Emotion Extraction and Entrainment in Social Media: The Case of U.S. Immigration and Border Security

Size: px
Start display at page:

Download "Emotion Extraction and Entrainment in Social Media: The Case of U.S. Immigration and Border Security"

Transcription

1 Emotion Extraction and Entrainment in Social Media: The Case of U.S. Immigration and Border Security Wingyan Chung Dept. of Decision and Info. Sciences, School of Business Administration, Stetson University DeLand, Florida, U.S.A. Saike He State Key Lab of Management and Control for Complex Systems, Chinese Academy of Sciences Beijing, China Daniel Dajun Zeng Dept. of MIS, U. of Arizona Tucson, Arizona, U.S.A. and Chinese Academy of Sciences Beijing, China Victor Benjamin Dept. of MIS Eller College of Management University of Arizona Tucson, Arizona, U.S.A. Abstract Emotion plays an important role in shaping public policy and business decisions. The growth of social media has allowed people to express their emotion publicly in an unprecedented manner. Textual content and user linkages fostered by social media networks can be used to examine emotion types, intensity, and contagion. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues in November The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies. Keywords emotion; social media analytics; text mining; social network analysis; entrainment; influence; U.S. immigration policy; border security. I. INTRODUCTION Emotion plays an important role in shaping public policy and business decisions. Politicians and marketers often create their agendas based on public emotion expressed in mass media. As social media are increasingly used to share ideas and opinions, analyzing the intensity and types of emotion in these messages can help decision makers develop more appropriate strategies to address the needs of their constituents. The United States (U.S.) immigration policy has recently gained widespread attention on social media as well as on national and international media. Because the U.S. population consists primarily of immigrants or descendants of immigrants, public policy on immigration has strategic and long-term effects on the economy, foreign policy, and national security [1]. As nearly twelve million undocumented immigrants reside in the United States, the U.S. Government and Congress are under tremendous pressure of developing timely legislations for reforming immigration policies, which have a strong impact on U.S. border security. How to gauge the emotion of the public on border security, immigration, and related policy issues becomes a concern for decision makers and politicians. Unfortunately, there is little work on social-media-based security informatics that could potentially benefit related policy decision making. By analyzing the content and linkage information in social media, policy makers and social scientists interested in immigration and border security could possibly obtain useful answers to such questions as: Who are the most influential leaders in the social media community? How are different types of emotion changing over time as new events emerge? How does emotion spread and entrain in the community? What are the network relationships among participants in immigration and border security discussion on social media? In this research, we developed an approach to collecting and analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border security issues during November The results provide strong implication for understanding social actions and for collecting social intelligence for security informatics. II. LITERATURE REVIEW The analysis of emotion in social media relates to literature in social computing, social media and network analysis, and emotion entrainment. We review below these domains with a view of informing the analysis of emotion in social-mediabased security informatics. A. Social Media Analytics in Security Informatics Social media analytics (SMA) is a rich set of tools and technologies most recently applied to security informatics [2, 3]. Traditional domains that SMA is used include business intelligence, online product review analysis, and security informatics [4-6]. Among these technologies, sentiment analysis and emotion extraction are important tools for understanding large amounts of social media data [7]. Researchers have developed a specialized lexicon to support emotion extraction [8]. The lexicon contains over 13,000 1

2 entries of term-category, in which a term may belong to one or more of the eight emotion categories (anger, anticipation, disgust, fear, joy, sadness, surprise, trust) [9]. Network analysis is another SMA application in which users within a large community are analyzed to reveal their levels of influence. Traditionally, social network analysis examines network dynamics in a small scale [10]. Advances in information technologies enable new capabilities of network analysis, such as identifying opinion leaders in discussion forums [11], finding expertise in networks [12], analyzing business stakeholder networks [13], and visualizing networked relationships of infectious disease transmission [14]. Although social media are increasingly important information sources for understanding public sentiment, little work is found in analyzing emotion to support intelligence and security informatics decision making. B. Emotion Analysis and Entrainment The proliferation of social media has made them the hub of information generation and diffusion. One important problem is to characterize and identify influentials, which can be defined as users who influence the opinions or emotions of others in large scale. Previous work quantifies user influence based on various structural measures, such as in/out-degree, betweenness, and PageRank [15]. The idea is based on social linkages developed in human interaction that facilitate spread of human emotion. These linkages play a critical role in large social media communities by facilitating exchange of information and confirmation of authoritative and influential positions. However, they have not been examined widely in social-media-based security informatics. Recent works also attempt to model the spread of human behavior in social networks [16-19]. Emotion entrainment, which accounts for the synchronous convergence of human emotions, has been examined in neuroscience [20] and in human social networks [21]. Whether human emotion entrains in large-scale networks of importance to national security and public policy decision making is relatively unknown. While previous methods provide quantitative analysis for social interactions, they often require explicit casual knowledge that is scarce in many scenarios. III. APPROACHES TO EMOTION ANALYSIS FOR SOCIAL- MEDIA-BASED SECURITY INFORMATICS In this research, we developed an approach to emotion analysis for social-media-based security informatics. Our approach consists of emotion extraction and entrainment of a large-scale social media network of significance to national security and public policy decision making. Through applying our approach, we examined the process of identifying influential leaders in social media networks, studied changes in emotion over time, and revealed network relationships among participants. We describe below our dataset, analyses, and preliminary findings of the two approaches to emotion analysis. A. Dataset We collected the tweets that are related to the U.S. immigration and border security discussion. To do so, we constructed carefully a list of queries by reviewing recent literature published on the topic [1, 22-24]. Filtering and collection testing helped to reduce the original 14 queries to 8 domain-specific queries: comprehensive immigration reform, illegal alien, illegal immigration, immigration debate, immigration policy, immigration reform, US border security, and US immigration. We developed a tweet crawler that collects tweet postings automatically and periodically since May As of February 15, 2015, our dataset consists of 2,418,590 tweets posted by 617,536 unique users. In this case study, we focus on the recent executive actions announced by President Obama in November 2014 to grant legal status to millions of illegal immigrants [25, 26]. We selected a subset of the data consisting of 189,012 tweets posted by 105,304 users between November 1st and November 30th of That month also recorded the highest number of tweets and the most user activities during the entire timespan of the data collection. From the users whose tweets were collected in November, we randomly selected a sample of 5,000 users for further examination of the emotion extracted from the tweets and of emotion entrainment. B. Emotion Extraction To extract emotion from each tweet, we computed values of indices in eight emotional categories defined in [9] (anger, disgust, fear, sadness, surprise, anticipation, joy, and trust). Each index represents the emotional intensity of a tweet. We used the emotion lexicon developed in [8] to identify emotional words that appear in the tweets. The lexicon contains 13,901 word-emotion entries tagged by over 2,216 human users who completed a total of 38,726 tagging assignments. Each word was assigned a sentiment polarity (positive (+1) or negative (- 1)) and is categorized into one (or more) of the eight emotional categories. Equation (1) shows the computation of the index of emotion j (ranging from 1 to 8) of tweet i, which contains n i words. M ij = where Pn i W k i=1 n i 8i 2 {1...N}, 8j 2 {1...k}...(1) M ij = Index of emotion j of Tweet i n i = Number of words in Tweet i k = Number of di erent emotion categories N = Total number of tweets being considered 8 < 1 if word(k) is in category j, where W k = k 2 {1...n i } : 0 otherwise C. Emotion Entrainment Emotion entrainment is the socialization of feelings among people who interact with each other. To examine how this process takes place in a large-scale social media network and how emotion evolves dynamically, we developed a model-free approach to detect causal relationships and to identify influential users based on the theory of emotion entrainment [27]. This theory suggests that human emotion rhythmically converges through social interactions. In this process, we consider users that are most entrained by others as influential. 2

3 We represent the emotion time series of two users x and y with two Markov processes X = x t and Y = y t. Then the entrainment strength from x to y is given by Equation (2). m m n ( X Y ) = ( t+ 1 t ) ( t+ 1 t, t ) En H x x H x x y (2) m n where, x = ( x x ), y = ( y y ), while m and n t t,..., t m+1 t t,..., t n+1 are the orders of each of the Markov processes; H(*) calculates the entropy of the probability distribution enclosed. In our experiments, we set the Markov orders m=n=3. According to our empirical analysis, this order is high enough while higher order increases computational cost without present much quantitative differences. Equation (2) can be estimated based on Simpson s rule [28] with a computational complexity of O(N log(n)). This cost is acceptable for entrainment analysis on large-scale datasets. Using Equation (3), we measured the influence of each user x based on a how others entrain towards him. ( ) = ( ) I x En y x (3) x y IV. PRELIMINARY FINDINGS In this section, we present preliminary findings of using the emotion analysis methods to examine influence of Twitter TABLE I. Social-Network-Based Method users who posted on immigration and border security issues in November 2014, and to provide descriptive statistics of the emotion scores. A. Comparison of Top Influential Users TABLE I. lists the top 10 most influential users identified by two methods. The first method uses the Betweenness Centrality score as the measure of influence of a user in the social media network formed from connections of retweets and modified-tweets. While other measures of centrality are available [15, 29], Betweenness Centrality (BC) identifies the extent to which a user serves as a bridge in immigration reform discussion, which heavily relies on the ability to find compromises and common grounds in participants of highly polarized views. The resulting top users are shown on the left of the table. Several of the listed users are out-spoken leaders in U.S. immigration and border security issues. For example, Daniel John Sobieski identified himself as a free-lance writer for various news agencies and expresses strong opinions on the immigration policy proposed by President Obama. FAIR (Federation for American Immigration Reform) is concerned with border security, immigration law enforcement, amnesty, and stopping illegal immigration. TOP 10 MOST INFLUENTIAL USERS IDENTIFIED BY TWO METHODS Emotion Entrainment Method User Name URL BC Score User Name URL Entrain Score Daniel John Sobieski ladybug FAIR SHEEPDOG REPORT Michael Johns CONEXION Mickey Kaus Marty Barrack daveweigel Stellasasha? Greg Sargent Les Wenzel Jeremy W. Peters Mike Robbins Matthew Kolken Ted Skibinski Julia Preston Ken Michael Deacon Dave Ganteaume The second method uses Equation (3) as a measure of a user s influence in a social media network. In contrast with the results found by the first method, among the top three users found by the entrainment method, only CONEXION lists itself as related to Latino entrepreneurs, which may be related to immigration issues because many immigrants are Latinos. B. Distribution of emotion ratio To understand the relative strength of the emotion, we computed the ratio for the j th emotion e in top k users (sorted j by descending order of influence score calculated by (3)) as: i=1 ( ) = k k m R e j k e ij i=1 j=1 e ij, j =1,!,m; k =1,!,n where, ij e is the sum of all the j th emotion scores (among m (= 8) categories defined in [9]) of the tweets written by the i th user in the ranked list of n (= 5,000) users. Intuitively, R(e j ) k characterizes the emotion distribution over the top k users. If R(e j ) k varies significantly as k increases (as more less-influential users are involved in the calculation of ratio), (4) 3

4 the j th emotion should be considered as a critical factor for distinguishing influential users from normal users. while surprise was the least dominant emotion (with the lowest ratio). Third, the ratio for trust increases dramatically as users ranks change from 1 to n (= 5000). This means the relative amount of trust expressed in social media increasingly distinguishes influential users from less influential users, i.e. expressing less trust in social media increases user influence in the community. C. Entrainment network In this section, we examine the structure of the entrainment patterns that affect the influence of each user. The entrainment networks of twitter users named Daniel John Sobieski, SHEEPDOG REPORT and ANNA RAND are shown in Figures 2, 3(a) and 3(b) respectively. All nodes are labeled by the names of users who entrain toward the specified user (central node labeled yellow). Blue nodes have above-average entrainment strengths while white nodes have below-average strengths. The arrow on an edge indicates the entrainment direction and the thickness of an edge represents entrainment strength. We first explore two users who had the highest BC score (see Table I). The ratios of users entraining towards these two users with above-average strengths are respectively 41.53% and 42.86%. These similarly high ratios suggest that influential users are likely to be entrained by other others with similar degree of entrainment. To test this hypothesis, we further compared the second most influential user SHEEPDOG REPORT found by the second method (see Figure 1. Relative strengths of eight emotion types. Figure 1 illustrates the change in ratio of emotions in top n (= 5000) most influential users. There are three aspects worth mentioning. First, the ratios of fear, disgust, anger, and sadness decrease while the ratios of trust, joy, anticipation, and surprise increases. These results indicate that influential users are more likely to be those high in emotions related to fear, disgust, anger, and sadness. Second, fear was the most dominant emotion (with the highest ratio) in the posted tweets Figure 2. Entrainment network of Daniel John Sobieski. 4

5 security issues during November Our approach uses a comprehensive lexicon to identify emotion categories, includes algorithms to compute emotion scores and user influence scores (based on both social ties and entrainment), and present analysis findings of users network relationship and influence patterns. These results should provide strong implication for understanding social actions and for collecting social intelligence for security informatics. Table I) and the second least influential user ANNA RAND (URL: (found by the second method but not listed in Table I). These two users tweeted similar numbers of messages (46.6K v.s. 52.1K), yet had totally different influence in discussing immigration and border security in the community. The ratios of users with above-average entrainment strengths are 57.93% for SHEEPDOG REPORT and 32.00% for ANNA RAND (note the relatively sparse edges compared with the other networks shown). This result supports our hypothesis that entrainment strengths among influential users are similar to each other. The findings provide strong implications for decision makers to identify influential users or leader groups in a social media community, and for users who aspire to become leaders in their communities. This research has several limitations. First, the generalpurpose emotion lexicon used in this research was not designed specifically for the our domain and for short messages such as tweets. Future study may verify the effectiveness of such lexicon different domains and different types of messages. Second, only Twitter was used to provide social media messages, despite other SM platforms may provide abundant content in the domain. Third, our data collection was based on pre-defined keyword queries that are restricted in terms of coverage. V. SUMMARY The growth of social media enables users to express their emotion publicly and promptly, thereby helping politicians and business leaders to gauge public perception of their agendas. Textual content and user linkages fostered by social media networks can be useful in examining emotion in a large-scale manner. However, research into how emotion evolves and entrains in social media that influence security issues is scarce. In this research, we developed an approach to analyzing emotion expressed in political social media. We compared two methods of emotion analysis to identify influential users and to trace their contagion effects on public emotion, and report preliminary findings of analyzing the emotion of 105,304 users who posted 189,012 tweets on the U.S. immigration and border Our ongoing works include conducting a thorough evaluation of the emotion analysis results, developing metrics to understand performance, and testing the approach on new datasets. This research should contribute to helping decision makers and security personnel to use public emotion effectively to develop appropriate strategies. ACKNOWLEDGEMENTS This paper is based upon work supported partially by funding from the U.S. National Science Foundation (through project DUE ), U.S. Department of Homeland Security (through the 2013 Summer Research Team Program (a) SHEEPDOG REPORT (b) ANNA RAND Figure 3(a) and (b). Entrainment networks of (a) SHEEPDOG REPORT and (b) ANNA RAND. 5

6 for MSI), by Stetson University s 2015 Summer Research Grant, by the National Natural Science Foundation of China under Grant No , , , , and , by the U.S. National Institute of Health under Grant No. 1R01DA , by the China Ministry of Health under Grant No. 2013ZX Any opinions, findings, and conclusions or recommendations expressed in this paper are those of the authors and do not necessarily reflect the views of the funding agencies. We thank Mr. Daniel Ballard, the conference chairs, reviewers, and coordinators for their assistance and valuable suggestions. REFERENCES [1] J. Bush, T. F. McLarty III and E. H. Alden, U.S. immigration policy. New York: Council on Foreign Relations, [2] D. Zeng, H. Chen, R. Lusch and S.-H. Li, "Social Media Analytics and Intelligence," IEEE Intelligent Systems, vol. 25, pp , [3] V. Benjamin, W. Chung, A. Abbasi, J. Chuang, C. A. Larson and H. Chen, "Evaluating Text Visualization for Authorship Analysis," Security Informatics, vol. 3, [4] H. Chen, R. Chiang and V. Storey, "Business Intelligence and Analytics," MIS Quarterly, vol. 36, pp , [5] W. Chung and T.-L. Tseng, "Discovering business intelligence from online product reviews: A ruleinduction framework," Expert Systems with Applications, vol. 39, pp , [6] W. Chung, "BizPro: Extracting and Categorizing Business Intelligence Factors from Textual News Articles," International Journal of Information Management, vol. 34, pp , [7] A. Abbasi, H. Chen, S. Thoms and T. Fu, "Affect analysis of Web forums and blogs using correlation ensembles," IEEE Transactions on Knowledge and Data Engineering, vol. 20, pp , [8] S. M. Mohammad and P. D. Turney, "Crowdsourcing a Word-Emotion Association Lexicon," Computational Intelligence, vol. 29, pp , [9] R. Plutchik, "A general psychoevolutionary theory of emotion," Emotion: Theory, research, and experience, vol. 1, pp. 3-33, [10] S. Wasserman and K. Faust, Social Network Analysis: methods and applications: Cambridge University Press, [11] X. Song, Y. Chi, K. Hino and B. Tseng, "Identifying opinion leaders in the blogosphere," Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, [12] J. Zhang, M. S. Ackerman and L. Adamic, "Expertise networks in online communities: structure and algorithms," Proc. of the 16th international conference on World Wide Web, Banff, Alberta, Canada, [13] W. Chung, H. Chen and E. Reid, "Business stakeholder analyzer: An experiment of classifying stakeholders on the Web," Journal of the American Society for Information Science and Technology, vol. 60, pp , [14] D. Zeng, H. Chen, C. Castillo-Chavez, W. B. Lober and M. Thurmond, Infectious Disease Informatics and Biosurveillance, vol. 27: Springer, [15] M. O. Jackson, Social and Economic Networks. Princeton, NJ: Princeton University Press, [16] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow and J. E. Settle, "A 61-million-person experiment in social influence and political mobilization," Nature, vol. 489, pp , [17] G. C. Kane, M. Alavi, G. J. Labianca and S. P. Borgatti, "What's different about social media networks? A framework and research agenda," MIS Quarterly, vol. 38, pp , [18] Y. Liang, X. Zheng, D. D. Zeng, X. Zhou, S. J. Leischow and W. Chung, "Exploring How the Tobacco Industry Presents and Promotes Itself in Social Media," Journal of Medical Internet Research, vol. 17, [19] T. Schreck and D. Keim, "Visual analysis of social media data," IEEE Computer, vol. 46, pp , [20] J. Bastiaansen, M. Thioux and C. Keysers, "Evidence for mirror systems in emotions," Philosophical Transactions of The Royal Society B, vol. 364, pp , [21] A. D. Kramer, J. E. Guillory and J. T. Hancock, "Experimental evidence of massive-scale emotional contagion through social networks," Proc. of the National Academy of Sciences, vol. 111, pp , [22] J. Gans, E. M. Replogle and D. J. Tichenor, "Debates on U.S. Immigration," Sage Publications, Inc., [23] M. C. LeMay, U.S. immigration: A reference handbook. Santa Barbara, Calif.: ABC-CLIO, [24] U.S. Commission on Immigration Reform, U.S. immigration policy - Restoring credibility: A report to Congress. Washington, DC (1825 Connecticut Ave., NW, Suite 511, Washington 20009): U.S. Commission on Immigration Reform, [25] L. Meckler, C. M. Nelson and E. Morath, "Obama to Protect 4 Million-Plus Immigrants From Deportation," in Wall Street Journal [26] D. Dwyer, "President Obama Offers Legal Status to Millions of Undocumented Immigrants," in ABC News [27] M. Clayton, R. Sager and U. Will, "In time with the music: the concept of entrainment and its significance for ethnomusicology," European Meetings in Ethnomusicology, vol. 11, pp. 1-82, [28] A. Kaw and E. Kalu, Numerical Methods with Applications, 1st. ed: [29] L. C. Freeman, "A set of measures of centrality based on betweenness," Sociometry, vol. 40, pp ,

Understanding the city to make it smart

Understanding the city to make it smart Understanding the city to make it smart Roberta De Michele and Marco Furini Communication and Economics Department Universty of Modena and Reggio Emilia, Reggio Emilia, 42121, Italy, marco.furini@unimore.it

More information

Latest trends in sentiment analysis - A survey

Latest trends in sentiment analysis - A survey Latest trends in sentiment analysis - A survey Anju Rose G Punneliparambil PG Scholar Department of Computer Science & Engineering Govt. Engineering College, Thrissur, India anjurose.ar@gmail.com Abstract

More information

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA Qian Xu *, Xianxue Meng Agricultural Information Institute of Chinese Academy

More information

Interoperable systems that are trusted and secure

Interoperable systems that are trusted and secure Government managers have critical needs for models and tools to shape, manage, and evaluate 21st century services. These needs present research opportunties for both information and social scientists,

More information

Sentiment Analysis of User-Generated Contents for Pharmaceutical Product Safety

Sentiment Analysis of User-Generated Contents for Pharmaceutical Product Safety Sentiment Analysis of User-Generated Contents for Pharmaceutical Product Safety Haruna Isah, Daniel Neagu and Paul Trundle Artificial Intelligence Research Group University of Bradford, UK Haruna Isah

More information

PREFACE. Introduction

PREFACE. Introduction PREFACE Introduction Preparation for, early detection of, and timely response to emerging infectious diseases and epidemic outbreaks are a key public health priority and are driving an emerging field of

More information

General Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY

General Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY General Briefing v.1.1 February 2016 GLOBAL INTERNET POLICY OBSERVATORY 1. Introduction In 2014 1 the European Commission proposed the creation of a Global Internet Policy Observatory (GIPO) as a concrete

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

Building Collaborative Networks for Innovation

Building Collaborative Networks for Innovation Building Collaborative Networks for Innovation Patricia McHugh Centre for Innovation and Structural Change National University of Ireland, Galway Systematic Reviews: Their Emerging Role in Co- Creating

More information

Fake News and Indifference to Scientific Fact: President Trump's Confused Tweets on Global Warming, Climate Change and Weather

Fake News and Indifference to Scientific Fact: President Trump's Confused Tweets on Global Warming, Climate Change and Weather Instituto Complutense de Análisis Económico Fake News and Indifference to Scientific Fact: President Trump's Confused Tweets on Global Warming, Climate Change and Weather David E. Allen School of Mathematics

More information

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( ) WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN (2016-2019) Hosted by The China Association for Science and Technology March, 2016 WFEO-CEIT STRATEGIC PLAN (2016-2019)

More information

Truthy: Enabling the Study of Online Social Networks

Truthy: Enabling the Study of Online Social Networks arxiv:1212.4565v2 [cs.si] 20 Dec 2012 Karissa McKelvey Filippo Menczer Center for Complex Networks and Systems Research Indiana University Bloomington, IN, USA Truthy: Enabling the Study of Online Social

More information

Tourism network analysis 1

Tourism network analysis 1 Tourism network analysis 1 Tourism and tourism systems can be defined in many ways, but, even if there is scarce agreement on possible definition, a tourism system, like many other economic and social

More information

Exploring the New Trends of Chinese Tourists in Switzerland

Exploring the New Trends of Chinese Tourists in Switzerland Exploring the New Trends of Chinese Tourists in Switzerland Zhan Liu, HES-SO Valais-Wallis Anne Le Calvé, HES-SO Valais-Wallis Nicole Glassey Balet, HES-SO Valais-Wallis Address of corresponding author:

More information

Social Network Analysis and Its Developments

Social Network Analysis and Its Developments 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Social Network Analysis and Its Developments DENG Xiaoxiao 1 MAO Guojun 2 1 Macau University of Science

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

Theoretical Framework of Agricultural Scientific and Technological Competitiveness. Kun Du

Theoretical Framework of Agricultural Scientific and Technological Competitiveness. Kun Du International Conference on Economy, Management and Education Technology (ICEMET 2015) Theoretical Framework of Agricultural Scientific and Technological Competitiveness Kun Du College of Co-operatives,

More information

A Regional University-Industry Cooperation Research Based on Patent Data Analysis

A Regional University-Industry Cooperation Research Based on Patent Data Analysis A Regional University-Industry Cooperation Research Based on Patent Data Analysis Hui Xu Department of Economics and Management Harbin Institute of Technology Shenzhen Graduate School Shenzhen 51855, China

More information

Public Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education

Public Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education Public Discussion January 10, 2017 11:00 a.m. to 1:15 p.m. EST #NASEMscicomm Division of Behavioral and Social Sciences and Education Sponsors Committee on the Science of Science Communication: A Research

More information

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis

Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis Patent Mining: Use of Data/Text Mining for Supporting Patent Retrieval and Analysis by Chih-Ping Wei ( 魏志平 ), PhD Institute of Service Science and Institute of Technology Management National Tsing Hua

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

ArkPSA Arkansas Political Science Association

ArkPSA Arkansas Political Science Association ArkPSA Arkansas Political Science Association Book Review Computational Social Science: Discovery and Prediction Author(s): Yan Gu Source: The Midsouth Political Science Review, Volume 18, 2017, pp. 81-84

More information

White paper The Quality of Design Documents in Denmark

White paper The Quality of Design Documents in Denmark White paper The Quality of Design Documents in Denmark Vers. 2 May 2018 MT Højgaard A/S Knud Højgaards Vej 7 2860 Søborg Denmark +45 7012 2400 mth.com Reg. no. 12562233 Page 2/13 The Quality of Design

More information

Science Impact Enhancing the Use of USGS Science

Science Impact Enhancing the Use of USGS Science United States Geological Survey. 2002. "Science Impact Enhancing the Use of USGS Science." Unpublished paper, 4 April. Posted to the Science, Environment, and Development Group web site, 19 March 2004

More information

Introduction to Foresight

Introduction to Foresight Introduction to Foresight Prepared for the project INNOVATIVE FORESIGHT PLANNING FOR BUSINESS DEVELOPMENT INTERREG IVb North Sea Programme By NIBR - Norwegian Institute for Urban and Regional Research

More information

Haodong Yang, Ph.D. Candidate

Haodong Yang, Ph.D. Candidate Haodong Yang, Ph.D. Candidate College of Computing and Informatics Drexel University, Philadelphia, PA 19104 Cell: +1(215)-858-8879 Email: haodong.yang@drexel.edu EDUCATION Ph.D., Information Studies Drexel

More information

TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH

TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH PROGRAM OVERVIEW TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH 02 03 04 05 07 1 WHERE ENTREPRENEURS AND POLICY LEADERS COME TOGETHER. BUSINESS INSPIRES AND

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

FINAL ACTIVITY AND MANAGEMENT REPORT

FINAL ACTIVITY AND MANAGEMENT REPORT EUROPEAN COMMISSION RESEARCH DG MARIE CURIE MOBILITY ACTIONS INDIVIDUAL DRIVEN ACTIONS PERIODIC SCIENTIFIC/MANAGEMENT REPORT FINAL ACTIVITY AND MANAGEMENT REPORT Type of Marie Curie action: Intra-European

More information

Social Media Intelligence in Practice: The NEREUS Experimental Platform. Dimitris Gritzalis & Vasilis Stavrou June 2015

Social Media Intelligence in Practice: The NEREUS Experimental Platform. Dimitris Gritzalis & Vasilis Stavrou June 2015 Social Media Intelligence in Practice: The NEREUS Experimental Platform Dimitris Gritzalis & Vasilis Stavrou June 2015 Social Media Intelligence in Practice: The NEREUS Experimental Platform 3 rd Hellenic

More information

Keywords: DSM, Social Network Analysis, Product Architecture, Organizational Design.

Keywords: DSM, Social Network Analysis, Product Architecture, Organizational Design. 9 TH INTERNATIONAL DESIGN STRUCTURE MATRIX CONFERENCE, DSM 07 16 18 OCTOBER 2007, MUNICH, GERMANY SOCIAL NETWORK TECHNIQUES APPLIED TO DESIGN STRUCTURE MATRIX ANALYSIS. THE CASE OF A NEW ENGINE DEVELOPMENT

More information

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting

More information

Let s know each other. Myself INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND ITS BUSINESS APPLICATION 5/10/2016. Suwarn Kr.

Let s know each other. Myself INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND ITS BUSINESS APPLICATION 5/10/2016. Suwarn Kr. INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND ITS BUSINESS APPLICATION 2016/05/08 Professional Training in Informationand CommunicationTechnology (ICT) and E-Governance For Class IIIOfficers

More information

THE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES

THE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES THE CHALLENGES OF SENTIMENT ANALYSIS ON SOCIAL WEB COMMUNITIES Osamah A.M Ghaleb 1,Anna Saro Vijendran 2 1 Ph.D Research Scholar, Department of Computer Science, Sri Ramakrishna College of Arts and Science,(India)

More information

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE

SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE KONTEKSTY SPOŁECZNE, 2016, Vol. 4, No. 1 (7), 13 17 SOCIAL DECODING OF SOCIAL MEDIA: AN INTERVIEW WITH ANABEL QUAN-HAASE In this interview Professor Anabel Quan-Haase, one of the world s leading researchers

More information

Analysing Megatrends to Better shape the future of Tourism

Analysing Megatrends to Better shape the future of Tourism Issues Paper Analysing Megatrends to Better shape the future of Tourism 2-3 October 2017 OECD, Paris 2 Background information This note is provided as background information at the High Level Meeting on

More information

The role of universities in attaining regional competitiveness under adversity a research proposal

The role of universities in attaining regional competitiveness under adversity a research proposal The role of universities in attaining regional competitiveness under adversity a research proposal Abstract Cherie Courseault Trumbach Sandra J. Hartman Olof Lundberg This study examines the role of the

More information

Advanced Analytics for Intelligent Society

Advanced Analytics for Intelligent Society Advanced Analytics for Intelligent Society Nobuhiro Yugami Nobuyuki Igata Hirokazu Anai Hiroya Inakoshi Fujitsu Laboratories is analyzing and utilizing various types of data on the behavior and actions

More information

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN 8.1 Introduction This chapter gives a brief overview of the field of research methodology. It contains a review of a variety of research perspectives and approaches

More information

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters

Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.

More information

Analysis of Data Mining Methods for Social Media

Analysis of Data Mining Methods for Social Media 65 Analysis of Data Mining Methods for Social Media Keshav S Rawat Department of Computer Science & Informatics, Central university of Himachal Pradesh Dharamshala (Himachal Pradesh) Email:Keshav79699@gmail.com

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

March 27, The Information Technology Industry Council (ITI) appreciates this opportunity

March 27, The Information Technology Industry Council (ITI) appreciates this opportunity Submission to the White House Office of Science and Technology Policy Response to the Big Data Request for Information Comments of the Information Technology Industry Council I. Introduction March 27,

More information

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation The Method Toolbox of TA PACITA Summer School 2014 Marie Louise Jørgensen, mlj@tekno.dk The Danish Board of Technology Foundation The TA toolbox Method Toolbox Classes of methods Classic or scientific

More information

DISTRIBUTION A: Approved for public release.

DISTRIBUTION A: Approved for public release. AFRL-OSR-VA-TR-2013-0217 Social Dynamics of Information Kristina Lerman Information Sciences Institute University of Southern California July 2013 Final Report DISTRIBUTION A: Approved for public release.

More information

Research of key technical issues based on computer forensic legal expert system

Research of key technical issues based on computer forensic legal expert system International Symposium on Computers & Informatics (ISCI 2015) Research of key technical issues based on computer forensic legal expert system Li Song 1, a 1 Liaoning province,jinzhou city, Taihe district,keji

More information

Polarization Analysis of Twitter Users Using Sentiment Analysis

Polarization Analysis of Twitter Users Using Sentiment Analysis Polarization Analysis of Twitter Users Using Sentiment Analysis Nicha Nishikawa, Koichi Yamada, Izumi Suzuki, and Muneyuki Unehara s165044@stn.nagaokaut.ac.jp, {yamada, suzuki, unehara}@kjs.nagaokaut.ac.jp

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Some Reflections on Digital Literacy

Some Reflections on Digital Literacy Some Reflections on Digital Literacy Harald Gapski Abstract Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy,

More information

Public Perceptions Survey on. Extractive Industries

Public Perceptions Survey on. Extractive Industries Public Perceptions Survey on Extractive Industries Public Perceptions Survey on Extractive Industries In January 2014, the World Bank Institute commissioned RIWI corporation to conduct an online survey

More information

THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE. D. M. Berube, NCSU, Raleigh

THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE. D. M. Berube, NCSU, Raleigh THE STATE OF THE SOCIAL SCIENCE OF NANOSCIENCE D. M. Berube, NCSU, Raleigh Some problems are wicked and sticky, two terms that describe big problems that are not resolvable by simple and traditional solutions.

More information

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation

The Study on the Architecture of Public knowledge Service Platform Based on Collaborative Innovation The Study on the Architecture of Public knowledge Service Platform Based on Chang ping Hu, Min Zhang, Fei Xiang Center for the Studies of Information Resources of Wuhan University, Wuhan,430072,China,

More information

Technologies Worth Watching. Case Study: Investigating Innovation Leader s

Technologies Worth Watching. Case Study: Investigating Innovation Leader s Case Study: Investigating Innovation Leader s Technologies Worth Watching 08-2017 Mergeflow AG Effnerstrasse 39a 81925 München Germany www.mergeflow.com 2 About Mergeflow What We Do Our innovation analytics

More information

Social Data Analytics Tool (SODATO)

Social Data Analytics Tool (SODATO) Social Data Analytics Tool (SODATO) Abid Hussain 1 and Ravi Vatrapu 1,2 1 CSSL, Department of IT Management, Copenhagen Business School, Denmark 2 MOTEL, Norwegian School of Information Technology (NITH),

More information

OECD WORK ON ARTIFICIAL INTELLIGENCE

OECD WORK ON ARTIFICIAL INTELLIGENCE OECD Global Parliamentary Network October 10, 2018 OECD WORK ON ARTIFICIAL INTELLIGENCE Karine Perset, Nobu Nishigata, Directorate for Science, Technology and Innovation ai@oecd.org http://oe.cd/ai OECD

More information

Title: Greece: The new stratification in digital era Author: Panagiotopoulou Milena Affiliation: University of Crete. Abstract

Title: Greece: The new stratification in digital era Author: Panagiotopoulou Milena Affiliation: University of Crete. Abstract Title: Greece: The new stratification in digital era Author: Panagiotopoulou Milena Affiliation: University of Crete Abstract This paper represents preliminary theoretical considerations about the development

More information

Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop

Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop In collaboration with the Committee on Science, Technology, and Law Background: Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop March 6, 2018 Keck Center of the

More information

Special issue on behavior computing

Special issue on behavior computing Knowl Inf Syst (2013) 37:245 249 DOI 10.1007/s10115-013-0668-0 EDITORIAL Special issue on behavior computing LongbingCao Philip S Yu Hiroshi Motoda Graham Williams Published online: 19 June 2013 Springer-Verlag

More information

Globalizing IPR Protection: How Important Might RTAs Be?

Globalizing IPR Protection: How Important Might RTAs Be? Globalizing IPR Protection: How Important Might RTAs Be? Keith Maskus, University of Colorado Boulder (keith.maskus@colorado.edu) NAS Innovation Policy Forum National and International IP Policies and

More information

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases

The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases Vol. 8 No. 20 ISSN -2233-9140 The Fourth Industrial Revolution in Major Countries and Its Implications of Korea: U.S., Germany and Japan Cases KIM Gyu-Pan Director General of Advanced Economies Department

More information

Social Network Analysis in HCI

Social Network Analysis in HCI Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it

More information

Ethics Guideline for the Intelligent Information Society

Ethics Guideline for the Intelligent Information Society Ethics Guideline for the Intelligent Information Society April 2018 Digital Culture Forum CONTENTS 1. Background and Rationale 2. Purpose and Strategies 3. Definition of Terms 4. Common Principles 5. Guidelines

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Executive summary. AI is the new electricity. I can hardly imagine an industry which is not going to be transformed by AI.

Executive summary. AI is the new electricity. I can hardly imagine an industry which is not going to be transformed by AI. Executive summary Artificial intelligence (AI) is increasingly driving important developments in technology and business, from autonomous vehicles to medical diagnosis to advanced manufacturing. As AI

More information

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development

More information

Remembrances Souvenirs Memoria

Remembrances Souvenirs Memoria Research recherche investigación Remembrances Souvenirs Memoria May 8, 9 & 10, 2001 Vancouver British Columbia Canada Les 8, 9 et 10 mai, 2001 Vancouver (Colombie- Britannique) Canada www.canadatourism.com/tsa

More information

MOTIVATING BLACK COMMUNITIES TO PARTICIPATE IN THE 2020 CENSUS

MOTIVATING BLACK COMMUNITIES TO PARTICIPATE IN THE 2020 CENSUS MOTIVATING BLACK COMMUNITIES TO PARTICIPATE IN THE 2020 CENSUS Key findings from qualitative and quantitative research among Black adults Conducted February April 2018, by Hart Research and Brossard Research

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue IV, April 18, www.ijcea.com ISSN 2321-3469 Furqan Iqbal Department of Computer Science and Engineering, Lovely Professional

More information

Construction and Measure of the Evaluation Index System of Regional Soft Power - Taking Shandong Province as an Example

Construction and Measure of the Evaluation Index System of Regional Soft Power - Taking Shandong Province as an Example Studies in Sociology of Science Vol. 3, No. 4, 2012, pp. 85-91 DOI:10.3968/j.sss.1923018420120304.ZR0289 ISSN 1923-0176 [Print] ISSN 1923-0184 [Online] www.cscanada.net www.cscanada.org Construction and

More information

Comparative Study of various Surveys on Sentiment Analysis

Comparative Study of various Surveys on Sentiment Analysis Comparative Study of various Surveys on Milanjit Kaur 1, Deepak Kumar 2. 1 Student (M.Tech Scholar), Computer Science and Engineering, Lovely Professional University, Punjab, India. 2 Assistant Professor,

More information

Policy Partnership on Science, Technology and Innovation Strategic Plan ( ) (Endorsed)

Policy Partnership on Science, Technology and Innovation Strategic Plan ( ) (Endorsed) 2015/PPSTI2/004 Agenda Item: 9 Policy Partnership on Science, Technology and Innovation Strategic Plan (2016-2025) (Endorsed) Purpose: Consideration Submitted by: Chair 6 th Policy Partnership on Science,

More information

What Leads To Impactful Foresight

What Leads To Impactful Foresight What Leads To Impactful Foresight 30 years of Canadian Government Foresight Jonathan Calof PhD Telfer School of Management, University of Ottawa Brian Colton, NRC Research Study Challenge: Initiated from

More information

Emerging Medical Technology in Politics and Society

Emerging Medical Technology in Politics and Society Emerging Medical Technology in Politics and Society LSA2018 Lübeck Summer Academy on Medical Technology IHK zu Lübeck, MediaDocks, Lübeck, 4 July 2018 Christopher Coenen, KIT-ITAS 1 This Talk Artificial

More information

The New Delhi Communiqué

The New Delhi Communiqué India-EU Ministerial Science Conference 7-8 February 2007, New Delhi The New Delhi Communiqué BACKGROUND TO CONFERENCE At their Summit in Helsinki in October 2006, the leaders of the EU and India reiterated

More information

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron

IJITKMI Volume 7 Number 2 Jan June 2014 pp (ISSN ) Impact of attribute selection on the accuracy of Multilayer Perceptron Impact of attribute selection on the accuracy of Multilayer Perceptron Niket Kumar Choudhary 1, Yogita Shinde 2, Rajeswari Kannan 3, Vaithiyanathan Venkatraman 4 1,2 Dept. of Computer Engineering, Pimpri-Chinchwad

More information

EVCA Strategic Priorities

EVCA Strategic Priorities EVCA Strategic Priorities EVCA Strategic Priorities The following document identifies the strategic priorities for the European Private Equity and Venture Capital Association (EVCA) over the next three

More information

Ensuring Adequate Policies and Resources for the 2020 Census

Ensuring Adequate Policies and Resources for the 2020 Census Ensuring Adequate Policies and Resources for the 2020 Census Background The census is one of the most important elements of U.S. democracy. Article I, Section 2, Clause 3 of the U.S. Constitution mandates

More information

Using Data Analytics and Machine Learning to Assess NATO s Information Environment

Using Data Analytics and Machine Learning to Assess NATO s Information Environment Using Data Analytics and Machine Learning to Assess NATO s Information Environment Col Richard Blunt, CapDev JISR, SACT HQ Allied Command Transformation Blandy Road, Norfolk, VA UNITED STATES Richard.blunt@act.nato.int

More information

Domestic Reform and Global Integration: The Evolution of China s Innovation System and Innovation Policies

Domestic Reform and Global Integration: The Evolution of China s Innovation System and Innovation Policies Domestic Reform and Global Integration: The Evolution of China s Innovation System and Innovation Policies Dr. Lan Xue, Professor and Dean School of Public Policy and Management Tsinghua University Emerging

More information

Foresight for Canadian Animal Health. Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA)

Foresight for Canadian Animal Health. Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA) Foresight for Canadian Animal Health Shane Renwick DVM MSc Canadian Food Inspection Agency (CFIA) USAHA/AAVLD Greensboro, NC October, 2012 Shared Vision Framework Road Map Tools & Applications 2 Animal

More information

If These Crawls Could Talk: Studying and Documenting Web Archives Provenance

If These Crawls Could Talk: Studying and Documenting Web Archives Provenance If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby

More information

Culturally and Linguistically Diverse Young People and Digital Citizenship:

Culturally and Linguistically Diverse Young People and Digital Citizenship: Culturally and Linguistically Diverse Young People and Digital Citizenship: A Pilot Study Executive Summary technologies have fundamentally reshaped the meaning and function of citizenship in the internet

More information

What is a collection in digital libraries?

What is a collection in digital libraries? What is a collection in digital libraries? Changing: collection concepts, collection objects, collection management, collection issues Tefko Saracevic, Ph.D. This work is licensed under a Creative Commons

More information

Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit

Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand. Masterarbeit Opportunities and threats and acceptance of electronic identification cards in Germany and New Zealand Masterarbeit zur Erlangung des akademischen Grades Master of Science (M.Sc.) im Studiengang Wirtschaftswissenschaft

More information

the royal society of new zealand: gateway to science and technology strategic priorities

the royal society of new zealand: gateway to science and technology strategic priorities the royal society of new zealand: gateway to science and technology strategic priorities www.royalsociety.org.nz gateway to science and technology in new zealand the royal society of new zealand has operated

More information

Harmonic Distortion Levels Measured at The Enmax Substations

Harmonic Distortion Levels Measured at The Enmax Substations Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned

More information

Technology First. Make India Innovate, Excel Globally and Prosper. 5-6 September 2018

Technology First. Make India Innovate, Excel Globally and Prosper. 5-6 September 2018 Indian Technology Congress - 2018 5-6 September 2018 NIMHANS Convention Centre, Bengaluru, India Technology First Make India Innovate, Excel Globally and Prosper Implementing transformational technologies

More information

THE ELECTRONIC COMMERCE CHALLENGE IN CHINA S ECONOMIC DEVELOPMENT

THE ELECTRONIC COMMERCE CHALLENGE IN CHINA S ECONOMIC DEVELOPMENT THE ELECTRONIC COMMERCE CHALLENGE IN CHINA S ECONOMIC DEVELOPMENT Yuanzong Fu, Utah State University, yfu@cc.usu.edu Jeffrey J. Johnson, Utah State University, jjohnson@b202.usu.edu ABSTRACT The potential

More information

PROGRAM ANNOUNCEMENT. New Jersey Institute of Technology. MSPhM Systems Engineering. Newark. Fall 2008

PROGRAM ANNOUNCEMENT. New Jersey Institute of Technology. MSPhM Systems Engineering. Newark. Fall 2008 PROGRAM ANNOUNCEMENT November 2007 Institution: New Program Title: Degree Designation: Degree Abbreviation: CIP Code and Nomenclature (if possible): Campus(es) where the program will be offered: Date when

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Analogy Engine. November Jay Ulfelder. Mark Pipes. Quantitative Geo-Analyst

Analogy Engine. November Jay Ulfelder. Mark Pipes. Quantitative Geo-Analyst Analogy Engine November 2017 Jay Ulfelder Quantitative Geo-Analyst 202.656.6474 jay@koto.ai Mark Pipes Chief of Product Integration 202.750.4750 pipes@koto.ai PROPRIETARY INTRODUCTION Koto s Analogy Engine

More information

IN INTELLIGENCE THE ROLE OF OPEN SOURCES. January 15, by Dr. John NOMIKOS, Director of Research, ISRIA. Athens, GREECE.

IN INTELLIGENCE THE ROLE OF OPEN SOURCES. January 15, by Dr. John NOMIKOS, Director of Research, ISRIA. Athens, GREECE. ISRIA Spotting Dangers, Watching the World www.isria.com THE ROLE OF OPEN SOURCES IN INTELLIGENCE January 15, 2006 by Dr. John NOMIKOS, Director of Research, ISRIA Athens, GREECE. As the threat that was

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

POLICY SIMULATION AND E-GOVERNANCE

POLICY SIMULATION AND E-GOVERNANCE POLICY SIMULATION AND E-GOVERNANCE Peter SONNTAGBAUER cellent AG Lassallestraße 7b, A-1020 Vienna, Austria Artis AIZSTRAUTS, Egils GINTERS, Dace AIZSTRAUTA Vidzeme University of Applied Sciences Cesu street

More information

Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry

Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry Journal of Advanced Management Science Vol. 4, No. 2, March 2016 Research on the Impact of R&D Investment on Firm Performance in China's Internet of Things Industry Jian Xu and Zhenji Jin School of Economics

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

MSC Project Workplan

MSC Project Workplan Social Media Analytics Research and Training for the U.S. Coast Guard David Ebert APPROVED June 13, 2018 Abstract: This research project will increase the understanding of information and intelligence

More information

The Unexpectedly Large Census Count in 2000 and Its Implications

The Unexpectedly Large Census Count in 2000 and Its Implications 1 The Unexpectedly Large Census Count in 2000 and Its Implications Reynolds Farley Population Studies Center Institute for Social Research University of Michigan 426 Thompson Street Ann Arbor, MI 48106-1248

More information

Global Alzheimer s Association Interactive Network. Imagine GAAIN

Global Alzheimer s Association Interactive Network. Imagine GAAIN Global Alzheimer s Association Interactive Network Imagine the possibilities if any scientist anywhere in the world could easily explore vast interlinked repositories of data on thousands of subjects with

More information