acceptance of False Information -- 1 Background -- 1.1 Belief-Bias -- 1.2 Minimal Explanation Paradigm -- 2 Present Study -- 2.1 Methods -- 2.2 Results -- 2.3 Discussion -- References -- Simulation of Stance Perturbations -- 1 Background -- 2 Simulation Objectives -- 2.1 Research Questions -- 2.2 Contributions -- 3 Model Definition -- 3.1 Influence-Stance Tradeoff -- 3.2 Confederate Selection -- 3.3 Perturbation Strategy -- 4 Methodology -- 4.1 Virtual Experiments Setup -- 5 Results and Discussion -- 6 Validation -- 7 Limitations and Future Work -- 8 Conclusion -- References -- Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility -- 1 Introduction -- 2 Related Works -- 3 Dynamic Phishing Susceptibility Model -- 3.1 Cybersecurity Education and Forgetting Curve -- 4 Virtual Experiment -- 5 Discussion and Conclusion -- References -- Designing Organizations of Human and Non-Human Knowledge Workers -- 1 Introduction -- 1.1 Knowledge Work -- 1.2 Human Knowledge Workers -- 1.3 Non-Human Knowledge Workers -- 2 Organizational Technologies -- 3 An Example -- 3.1 POW-ER -- 3.2 An Accelerated Launch -- 3.3 Comparative Trials -- 3.4 Results -- 4 Discussion -- 5 Conclusion -- References -- Modeling Human Actions in the Cart-Pole Game Using Cognitive and Deep Reinforcement Learning Approach -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Game Design -- 3.2 Participants -- 3.3 Procedure -- 4 Results -- 5 Discussion and Conclusion -- References -- CCTFv1: Computational Modeling of Cyber Team Formation Strategies -- 1 Introduction -- 2 Implementation Methodology -- 2.1 Study Design -- 2.2 Study Parameters.
3 Results and Analysis -- 3.1 Sample Results -- 3.2 Hypothesis Testing -- 4 Conclusion -- References -- Simulating Transport Mode Choices in Developing Countries -- 1 Introduction -- 2 Related Works -- 3 Simulation Model -- 3.1 Decision-Making Module -- 3.2 Social Influence -- 3.3 Validation -- 4 Virtual Experiment -- 5 Discussion and Future Work -- 6 Conclusions -- References -- User Identity Modeling to Characterize Communication Patterns of Domestic Extremists Behavior on Social Media -- 1 Introduction -- 2 Literature Review -- 2.1 Unsupervised Learning for Identifying Extremists Users -- 2.2 Supervised Learning for Detecting Hateful Rhetoric -- 3 Methodology -- 3.1 Data Collection and Processing -- 3.2 Theory-Driven Attributes of User Behavior -- 3.3 Identifying Behavior Classes via Unsupervised Learning -- 4 Results and Discussion -- 4.1 Cluster Performance Evaluation -- 4.2 Visualization of User Behavior Categories -- 4.3 Cluster Topical Analysis -- 4.4 Moral Values Analysis -- 4.5 Psychometric Analysis -- 5 Conclusion -- References -- Understanding Clique Formation in Social Networks - An Agent-Based Model of Social Preferences in Fixed and Dynamic Networks -- 1 Introduction -- 2 Empirical Background for this Work -- 3 Social Preference Formation -- 3.1 Preference Inference per Iteration -- 3.2 Memory Growth and Memory Decay Through Iterations -- 4 Demonstrations and Results -- 5 Conclusion -- References -- A Bayesian Approach of Predicting the Movement of Internally Displaced Persons -- 1 Introduction -- 2 Problem Description -- 2.1 Background -- 2.2 Data -- 2.3 Problem Formulation -- 3 Model and Bayesian Technique -- 3.1 Model -- 3.2 Approximate Bayesian Computation (ABC) -- 4 Results -- 4.1 Setup -- 4.2 Weights Estimation -- 4.3 Prediction of IDPs at Potential Destinations Other than Camps -- 5 Discussion -- References.
Social-Cyber Behavior Modeling.
Record Nr. UNISA-996550556803316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social, cultural, and behavioral modeling : 14th international conference, SBP-BRiMS 2021, virtual event, July 6-9, 2021, proceedings / / Robert Thomson [and three others], editors
Social, cultural, and behavioral modeling : 14th international conference, SBP-BRiMS 2021, virtual event, July 6-9, 2021, proceedings / / Robert Thomson [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (353 pages)
Disciplina 302.231
Collana Lecture Notes in Computer Science
Soggetto topico Online social networks - Psychological aspects
Interpersonal relations
ISBN 3-030-80387-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- COVID-Related Focus -- Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine Development -- 1 Introduction -- 2 Data Collection and Processing -- 3 Low Credibility Information Sources -- 4 Malicious URLs -- 5 User Co-sharing Practices -- 6 Conclusions -- References -- How Political is the Spread of COVID-19 in the United States? -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 3.1 Department of Transportation Data -- 3.2 JHU CSSE COVID-19 Dataset -- 3.3 Other Sources -- 4 Methodology -- 4.1 K-Means Clustering -- 4.2 Calculating Infection Rate -- 4.3 Correlation Analysis -- 5 Analysis Results -- 5.1 Clustering US States -- 5.2 Correlation Analysis -- 5.3 Further Analysis for Travel Patterns After States' Reopening Dates -- 6 Conclusions and Future Work -- References -- Applying an Epidemiological Model to Evaluate the Propagation of Misinformation and Legitimate COVID-19-Related Information on Twitter -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Analysis and Results -- 5 Conclusions and Future Work -- References -- Optimization of Mitigation Strategies During Epidemics Using Offline Reinforcement Learning -- 1 Introduction -- 2 Background -- 2.1 SIR-Based Model for Epidemic Simulation -- 2.2 Markov Decision Process -- 3 Methodology -- 3.1 Extended Model for Epidemic Simulation (SI2R) -- 3.2 Reinforcement Learning for Optimization of Regulations -- 3.3 Offline Reinforcement Learning -- 4 Experiments -- 4.1 Dataset Description -- 4.2 Results -- 5 Conclusion -- References -- Mining Online Social Media to Drive Psychologically Valid Agent Models of Regional Covid-19 Mask Wearing -- Abstract -- 1 Introduction -- 2 Data -- 2.1 Mask-Wearing Data -- 2.2 CMU CASOS/IDeaS COVID-19 Twitter Data.
2.3 Twitter Coronavirus (COVID-19) Geo-Tagged Tweets Dataset -- 3 Pro/Con Tweets/Retweets in Four States -- 4 Stance Detection -- 5 Psychologically Valid Agents (PVAs) -- 5.1 Dynamics of Attitudes and Infection -- 5.2 Match to Data -- 6 Conclusion -- Acknowledgements -- References -- Fine-Grained Analysis of the Use of Neutral and Controversial Terms for COVID-19 on Social Media -- 1 Introduction -- 2 Related Work -- 3 Data and Methodology -- 3.1 Data Collection and Pre-processing -- 3.2 Classification -- 3.3 Latent Dirichlet Allocation -- 3.4 LIWC2015 -- 4 Empirical Results -- 4.1 Classification -- 4.2 LDA -- 4.3 LIWC Sentiment Features -- 5 Conclusion -- References -- Methodologies -- Assessing Bias in YouTube's Video Recommendation Algorithm in a Cross-lingual and Cross-topical Context -- 1 Introduction -- 2 Related Work -- 3 Datasets and Data Collection Methodology -- 4 Experiments and Findings -- 4.1 Bias Detection -- 4.2 Bias Variance -- 4.3 Findings -- 5 Conclusions and Future Work -- References -- Formal Methods for an Iterated Volunteer's Dilemma -- 1 Introduction -- 2 Background -- 2.1 The Volunteer's Dilemma -- 3 Design Overview -- 3.1 Game Parameters -- 3.2 Action Space -- 3.3 Reward Structure -- 4 Experiments and Results -- 4.1 Model Correctness -- 4.2 Property Verification -- 4.3 Reward Maximization -- 5 Limitations and Future Work -- 6 Conclusion -- References -- Privacy Preserving Text Representation Learning Using BERT -- 1 Introduction -- 2 Problem Statement -- 3 The Proposed Framework -- 3.1 Sentence Representation Using BERT -- 3.2 Perturbing Text by Adding Noise -- 3.3 Preserving Text Utility -- 3.4 Protecting Private Information -- 3.5 DPBERT - Learning the Text Representation -- 4 Experiments -- 4.1 Data -- 4.2 Experimental Design -- 4.3 Experimental Result -- 5 Related Work -- 6 Conclusion -- References.
GPU Accelerated PMCMC Algorithm with System Dynamics Modelling -- 1 Introduction -- 2 Background and Related Work -- 2.1 Particle Markov Chain Monte Carlo Methods and Parallelization -- 2.2 GPU Programming and CUDA -- 3 Implementation -- 4 Using Particle MCMC in Influenza Model Inference -- 4.1 Model Description -- 4.2 Model Inference Results -- 5 Experiments and Results -- 6 Discussion -- References -- An Analysis of Global News Coverage of Refugees Using a Big Data Approach -- 1 Refugees and Other Displaced Persons in the Media -- 2 Methodology -- 2.1 Dataset -- 2.2 Data Query -- 2.3 Limitations -- 3 Global News About Refugees -- 3.1 Refugee-Related Events Associated with Peak Coverage -- 3.2 Observing the Content CAMEO Codes of Refugee Related News -- 4 Discussion -- References -- An Identity-Based Framework for Generalizable Hate Speech Detection -- 1 Introduction -- 2 Data and Methods -- 2.1 Dataset Curation -- 2.2 An Identity Lexicon with Psycholinguistic Features -- 2.3 Problem Formulation and Experimental Setup -- 3 Results -- 3.1 Hate Speech Consistently Features Identity Abuse -- 3.2 Evaluating Identity Abuse for Hate Speech Detection -- 3.3 Mapping Cross-dataset Generalizability -- 4 Conclusions and Future Work -- References -- Using Diffusion of Innovations Theory to Study Connective Action Campaigns -- 1 Introduction -- 2 Literature Review -- 3 Data Collection and Research Methodology -- 4 Analysis and Results -- 5 Conclusions and Future Work -- References -- Reinforcement Learning for Data Poisoning on Graph Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 Related Work -- 3 Motivation -- 4 Methodology -- 4.1 Data Procurement -- 4.2 Graph Classification -- 4.3 Graph Neural Networks -- 4.4 Reinforcement Learning -- 4.5 Poison Attack -- 5 Experiments -- 5.1 MiniGCDataset -- 5.2 MiniGC - Larger -- 6 Conclusion.
7 Future Work -- References -- Social Cybersecurity and Social Networks -- Simulating Social-Cyber Maneuvers to Deter Disinformation Campaigns -- 1 Introduction -- 2 Related Works -- 2.1 Modeling Information and Beliefs -- 2.2 BEND Framework -- 2.3 Modeling Emotions and Reason -- 3 Model Description -- 3.1 Review of twitter_sim Features -- 3.2 Model Changes Introduced for twitter_sim2.0 -- 4 Experiments -- 4.1 Network Based Maneuvers -- 4.2 Information Based Maneuvers -- 5 Results and Discussion -- 5.1 Baseline -- 5.2 Network Maneuver -- 5.3 Information Maneuver -- 6 Validation -- 7 Conclusion -- References -- Studying the Role of Social Bots During Cyber Flash Mobs -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results and Analysis -- 5 Conclusion and Future Research Directions -- References -- The Integrated Game Transformation Framework and Cyberwar: What 2×2 Games Tell Us About Cyberattacks -- 1 Introduction -- 2 Game Theory and Cyberwarfare -- 3 Methodology -- 3.1 The Integrated GTF Model -- 4 Findings -- 5 Discussion and Conclusion -- References -- Bot-Based Emotion Behavior Differences in Images During Kashmir Black Day Event -- 1 Introduction -- 2 Data and Methodology -- 2.1 Data Collection and Processing -- 2.2 Bot-Based Emotion Behavior Differences -- 2.3 Community Case Study -- 3 Results -- 3.1 Image Clusters in Kashmir's Black Day -- 3.2 Community Case Study -- 4 Discussion -- 5 Conclusion -- References -- Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Dictionary Generation -- 3.2 Concern Identification -- 3.3 Network Generation -- 3.4 Evaluation -- 4 Results -- 5 Conclusion -- References -- Influence Dynamics Among Narratives -- 1 Introduction -- 2 Related Works -- 3 Data.
4 Methodology -- 4.1 Multi-Variate Hawkes Processes -- 4.2 Quantifying and Comparing Influence Effects -- 5 Results and Discussion -- References -- Network Structures and Humanitarian Need -- 1 Introduction -- 2 Humanitarian Response as a Network -- 2.1 Measuring Network Robustness -- 2.2 The International Aid Regime -- 3 Methodology -- 3.1 Data and Limitations -- 3.2 Measurements -- 4 Humanitarian Aid Under Stress -- 4.1 Divergent Donor Typologies -- 4.2 Addressing Changing Needs -- 5 Discussion -- References -- Identifying Shifts in Collective Attention to Topics on Social Media -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 4 Data -- 5 Experiments and Results -- 6 Conclusions -- References -- wapr.tugon.ph: A Secure Helpline for Detecting Psychosocial Aid from Reports of Unlawful Killings in the Philippines -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Origins of wapr.tugon.ph -- 2.2 Providing Psychosocial Intervention During Crisis -- 2.3 Digital Psychosocial Intervention -- 2.4 Natural Language Processing Text Classification for Detecting Elements of Psychosocial Wellbeing -- 2.5 Securing Human Rights Violation Reports and Data Admissibility Through Blockchain -- 3 Framework and Methodology -- 3.1 warp.tugon.ph Architecture -- 3.2 Psychosocial Wellness Detection Model -- 4 Results and Discussion -- 4.1 Features and Functionalities of wapr.tugon.ph -- 4.2 Psychosocial Wellness Detection Model Performance -- 5 Conclusion -- References -- Human and Agent Modeling -- Social-Judgment-Based Modeling of Opinion Polarization in Chinese Live Streaming Platforms -- 1 Introduction -- 2 Model Formulation -- 3 Simulation Setup and Measurements -- 4 Results and Discussion -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Conclusion -- References -- Having a Bad Day? Detecting the Impact of Atypical Events Using Wearable Sensors.
1 Introduction.
Record Nr. UNINA-9910488699903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social, cultural, and behavioral modeling : 14th international conference, SBP-BRiMS 2021, virtual event, July 6-9, 2021, proceedings / / Robert Thomson [and three others], editors
Social, cultural, and behavioral modeling : 14th international conference, SBP-BRiMS 2021, virtual event, July 6-9, 2021, proceedings / / Robert Thomson [and three others], editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (353 pages)
Disciplina 302.231
Collana Lecture Notes in Computer Science
Soggetto topico Online social networks - Psychological aspects
Interpersonal relations
ISBN 3-030-80387-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- COVID-Related Focus -- Malicious and Low Credibility URLs on Twitter During the AstraZeneca COVID-19 Vaccine Development -- 1 Introduction -- 2 Data Collection and Processing -- 3 Low Credibility Information Sources -- 4 Malicious URLs -- 5 User Co-sharing Practices -- 6 Conclusions -- References -- How Political is the Spread of COVID-19 in the United States? -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 3.1 Department of Transportation Data -- 3.2 JHU CSSE COVID-19 Dataset -- 3.3 Other Sources -- 4 Methodology -- 4.1 K-Means Clustering -- 4.2 Calculating Infection Rate -- 4.3 Correlation Analysis -- 5 Analysis Results -- 5.1 Clustering US States -- 5.2 Correlation Analysis -- 5.3 Further Analysis for Travel Patterns After States' Reopening Dates -- 6 Conclusions and Future Work -- References -- Applying an Epidemiological Model to Evaluate the Propagation of Misinformation and Legitimate COVID-19-Related Information on Twitter -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Analysis and Results -- 5 Conclusions and Future Work -- References -- Optimization of Mitigation Strategies During Epidemics Using Offline Reinforcement Learning -- 1 Introduction -- 2 Background -- 2.1 SIR-Based Model for Epidemic Simulation -- 2.2 Markov Decision Process -- 3 Methodology -- 3.1 Extended Model for Epidemic Simulation (SI2R) -- 3.2 Reinforcement Learning for Optimization of Regulations -- 3.3 Offline Reinforcement Learning -- 4 Experiments -- 4.1 Dataset Description -- 4.2 Results -- 5 Conclusion -- References -- Mining Online Social Media to Drive Psychologically Valid Agent Models of Regional Covid-19 Mask Wearing -- Abstract -- 1 Introduction -- 2 Data -- 2.1 Mask-Wearing Data -- 2.2 CMU CASOS/IDeaS COVID-19 Twitter Data.
2.3 Twitter Coronavirus (COVID-19) Geo-Tagged Tweets Dataset -- 3 Pro/Con Tweets/Retweets in Four States -- 4 Stance Detection -- 5 Psychologically Valid Agents (PVAs) -- 5.1 Dynamics of Attitudes and Infection -- 5.2 Match to Data -- 6 Conclusion -- Acknowledgements -- References -- Fine-Grained Analysis of the Use of Neutral and Controversial Terms for COVID-19 on Social Media -- 1 Introduction -- 2 Related Work -- 3 Data and Methodology -- 3.1 Data Collection and Pre-processing -- 3.2 Classification -- 3.3 Latent Dirichlet Allocation -- 3.4 LIWC2015 -- 4 Empirical Results -- 4.1 Classification -- 4.2 LDA -- 4.3 LIWC Sentiment Features -- 5 Conclusion -- References -- Methodologies -- Assessing Bias in YouTube's Video Recommendation Algorithm in a Cross-lingual and Cross-topical Context -- 1 Introduction -- 2 Related Work -- 3 Datasets and Data Collection Methodology -- 4 Experiments and Findings -- 4.1 Bias Detection -- 4.2 Bias Variance -- 4.3 Findings -- 5 Conclusions and Future Work -- References -- Formal Methods for an Iterated Volunteer's Dilemma -- 1 Introduction -- 2 Background -- 2.1 The Volunteer's Dilemma -- 3 Design Overview -- 3.1 Game Parameters -- 3.2 Action Space -- 3.3 Reward Structure -- 4 Experiments and Results -- 4.1 Model Correctness -- 4.2 Property Verification -- 4.3 Reward Maximization -- 5 Limitations and Future Work -- 6 Conclusion -- References -- Privacy Preserving Text Representation Learning Using BERT -- 1 Introduction -- 2 Problem Statement -- 3 The Proposed Framework -- 3.1 Sentence Representation Using BERT -- 3.2 Perturbing Text by Adding Noise -- 3.3 Preserving Text Utility -- 3.4 Protecting Private Information -- 3.5 DPBERT - Learning the Text Representation -- 4 Experiments -- 4.1 Data -- 4.2 Experimental Design -- 4.3 Experimental Result -- 5 Related Work -- 6 Conclusion -- References.
GPU Accelerated PMCMC Algorithm with System Dynamics Modelling -- 1 Introduction -- 2 Background and Related Work -- 2.1 Particle Markov Chain Monte Carlo Methods and Parallelization -- 2.2 GPU Programming and CUDA -- 3 Implementation -- 4 Using Particle MCMC in Influenza Model Inference -- 4.1 Model Description -- 4.2 Model Inference Results -- 5 Experiments and Results -- 6 Discussion -- References -- An Analysis of Global News Coverage of Refugees Using a Big Data Approach -- 1 Refugees and Other Displaced Persons in the Media -- 2 Methodology -- 2.1 Dataset -- 2.2 Data Query -- 2.3 Limitations -- 3 Global News About Refugees -- 3.1 Refugee-Related Events Associated with Peak Coverage -- 3.2 Observing the Content CAMEO Codes of Refugee Related News -- 4 Discussion -- References -- An Identity-Based Framework for Generalizable Hate Speech Detection -- 1 Introduction -- 2 Data and Methods -- 2.1 Dataset Curation -- 2.2 An Identity Lexicon with Psycholinguistic Features -- 2.3 Problem Formulation and Experimental Setup -- 3 Results -- 3.1 Hate Speech Consistently Features Identity Abuse -- 3.2 Evaluating Identity Abuse for Hate Speech Detection -- 3.3 Mapping Cross-dataset Generalizability -- 4 Conclusions and Future Work -- References -- Using Diffusion of Innovations Theory to Study Connective Action Campaigns -- 1 Introduction -- 2 Literature Review -- 3 Data Collection and Research Methodology -- 4 Analysis and Results -- 5 Conclusions and Future Work -- References -- Reinforcement Learning for Data Poisoning on Graph Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Preliminaries -- 2.2 Related Work -- 3 Motivation -- 4 Methodology -- 4.1 Data Procurement -- 4.2 Graph Classification -- 4.3 Graph Neural Networks -- 4.4 Reinforcement Learning -- 4.5 Poison Attack -- 5 Experiments -- 5.1 MiniGCDataset -- 5.2 MiniGC - Larger -- 6 Conclusion.
7 Future Work -- References -- Social Cybersecurity and Social Networks -- Simulating Social-Cyber Maneuvers to Deter Disinformation Campaigns -- 1 Introduction -- 2 Related Works -- 2.1 Modeling Information and Beliefs -- 2.2 BEND Framework -- 2.3 Modeling Emotions and Reason -- 3 Model Description -- 3.1 Review of twitter_sim Features -- 3.2 Model Changes Introduced for twitter_sim2.0 -- 4 Experiments -- 4.1 Network Based Maneuvers -- 4.2 Information Based Maneuvers -- 5 Results and Discussion -- 5.1 Baseline -- 5.2 Network Maneuver -- 5.3 Information Maneuver -- 6 Validation -- 7 Conclusion -- References -- Studying the Role of Social Bots During Cyber Flash Mobs -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Results and Analysis -- 5 Conclusion and Future Research Directions -- References -- The Integrated Game Transformation Framework and Cyberwar: What 2×2 Games Tell Us About Cyberattacks -- 1 Introduction -- 2 Game Theory and Cyberwarfare -- 3 Methodology -- 3.1 The Integrated GTF Model -- 4 Findings -- 5 Discussion and Conclusion -- References -- Bot-Based Emotion Behavior Differences in Images During Kashmir Black Day Event -- 1 Introduction -- 2 Data and Methodology -- 2.1 Data Collection and Processing -- 2.2 Bot-Based Emotion Behavior Differences -- 2.3 Community Case Study -- 3 Results -- 3.1 Image Clusters in Kashmir's Black Day -- 3.2 Community Case Study -- 4 Discussion -- 5 Conclusion -- References -- Using Social Network Analysis to Analyze Development Priorities of Moroccan Institutions -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Dictionary Generation -- 3.2 Concern Identification -- 3.3 Network Generation -- 3.4 Evaluation -- 4 Results -- 5 Conclusion -- References -- Influence Dynamics Among Narratives -- 1 Introduction -- 2 Related Works -- 3 Data.
4 Methodology -- 4.1 Multi-Variate Hawkes Processes -- 4.2 Quantifying and Comparing Influence Effects -- 5 Results and Discussion -- References -- Network Structures and Humanitarian Need -- 1 Introduction -- 2 Humanitarian Response as a Network -- 2.1 Measuring Network Robustness -- 2.2 The International Aid Regime -- 3 Methodology -- 3.1 Data and Limitations -- 3.2 Measurements -- 4 Humanitarian Aid Under Stress -- 4.1 Divergent Donor Typologies -- 4.2 Addressing Changing Needs -- 5 Discussion -- References -- Identifying Shifts in Collective Attention to Topics on Social Media -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 4 Data -- 5 Experiments and Results -- 6 Conclusions -- References -- wapr.tugon.ph: A Secure Helpline for Detecting Psychosocial Aid from Reports of Unlawful Killings in the Philippines -- 1 Introduction -- 2 Review of Related Literature -- 2.1 Origins of wapr.tugon.ph -- 2.2 Providing Psychosocial Intervention During Crisis -- 2.3 Digital Psychosocial Intervention -- 2.4 Natural Language Processing Text Classification for Detecting Elements of Psychosocial Wellbeing -- 2.5 Securing Human Rights Violation Reports and Data Admissibility Through Blockchain -- 3 Framework and Methodology -- 3.1 warp.tugon.ph Architecture -- 3.2 Psychosocial Wellness Detection Model -- 4 Results and Discussion -- 4.1 Features and Functionalities of wapr.tugon.ph -- 4.2 Psychosocial Wellness Detection Model Performance -- 5 Conclusion -- References -- Human and Agent Modeling -- Social-Judgment-Based Modeling of Opinion Polarization in Chinese Live Streaming Platforms -- 1 Introduction -- 2 Model Formulation -- 3 Simulation Setup and Measurements -- 4 Results and Discussion -- 4.1 Scenario 1 -- 4.2 Scenario 2 -- 5 Conclusion -- References -- Having a Bad Day? Detecting the Impact of Atypical Events Using Wearable Sensors.
1 Introduction.
Record Nr. UNISA-996464407403316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social, cultural, and behavioral modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, Proceedings / / Robert Thomson [and four others], editors
Social, cultural, and behavioral modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, Proceedings / / Robert Thomson [and four others], editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 352 p. 158 illus., 94 illus. in color.)
Disciplina 410.285
Collana Lecture Notes in Computer Science
Soggetto topico Natural language processing (Computer science)
Interpersonal relations
Online social networks - Psychological aspects
ISBN 3-030-61255-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Beyond Words: Comparing Structure, Emoji Use, and Consistency Across Social Media Posts -- Bot Impacts on Public Sentiment and Community Structures: Comparative Analysis of Three Elections in the Asia-Pacific -- Understanding Colonial Legacy and Environmental Issues in Senegal through Language Use -- Deploying System Dynamics Models for Disease Surveillance in the Philippines -- MDR Cluster-Debias: A Nonlinear Word Embedding Debiasing Pipeline -- Modeling Interventions for Insider Threat -- Validating Social Media Monitoring: Statistical Pitfalls and Opportunities from Public Opinion -- Lying About Lying on Social Media: A Case Study of the 2019 Canadian Elections -- Breadth verses depth: the impact of tree structure on cultural influence -- Optimizing Attention-Aware Opinion Seeding Strategies -- Polarizing Tweets on Climate Change -- Characterizing Sociolinguistic Variation in the Competing Vaccination Communities -- On Countering Disinformation With Caution: Effective Inoculation Strategies and Others That Backfire Into Community Hyper-Polarization -- Homicidal Event Forecasting and Interpretable Analysis using Hierarchical Attention Model -- Development of a Hybrid Machine Learning Agent Based Model for Optimization and Interpretability -- Canadian Federal Election and Hashtags That Do Not Belong -- Group Formation Theory at Multiple Scales -- Towards Agent Validation of a Military Cyber Team Performance Simulation -- Developing Graph Theoretic Techniques to Identify Amplification and Coordination Activities of Influential Sets of Users -- Detecting Online Hate Speech: Approaches Using Weak Supervision and Network Embedding Models -- Critical spatial clusters for vaccine preventable diseases -- Multi-cause Discrimination Analysis Using Potential Outcomes -- Twitter is the Megaphone of Cross-Platform Messaging on the White Helmets -- Physiological Signal Embeddings with Nonparametric Hidden Markov Models -- The Rise and Fall of Humanitarian Citizen Initiatives: A simulation-based approach -- Developing an Epidemiological Model to study Spread of Toxicity on YouTube -- Predicting Student Flight Performance with Multimodal Features -- A Game-Transformation-based Framework to Understand Initial Conditions and Outcomes in the context of Cyber-enabled Influence Operations (CIOs) -- The Human Resource Management Parameter Experimentation Tool -- Utilizing Python for Agent-based Modeling: The Mesa Framework -- Strategic Information Operation in YouTube: The case of White Helmets -- Artifacts of Crisis: Textual Analysis of Euromaidan -- Modeling decisions from experience among frequent and infrequent switchers via strategy-based and instance-based models.
Record Nr. UNINA-9910427705303321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social, cultural, and behavioral modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, Proceedings / / Robert Thomson [and four others], editors
Social, cultural, and behavioral modeling : 13th International Conference, SBP-BRiMS 2020, Washington, DC, USA, October 18-21, 2020, Proceedings / / Robert Thomson [and four others], editors
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XV, 352 p. 158 illus., 94 illus. in color.)
Disciplina 410.285
Collana Lecture Notes in Computer Science
Soggetto topico Natural language processing (Computer science)
Interpersonal relations
Online social networks - Psychological aspects
ISBN 3-030-61255-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Beyond Words: Comparing Structure, Emoji Use, and Consistency Across Social Media Posts -- Bot Impacts on Public Sentiment and Community Structures: Comparative Analysis of Three Elections in the Asia-Pacific -- Understanding Colonial Legacy and Environmental Issues in Senegal through Language Use -- Deploying System Dynamics Models for Disease Surveillance in the Philippines -- MDR Cluster-Debias: A Nonlinear Word Embedding Debiasing Pipeline -- Modeling Interventions for Insider Threat -- Validating Social Media Monitoring: Statistical Pitfalls and Opportunities from Public Opinion -- Lying About Lying on Social Media: A Case Study of the 2019 Canadian Elections -- Breadth verses depth: the impact of tree structure on cultural influence -- Optimizing Attention-Aware Opinion Seeding Strategies -- Polarizing Tweets on Climate Change -- Characterizing Sociolinguistic Variation in the Competing Vaccination Communities -- On Countering Disinformation With Caution: Effective Inoculation Strategies and Others That Backfire Into Community Hyper-Polarization -- Homicidal Event Forecasting and Interpretable Analysis using Hierarchical Attention Model -- Development of a Hybrid Machine Learning Agent Based Model for Optimization and Interpretability -- Canadian Federal Election and Hashtags That Do Not Belong -- Group Formation Theory at Multiple Scales -- Towards Agent Validation of a Military Cyber Team Performance Simulation -- Developing Graph Theoretic Techniques to Identify Amplification and Coordination Activities of Influential Sets of Users -- Detecting Online Hate Speech: Approaches Using Weak Supervision and Network Embedding Models -- Critical spatial clusters for vaccine preventable diseases -- Multi-cause Discrimination Analysis Using Potential Outcomes -- Twitter is the Megaphone of Cross-Platform Messaging on the White Helmets -- Physiological Signal Embeddings with Nonparametric Hidden Markov Models -- The Rise and Fall of Humanitarian Citizen Initiatives: A simulation-based approach -- Developing an Epidemiological Model to study Spread of Toxicity on YouTube -- Predicting Student Flight Performance with Multimodal Features -- A Game-Transformation-based Framework to Understand Initial Conditions and Outcomes in the context of Cyber-enabled Influence Operations (CIOs) -- The Human Resource Management Parameter Experimentation Tool -- Utilizing Python for Agent-based Modeling: The Mesa Framework -- Strategic Information Operation in YouTube: The case of White Helmets -- Artifacts of Crisis: Textual Analysis of Euromaidan -- Modeling decisions from experience among frequent and infrequent switchers via strategy-based and instance-based models.
Record Nr. UNISA-996418284903316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 12th International Conference, SBP-BRiMS 2019, Washington, DC, USA, July 9–12, 2019, Proceedings / / edited by Robert Thomson, Halil Bisgin, Christopher Dancy, Ayaz Hyder
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 12th International Conference, SBP-BRiMS 2019, Washington, DC, USA, July 9–12, 2019, Proceedings / / edited by Robert Thomson, Halil Bisgin, Christopher Dancy, Ayaz Hyder
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 290 p. 113 illus., 84 illus. in color.)
Disciplina 302.231
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Data mining
Artificial intelligence
Machine learning
Computer Appl. in Social and Behavioral Sciences
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Multiagent Systems
Machine Learning
ISBN 3-030-21741-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analyzing the Dabiq Magazine: The Language and the Propaganda Structure of ISIS -- Characterizing Organizational Micro-Climates in Structural Groups -- Pro/Con: Neural Detection of Stance in Argumentative Opinions -- Modeling Gender Inequity in Household Decision-making -- Bot Detection: Will Focusing on Recall Cause Overall Performance Deterioration -- A Quantitative Portrait of Legislative Change in Ukraine -- Synthesizing Machine-Learning Datasets from Parameterizable Agents Using Constrained Combinatorial Search -- Exploiting Emojis for Sarcasm Detection -- Condorcet Optimal Clustering with Delaunay Triangulation: Climate Ones and World Happiness Insights -- Using Common Enemy Graphs to Identify Communities of Coordinated Social Media Activity -- Chronological Semantics Modeling: A Topic Evolution Approach in Online User-Generated Medical Data -- Massive-Scale Models of Urban Infrastructure and Populations -- Dynamic Resources Allocation During Natural Disasters Using Multi-Agent Environment -- Parallelizing Convergent Cross Mapping Using Apache Spark -- Continuous-Time Simulation of Epidemic Processes on Dynamic Interaction Networks -- Characterizing Bot Networks on Twitter: An Empirical Analysis of Contentious Issues in the Asia-Pacific -- A Hybrid Cellular Model for Predicting Organizational Recruitment in a k-Dimensional Space -- A Challenging Dataset for Bias Detection: The Case of the Crisis in the Ukraine -- Does Causal Coherence Predict Online Spread of Social Media -- Detecting Disruption: Identifying Structural Changes in the Verkhovna Rada -- Lost in Online Stores? Agent-Based Modeling of Cognitive Limitations of Elderly Online Consumers -- Identifying Toxicity Within YouTube Video Comment Text Data -- Examining Intensive Groups in YouTube Commenter Networks -- User Behavioral Modeling for Fake Information Mitigation on Social Web -- Effect of E-cigarette Use and Social Network on Smoking Behavior Change: An Agent-based Model of E-cigarette and Cigarette Interaction -- Multi-Scale Simulation Modeling for Prevention and Public Health Management of Diabetes in Pregnancy and Sequelae -- Cough Detection Using Hidden Markov Models -- Modeling Belief Divergence and Opinion Polarization with Bayesian Networks and Agent-based Simulation: a Study on Traditional Healing Use in South Africa. .
Record Nr. UNISA-996466285903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social, Cultural, and Behavioral Modeling : 12th International Conference, SBP-BRiMS 2019, Washington, DC, USA, July 9–12, 2019, Proceedings / / edited by Robert Thomson, Halil Bisgin, Christopher Dancy, Ayaz Hyder
Social, Cultural, and Behavioral Modeling : 12th International Conference, SBP-BRiMS 2019, Washington, DC, USA, July 9–12, 2019, Proceedings / / edited by Robert Thomson, Halil Bisgin, Christopher Dancy, Ayaz Hyder
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 290 p. 113 illus., 84 illus. in color.)
Disciplina 302.231
006.754
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Information storage and retrieval
Data mining
Artificial intelligence
Machine learning
Computer Appl. in Social and Behavioral Sciences
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Data Mining and Knowledge Discovery
Multiagent Systems
Machine Learning
ISBN 3-030-21741-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analyzing the Dabiq Magazine: The Language and the Propaganda Structure of ISIS -- Characterizing Organizational Micro-Climates in Structural Groups -- Pro/Con: Neural Detection of Stance in Argumentative Opinions -- Modeling Gender Inequity in Household Decision-making -- Bot Detection: Will Focusing on Recall Cause Overall Performance Deterioration -- A Quantitative Portrait of Legislative Change in Ukraine -- Synthesizing Machine-Learning Datasets from Parameterizable Agents Using Constrained Combinatorial Search -- Exploiting Emojis for Sarcasm Detection -- Condorcet Optimal Clustering with Delaunay Triangulation: Climate Ones and World Happiness Insights -- Using Common Enemy Graphs to Identify Communities of Coordinated Social Media Activity -- Chronological Semantics Modeling: A Topic Evolution Approach in Online User-Generated Medical Data -- Massive-Scale Models of Urban Infrastructure and Populations -- Dynamic Resources Allocation During Natural Disasters Using Multi-Agent Environment -- Parallelizing Convergent Cross Mapping Using Apache Spark -- Continuous-Time Simulation of Epidemic Processes on Dynamic Interaction Networks -- Characterizing Bot Networks on Twitter: An Empirical Analysis of Contentious Issues in the Asia-Pacific -- A Hybrid Cellular Model for Predicting Organizational Recruitment in a k-Dimensional Space -- A Challenging Dataset for Bias Detection: The Case of the Crisis in the Ukraine -- Does Causal Coherence Predict Online Spread of Social Media -- Detecting Disruption: Identifying Structural Changes in the Verkhovna Rada -- Lost in Online Stores? Agent-Based Modeling of Cognitive Limitations of Elderly Online Consumers -- Identifying Toxicity Within YouTube Video Comment Text Data -- Examining Intensive Groups in YouTube Commenter Networks -- User Behavioral Modeling for Fake Information Mitigation on Social Web -- Effect of E-cigarette Use and Social Network on Smoking Behavior Change: An Agent-based Model of E-cigarette and Cigarette Interaction -- Multi-Scale Simulation Modeling for Prevention and Public Health Management of Diabetes in Pregnancy and Sequelae -- Cough Detection Using Hidden Markov Models -- Modeling Belief Divergence and Opinion Polarization with Bayesian Networks and Agent-based Simulation: a Study on Traditional Healing Use in South Africa. .
Record Nr. UNINA-9910337856603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings / / edited by Robert Thomson, Christopher Dancy, Ayaz Hyder, Halil Bisgin
Social, Cultural, and Behavioral Modeling [[electronic resource] ] : 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings / / edited by Robert Thomson, Christopher Dancy, Ayaz Hyder, Halil Bisgin
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 410 p. 93 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Computers
Software engineering
Data structures (Computer science)
Computer Appl. in Social and Behavioral Sciences
Artificial Intelligence
Information Systems Applications (incl. Internet)
Theory of Computation
Software Engineering/Programming and Operating Systems
Data Structures and Information Theory
ISBN 3-319-93372-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advances in Sociocultural & Behavioral Process Modeling -- Multi-Scale Resolution of Cognitive Architectures: A Paradigm for Simulating Minds and Society -- Detecting Betrayers in On-line Environments Using Active Indicators -- Forecasting Gang Homicides with Multi-level Multi-task Learning -- Feature Selection of Post-Graduation Income of College Students in the United States -- From Language to Location Using Multiple Instance Neural Networks -- Detecting Agreement and Disagreement in Political Debates -- Tipping Points for Norm Change in Human Cultures -- Model Co-Creation from a Modeler’s Perspective: Lessons Learned from the Collaboration between Ethnographers and Modelers -- Multi-Agent Accumulator-Based Decision-Making Model of Incivility (MADI) -- Legislative Voting Dynamics in Ukraine -- Stop Words Are Not “Nothing”: German Modal Particles and Public Engagement in Social Media -- Beaten Up on Twitter?: Exploring Fake News and Satirical Responses during Marvel’s Black Panther Movie Event -- #metoo through the Lens of Social Media -- Information, Systems, and Network Science -- Similar but Different: Exploiting Users' Congruity for Recommendation Systems -- Mining Help Intent on Twitter during Disasters via Transfer Learning with Sparse Coding -- People2Vec: Learning Latent Representations of Users using Their Social-Media Activities -- Finding Organizational Accounts Based on Structural and Behavioral Factors on Twitter -- A study of how opinion sharing affects emergency evacuation -- Fine-Scale Prediction of People’s Home Location using Social Media Footprints -- Formal Organizations, Informal Networks, and Work Flow: An Agent-Based Model -- Aspect Level Sentiment Classification with Attention-over-Attention Neural Net-works -- Analyzing Social Bots and their Coordination during Natural Disasters -- Sentiment dynamics of The Chronicles of Narnia and their ranking -- Sign Prediction in Signed Social Networks Using Inverse Squared Metric -- Detecting and Characterizing Bot-Like Behavior on Twitter -- Initializing Agent-based Models with Clustering Archetypes -- Applications for Health and Well-being -- Predicting Alcoholism Recovery from Twitter -- The Portrayal of Quit Emotions: Content-sensitive Analysis of Peer Interactions in an Online Community for Smoking Cessation -- Digilego: A Standardized Analytics-driven Consumer-oriented Connected Health Framework -- Pain Town, an Agent-Based Model of Opioid Use Trajectories in a Small Community -- Assessing Target Audiences of Digital Public Health Campaigns: A Computational Approach -- Evaluating Semantic Similarity for Adverse Drug Event Narratives -- Military and Intelligence Applications Framing Shifts of the Ukraine Conflict in pro-Russian News Media -- Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics -- Terrorist Network Monitoring with Identifying Code. -Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India -- Complex Networks for Terrorist Target Prediction -- Cybersecurity -- Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive Adversary -- Using Random String Classification to Filter and Annotate Automated Accounts -- Understanding Cyber Attack Behaviors with Sentiment Information on Social Media -- Social Cyber-Security -- A Computational Model of Cyber Situational Awareness -- Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology -- Addendum -- An Agent-Based Model for False Belief Tasks: Belief Representation Systematic Approach (BRSA). .
Record Nr. UNISA-996465677203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Social, Cultural, and Behavioral Modeling : 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings / / edited by Robert Thomson, Christopher Dancy, Ayaz Hyder, Halil Bisgin
Social, Cultural, and Behavioral Modeling : 11th International Conference, SBP-BRiMS 2018, Washington, DC, USA, July 10-13, 2018, Proceedings / / edited by Robert Thomson, Christopher Dancy, Ayaz Hyder, Halil Bisgin
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVI, 410 p. 93 illus.)
Disciplina 004
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Application software
Artificial intelligence
Computers
Software engineering
Data structures (Computer science)
Computer Appl. in Social and Behavioral Sciences
Artificial Intelligence
Information Systems Applications (incl. Internet)
Theory of Computation
Software Engineering/Programming and Operating Systems
Data Structures and Information Theory
ISBN 3-319-93372-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Advances in Sociocultural & Behavioral Process Modeling -- Multi-Scale Resolution of Cognitive Architectures: A Paradigm for Simulating Minds and Society -- Detecting Betrayers in On-line Environments Using Active Indicators -- Forecasting Gang Homicides with Multi-level Multi-task Learning -- Feature Selection of Post-Graduation Income of College Students in the United States -- From Language to Location Using Multiple Instance Neural Networks -- Detecting Agreement and Disagreement in Political Debates -- Tipping Points for Norm Change in Human Cultures -- Model Co-Creation from a Modeler’s Perspective: Lessons Learned from the Collaboration between Ethnographers and Modelers -- Multi-Agent Accumulator-Based Decision-Making Model of Incivility (MADI) -- Legislative Voting Dynamics in Ukraine -- Stop Words Are Not “Nothing”: German Modal Particles and Public Engagement in Social Media -- Beaten Up on Twitter?: Exploring Fake News and Satirical Responses during Marvel’s Black Panther Movie Event -- #metoo through the Lens of Social Media -- Information, Systems, and Network Science -- Similar but Different: Exploiting Users' Congruity for Recommendation Systems -- Mining Help Intent on Twitter during Disasters via Transfer Learning with Sparse Coding -- People2Vec: Learning Latent Representations of Users using Their Social-Media Activities -- Finding Organizational Accounts Based on Structural and Behavioral Factors on Twitter -- A study of how opinion sharing affects emergency evacuation -- Fine-Scale Prediction of People’s Home Location using Social Media Footprints -- Formal Organizations, Informal Networks, and Work Flow: An Agent-Based Model -- Aspect Level Sentiment Classification with Attention-over-Attention Neural Net-works -- Analyzing Social Bots and their Coordination during Natural Disasters -- Sentiment dynamics of The Chronicles of Narnia and their ranking -- Sign Prediction in Signed Social Networks Using Inverse Squared Metric -- Detecting and Characterizing Bot-Like Behavior on Twitter -- Initializing Agent-based Models with Clustering Archetypes -- Applications for Health and Well-being -- Predicting Alcoholism Recovery from Twitter -- The Portrayal of Quit Emotions: Content-sensitive Analysis of Peer Interactions in an Online Community for Smoking Cessation -- Digilego: A Standardized Analytics-driven Consumer-oriented Connected Health Framework -- Pain Town, an Agent-Based Model of Opioid Use Trajectories in a Small Community -- Assessing Target Audiences of Digital Public Health Campaigns: A Computational Approach -- Evaluating Semantic Similarity for Adverse Drug Event Narratives -- Military and Intelligence Applications Framing Shifts of the Ukraine Conflict in pro-Russian News Media -- Turning Narrative Descriptions of Individual Behavior into Network Visualization and Analysis: Example of Terrorist Group Dynamics -- Terrorist Network Monitoring with Identifying Code. -Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India -- Complex Networks for Terrorist Target Prediction -- Cybersecurity -- Searching for Unknown Unknowns: Unsupervised Bot Detection to Defeat an Adaptive Adversary -- Using Random String Classification to Filter and Annotate Automated Accounts -- Understanding Cyber Attack Behaviors with Sentiment Information on Social Media -- Social Cyber-Security -- A Computational Model of Cyber Situational Awareness -- Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology -- Addendum -- An Agent-Based Model for False Belief Tasks: Belief Representation Systematic Approach (BRSA). .
Record Nr. UNINA-9910349426303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui