Log in / Register
Home arrow Computer Science arrow Social Informatics
Next >
Social Informatics - Luca Maria Aiello

City LabsCity Labs IntroductionIntroductionProgram CommitteeFlowSampler: Visual Analysis of Urban Flows in Geolocated Social Media Data1 Introduction2 Data3 Related Work4 Design4.1 Data Transformation4.2 Interface Components5 Use Cases5.1 Investigating Daily Routine in Trip Making Behaviour5.2 Investigating Exceptional Trip Making Behaviour6 Limitations, Uncertainty and Bias7 Future WorkReferencesPolicing Engagement via Social Media1 Introduction2 Related Work3 Engagement Analysis3.1 Expressing Engagement in Twitter3.2 Machine Learning Analysis3.3 Semantic Analysis4 Discussions and ConclusionsReferencesDigital Social Media to Enhance the Public Realm in Historic Cities1 Introduction2 Relevant Works3 Urbino: Why It Could Be Assumed as a Case Study4 Data Mining Processes to Trace the Public Life of an Italian Historic City Center5 A Strategy to Enhance the Public Life of Historic City Centers6 ConclusionReferencesPrivacy Preserving Energy Management1 Introduction2 Analysis2.1 Are Energy Logs Personal Data?2.2 EMS User Groups and Their Access Rights2.3 Design Strategies for Privacy by Design vs. Energy Control3 Background3.1 (Hardware) Virtualization3.2 Attribute Based Encryption4 Approach4.1 Abstract EMS Architecture4.2 Limitations of Privacy Enhancing Services4.3 Logically Distributed EMS Based on CP-ABE and Virtualization5 Evaluation and Discussion6 Related Work7 Conclusion and Future WorkReferencesDaTactic, Data with Tactics: Description and Evaluation of a New Format of Online Campaigning for NGOs1 Introduction2 DaTactic: Data with Tactics2.1 Context and Origin: #DaTactic1 / #LaAyudaImporta2.2 Strategy and Tactics: #DaTactic2 / #OccupyEP20143 Evaluation3.1 Diffusion Network Structure3.2 Impact of Images3.3 Mentions to Political Candidates and Potential Allies4 DiscussionReferencesOnline Communication in Apartment Buildings1 Introduction and Related Work2 Methodology3 Results4 DiscussionReferencesExperiments for a Real Time Crowdsourced Urban Design1 Introduction2 An Alternative Process2.1 Calling for Contributions2.2 Problem Mapping2.3 Online Survey2.4 Urban to Detail Scale Modeling2.5 Collective Publishing2.6 Feedback Provision2.7 Completion2.8 Final Publish and Maintenance of a Web Site3 Final RemarksReferencesHow Can City Labs Enhance the Citizens' Motivation in Different Types of Innovation Activities?1 Introduction2 Different Approaches to City Labs3 Enhancing Motivation in Different Localized Spaces of Collective Innovation3.1 Methods and Techniques to Channel Collective Creativity (ProviderDriven Activities)3.2 Social Innovation Focus (Enabler-Driven Activities)3.3 Open Innovation Focus (Utilizer-Driven Activities)3.4 User Innovation Focus (User-Driven Activities)4 Managerial Implications5 ConclusionReferencesCriminal Network Analysis and Mining (CRIMENET)Criminal Network Analysis and Mining (CRIMENET 2014) IntroductionScopeKeynote SpeakerProgram CommiteeStatistics on Accepted PapersAccepted PapersUnderstanding Crime Networks: Actors and Links1 Crime Networks2 Importance of Actors and Links3 Analysis of Crime Networks3.1 Organized Crime and Drug Dealing Networks3.2 Terrorist Networks3.3 Theft and Violence Networks4 ConclusionReferencesThe (not so) Critical Nodes of Criminal Networks1 Introduction2 Preliminaries3 Articulation Points, Critical Nodes and Cores4 Experimental Results4.1 Datasets4.2 Metrics4.3 Experimental Findings5 ConclusionsReferencesA Literature-Based Approach to a Narco-NetworkIntroductionMethodologyResultsNetwork AnalysisConclusionsReferencesThe Spatial Structure of Crime in Urban Environments1 Introduction2 Background2.1 Criminology2.2 Network Science3 Identifying Borders of Crime3.1 The Dataset3.2 Building Networks and the Borders3.3 Comparing Borders4 Results5 Conclusions and Future WorksReferencesEmergence of Extreme Opinions in Social Networks1 Introduction2 The Model3 Simulations4 Discussion and ConclusionsReferencesUsing Societal Impact Assessment (SIA) to Improve Technological Development in the Field of Crime Prevention1 Introduction2 Societal Impact Assessment (SIA)2.1 Desirability2.2 Acceptability2.3 Ethics2.4 Data Management3 Assessment of Existing Crime-Fighting Technologies3.1 Crime Mapping by GIS3.2 Automation of Border Control4 ConclusionReferencesWhats in a Dyad? Interaction and Exchange in Social Media (DYAD)What's in a Dyad? Interaction and Exchange in Social Media IntroductionDescriptionAccepted PapersProgram CommitteeSponsorsTriad-Based Role Discovery for Large Social Systems1 Introduction and Motivation2 Related Research3 Conditional Triad Census4 Extracting Social Roles5 Role Analysis6 Conclusions and Future WorkReferencesA Tool-Based Methodology to Analyze Social Network Interactions in Cultural Fields: The Use Case “MuseumWeek”1 Introduction2 The Circulation of Cultural Content on Social Networks: An Industrial and Cultural Issue for Museums3 The Case of the MuseumWeek Communication Event4 Analysis of Interactions4.1 Quantitative Analysis on Attendance Global Analysis4.2 Content Analysis of Tweets5 ConclusionReferencesDetecting Presence of Personal Events in Twitter Streams1 Introduction2 Related Work3 Experimental Design3.1 What Is a Personal Event?3.2 Dataset3.3 Ground Truth Annotation3.4 Classification of Personal Events4 Experiment and Evaluation4.1 Feature Regression Analysis5 Discussion and Future Work6 SummaryReferencesDigital Addiction Ontology for Social Networking Systems1 Introduction2 Digital Addiction as an HCI Issue3 Methodology3.1 Logical Models3.2 Content Analysis3.3 Ontology Development4 Preliminary Results4.1 Digital Addiction Logical Models4.2 Initial Ontology of Digital Addiction5 Discussion6 Conclusions and Future WorkReferencesExploration on Games and Gamers (EGG)EGG 2014: Exploration on Games and Gamers Introduction1 Introduction2 Scope of Workshop3 Program Committee4 Submissions and AcceptanceReferencesInitial Exploration of the Use of Specific Tangible Widgets for Tablet Games1 Introduction2 Previous Work3 Methods and Materials4 Tests and Results5 Discussion6 Conclusion7 Future WorkReferencesGenerosity as Social Contagion in Virtual Community1 Introduction2 Related Works3 Results4 Conclusions and Future StudiesReferencesDeveloping Game-Structure Sensitive Matchmaking System for Massive-Multiplayer Online Games1 Introduction2 Related Works3 About League of Legends4 Matchmaking Based on Roles5 Results6 ConclusionsReferencesLinguistic Analysis of Toxic Behavior in an Online Video Game1 Introduction2 Dataset3 Chat Volume over a Match4 Discriminative Words of Toxic and Typical Players5 Phase Transition of Toxic Players6 Conclusion and Future WorkReferencesInformal In-Game Help Practices in Massive Multiplayer Online Games1 Introduction2 Methods and Data3 Results4 Conclusion and Future WorkReferencesSocial Network Analysis of High-Level Players in Multiplayer Online Battle Arena Game1 Introduction2 Data Collection3 Social Network Analysis4 ConclusionsReferences2nd International Workshop on Computational History (HistoInformatics)The 2nd HistoInformatics Workshop Introduction1 Introduction2 Workshop Topics3 Accepted Papers4 Programme CommitteeLearning to Identify Historical Figures for Timeline Creation from Wikipedia Articles1 Introduction2 Timeline Corpus Construction2.1 Creating a Gold Standard of Person Names2.2 Finding High-Quality Pairs of Timelines and Textual Articles3 System Description4 Feature Set5 Experiments6 Results7 Related Work8 ConclusionReferencesMapping the Early Modern News Flow: An Enquiry by Robust Text Reuse Detection1 Introduction2 Related Work3 Method3.1 Text Extraction, Annotation and Pre-processing3.2 Comparison Algorithms4 Evaluation of Results4.1 Paragraphs, Formatting and Editorial Policies4.2 Information Exchange Networks5 ConclusionReferencesLinking Historical Ship Records to a Newspaper Archive1 Introduction2 Related Work3 Approach3.1 Datasets3.2 Evaluation4 Linking Method4.1 Baseline: Name of the Ship and Date Restriction4.2 Domain Feature Filtering4.3 Text Classification4.4 Combining Domain Feature Filtering and Classifier Labels5 Results6 Discussion7 ConclusionsReferencesDigital Chronofiles of Life Experience1 Introduction2 Lifelogging and Life-Long Preservation2.1 Personal Lifelogging2.2 Lifelogs as Societal Records2.3 Data Formats3 A Life Digitised3.1 Data Storage Requirements3.2 Curation3.3 Privacy4 Chronofiles Transformation Model5 ConclusionReferencesMapping Memory Landscapes in nodegoat1 Introduction2 Methodology3 Use Case: Mapping Memory Landscapes4 Gathering Data5 Outcomes and ConclusionReferencesMining Ministers (1572–1815). Using Semi-structured Data for Historical Research1 Introduction2 Dutch Ministers: The Available Data3 Methodology3.1 A Structured, Partially Disambiguated Database3.2 Calculating Distances4 Results5 Conclusions and Further WorkReferencesLaboratories of Community: How Digital Humanities Can Further New European Integration History1 Introduction2 State of the Art2.1 Historiographical Background2.2 Computational Background3 The Data4 The Method4.1 Obtaining the Nodes4.2 Establishing the Relations4.3 Building the Network5 Analysis6 ConclusionReferencesThe EHRI Project Virtual Collections Revisited1 Introduction2 Prior Work3 The Challenge of Heterogeneous Archival Data3.1 Case Study: Integration of Material by Hans G. Adler4 Virtual Collections5 Representational Challenges6 Technical Implementation7 ConclusionReferencesDeveloping Onomastic Gazetteers and Prosopographies for the Ancient World Through Named Entity Recognition and Graph Visualization: Some Examples from Trismegistos People1 Introduction2 Named Entity Recognition for Onomastic Gazetteers2.1 Creating a Multi-tiered Onomastic Gazetteer2.2 Distilling Genealogical Information from Identifications2.3 Human Intervention for Quality Control and Intratextual Identification3 Data Visualization and Network Analysis to Assist the Creation of Prosopographies3.1 The Problem of Homonymy3.2 Network Visualization3.3 Letters from Elephantine4 ConclusionReferencesCan Network Analysis Reveal Importance? Degree Centrality and Leaders in the EU Integration Process1 Introduction2 Literature Review3 Data Collection4 Analysis5 Future WorkReferencesSocio-Economic Dynamics, Networks and Agent-Based Models (SEDNAM)SEDNAM Socio-Economic Dynamics: Networks and Agent-Based Models - IntroductionSummaryReconstructing Topological Properties of Complex Networks Using the Fitness Model1 Introduction2 Method3 Topological Properties4 Dataset5 Test of the BS Method6 ConclusionsReferencesThe Structure of Global Inter-firm Networks1 Introduction2 Scale-Free Networks of Major Global Firms3 Closely Interconnected Firms and Stock Return4 ConclusionReferencesGeneralized Friendship Paradox: An Analytical Approach1 Introduction2 Model, Notation and Terminology3 Degree-quality Joint Distribution4 Nearest-Neighbor Quality-Degree Distribution5 Quantifying the Friendship and Generalized Friendship Paradoxes6 Results and Discussion7 Summary and Future WorkA Obtaining the Joint Distribution P (k, θ)B Obtaining the Conditional Distribution P (.e, φ|k, θ)ReferencesCollective Intelligence-Based Sequential Pattern Mining Approach for Marketing Data1 Introduction2 Related Works3 Pattern Mining Algorithm Base on ACO3.1 Consumer Data3.2 Sequential Pattern Mining Algorithm Base on ACO3.3 Adaptation to Ambiguous Behavior4 Initial Experience4.1 Mining Result Before Three Extensions4.2 Effect of the Easing Transitive Relations4.3 Effect of the Introduction of Node Pheromone5 Conclusion and Future WorksReferencesWorkshop on Social Influence (SI)Workshop on Social Influence – SI 2014 Introduction1 Introduction2 Scope of the Workshop3 Statistics on Accepted Papers4 Program Committee5 Organizing CommitteeNaming Game Dynamics on Pairs of Connected Networks with Competing Opinions1 Introduction2 Network Properties and Community Quality3 Naming Game on Pairs of Networks3.1 An Example of NG Dynamics on a Pair of Networks4 Method5 Results5.1 Modeling Pairing Results5.2 Selection of Communication Partners in NG6 ConclusionsReferencesThreshold of Herd Effect for Online Events in China1 Introduction2 Data2.1 Data Collection and Screening2.2 Data Classification3 Research Methodology4 Results and Discussion5 ConclusionsReferencesIdentifying Bridges for Information Spread Control in Social Networks1 Introduction2 Related Works3 LARW Algorithm3.1 Motivation3.2 Scheme3.3 MCL Feature4 Simulations and Results4.1 Datasets4.2 Signal Initialization4.3 Information Spread Control5 Conclusion and Future WorkReferencesThink Before RT: An Experimental Study of Abusing Twitter Trends1 Introduction2 Background3 Methodology3.1 Feature Extraction3.2 Real-Time Blackhole Lists (RBL)3.3 Get-more-followers (GMF) Campaigns4 Data Analysis5 The Classifier5.1 Tweets Classification5.2 Time Scale Analysis of Popular Trends6 Spam Campaigns7 ConclusionsReferences3rd International Workshop on Social Media in Crowdsourcing and Human Computation (SoHuman)SoHuman 2014 – 3rd International Workshop on Social Media in Crowdsourcing and Human Computation Introduction1 Introduction1.1 Previous Workshops2 Aims and Scope3 Accepted Papers4 Program CommitteeCrowdMonitor: Monitoring Physical and Digital Activities of Citizens During Emergencies1 Introduction2 Crowdsourcing Systems for Emergencies3 Empirical Study3.1 Integration of Citizens into Emergency Practices3.2 Integration of Off-Site Citizen Activities4 Implementation of the Monitoring System: CrowdMonitor5 Conclusion and OutlookReferencesCrowd Work CV: Recognition for Micro Work1 Introduction2 Motivational Scenario3 Modelling the Crowd Work CV3.1 The Crowd Work CV Ontology3.2 Ontology Verification4 Related Work5 Conclusions and Future WorkReferencesMeans and Roles of Crowdsourcing Vis-À-Vis CrowdFunding for the Creation of Stakeholders Collective Benefits1 Introduction2 Crowfunding as Collective Practice3 Roles of Computational Technology in Crowdfunding4 Model5 Aggregation Experiment6 Concluding ThoughtsReferencesOn Utilizing Player Models to Predict Behavior in Crowdsourcing Tasks1 Introduction2 Prior Art3 Case Study: Need for Cognition as CIPM3.1 Method and Current StudyReferencesComparing Human and Algorithm Performance on Estimating Word-Based Semantic Similarity1 Introduction2 Related Work3 Study Design4 Procedure5 Measures6 Results7 Discussion and Future WorkReferencesMobile Picture Guess: A Crowdsourced Serious Game for Simulating Human Perception1 Introduction2 Related Work3 The Game3.1 Gameplay3.2 Human Intelligence Task4 Experiment Analysis5 ConclusionReferenceshistoGraph as a Demonstrator for Domain Specific Challenges to Crowd-Sourcing1 Introduction2 Development Process and Technical Implementation3 Crowdsourcing for Historical Research4 Outlook5 ConclusionReferences
Found a mistake? Please highlight the word and press Shift + Enter  
Next >
Business & Finance
Computer Science
Language & Literature
Political science