Blogging Around the Globe: Motivations, Privacy Concerns and Social Networking

Total Page:16

File Type:pdf, Size:1020Kb

Blogging Around the Globe: Motivations, Privacy Concerns and Social Networking 2 Blogging Around the Globe: motivations, privacy concerns and social networking Mei Kobayashi IBM Research-Tokyo, 1623-14 Shimotsuruma, Yamato-shi, Kanagawa-ken 242-8502 Japan [email protected] Blogging has become popular since its introduction the late 1990s, and the practice continues to grow. Blogs exemplify internet-age, user-generated content that is changing the way people access in- formation, form social networks, and interact with acquaintances. Moreover, blogs are associated with extensive social communities defined by interconnecting references, and are considered to be one of the early catalysts for propelling the popularity of on-line social networking. This paper traces the de- velopment of blogs and the blogosphere around the globe. National surveys conducted by numerous in- ternational teams of researchers indicate motivations for blogging and attitudes regarding privacy are strikingly different in countries with large blogging communities. These differences are reflected in the content of blogs and profoundly influence blog-based social networks, which tend to be region-centric. Keywords: blog, blogosphere, social networks, social network analysis (SNA) 1. Introduction A weblog, or blog is a website that contains periodic, reverse chronologically or- dered entries on a common webpage. Each entry or blog post, at a blogsite is writ- ten and published by a blogger (or group of bloggers) who maintain the site. The collection of all blogs is known as the blogosphere. Blogs often serve as on-line diaries, evangelical platforms, or as an informal medium for reporting on events. Most are maintained by an individual (individual blogs or single-author blogs). However, blogging by groups of individuals (community blogs or multi-authored blogs) with similar viewpoints or common purpose is increasing (Agarwal and Liu 2008, 2009). When blogging started in the US in the late 1990’s, participants needed suffi- ciently strong programming skills to build and maintain their own sites. As inex- pensive and free software to support the practice became widely available, blog- ging spread rapidly. The blogosphere has grown and diversified from a white, well-educated, US male-dominated community to ordinary people of both sexes from a wide range of age groups, countries and socio-economic backgrounds. In March of 2005 Technorati1 reported the doubling of blogs every five months, and approximately 7.8 million blogs and 937 million links in the blogosphere (Sifry 2005). For example, data from March 2005 is roughly double that from October 1 TechnoratiTM, Inc.: http://technorati.com/ 3 2004. By December 2007, Technorati was tracking more than 112 million blogs. We tried blogpulse2, another popular blog analysis and search engine on July 13, 2009 and found 112,326,499 blogs in the world. About a year later, on Aug. 3, 2010, blogpulse identified 144,217,571 total blogs. The top five featured people were: Lady Gaga (215732 messages), Lindsay Lohan Lohan (62079), Kim Kar- dashian (31572), Angelina Jolie (53335) and Jessica Simpson (22267), confirming that blogging is now practiced by the masses, not just computer scientists. The rise in blogging has been accompanied by a sharp increase in spam-like blogs or splogs (Kesmodel 2005; Kolari 2005, 2007). A splog is “a fake blog cre- ated solely to promote affiliated Web sites, with the intent of skewing search re- sults and artificially boosting traffic”3. This situation has created new challenges as well as new opportunities for business and internet analysts. In March 2005, Technorati estimated that 40,000 new blogs were being created every day (i.e., new blog sites, not to be confused with new postings on existing sites). By the fall of 2005, Technorati’s estimates grew to 70,000 new blogs per day, of which 2% to 8% were splogs. In July 2007, Technorati’s estimates grew to 120,000 new blogs per day (i.e., 1.4 new blogs per second), of which 3,000 to 7,000 were splogs (Si- fry 2007). Splog creation reached a monthly peak in December 2006 when 11,000 new splogs were created every day. Recent actions by some blog hosting services are having a noticeable effect on reducing the overall proportion of splogs. “Will the negative publicity (from splogs) give blogging a bad name? No more than spam gives e-mail a bad name. … splogging will rather give sploggers a bad name – meanwhile blogging is here to stay.” – B.L.Ochman, President of WhatsNextOnline.com (2005) Despite the problem posed by splogs, the popularity of blogs and blogging remains strong. A spring 2008 survey by the Pew Research Center4 found that blog readers outnumber writers. 12% of US internet users (9% of adults) have their own blog, while 33% (24% of adults) read blogs. Furthermore, only 5% of bloggers write on a regular, daily basis, while 11% of the readership read blogs on a daily basis (Smith 2008). Blogs epitomize the growing mass of user-generated content that is changing the way people access information, make and interact with friends, and form pro- fessional communities. Other examples of internet sites that are actively promote or are conducive to social networking include: friendship sites (e.g., Facebook5, hi5 6, MySpace7, tagged8); collaborative tagging sites (e.g., Delicious9, Stumble- 2 blogpulseTM of Nielsen BuzzMetrics: http://www.blogpulse.com 3 Whatis.com, definition of splog: http://whatis.techtarget.com/definition/0,,sid9_gci1137059,00.html 4 Pew Research Center: http://pewresearch.org/ 5 FacebookTM: http://www.facebook.om 6 hi5 NetworksTM, Inc.: http://www.hi5.com 7 MySpace.comTM: http://www.myspace.com 8 TaggedTM, Inc.: http://www.tagged.com 9 DeliciousTM: http://delicious.com 4 Upon10); audio, image and video sharing sites (flickr11, photobucket12, playlist13, YouTube14), and wikis15. In 2006, Time magazine named, “You” as “Person of the Year” for their participation in “a story about community and collaboration on a scale never seen before” (Grossman 2006). Given the sudden and powerful emergence of blogs as a forum for self- expression, social networking, and dissemination of information, we felt that a survey of this topic would be of interest to a wide audience. At the same time, we realize that a comprehensive review would be impossible due to the widespread influence of blogs and the ever-changing landscape of the blogosphere. Although we whittled the broader topic of blog mining to motivations, privacy concerns and social networking, it is still too large for comprehensive coverage. We hope that this review will serve as a useful introduction to readers with limited background on blogs, while illustrating the diversity of the international blogging community. We also hope that it will point to some interesting new avenues for research. This chapter is organized as follows. The remainder of this section summa- rizes the history of blogs and differences between blogs and general Web pages. The second section examines blogging around the globe, with emphasis on trends in Japan, which has the highest readership and bloggers per capita. It concludes with a summary of statistics and trends about Twitter16, a microblogging service. The third section reviews some basic in tools social network analysis (SNA) and recent work on SNA of blogs and analysis of comments on postings. For the most part, these works examine English-based blog sites in the United States. Given wide disparities in motivations and attitudes regarding privacy in different global regions, we speculate on possible extensions and limitations of the methods and their applicability to blogs outside of the United States. We conclude with a dis- cussion on some possible directions for research. 1.1 Blogging: Motivations and Privacy Concerns In 1999, Merriam-Webster On-Line17 recognized the neologism: blog (ˈblȯg, ˈbläg) noun, short for Weblog: a Web site that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer; also: the contents of such a site; blog·ger noun; blog·ging noun (entered in 1999) 10 StumbleUponTM : http://www.stumbleupon.com 11 flickrTM: http://www.flickr.com 12 photobucketTM: http://photobucket.com 13 playlist.comTM: http:www.playlist.com 14 YouTubeTM: http:www.youtube.com 15 Wikipedia: http:www.wikipedia.org 16 TwitterTM, Inc.: http://twitter.com/ 17 Merriam-WebsterTM On-Line: http://www.merriam-webster.com/dictionary/blog 5 Blogging as an activity existed in many forms prior to the evolution of the internet, for example, personal diaries and diaries based on themes (e.g., travel, cooking, gardening, personal vignettes) were published in book form. One of the milestones in the history of blogging was the birth of the World Wide Web in 1992, as it en- abled anyone with internet access to publish on-line notes, opinions and diaries for view by the general public. Anyone, in principle, could start and maintain a Web page to publish their unedited thoughts in near real-time. However, there are major differences between blogs and general Web pages. For example, blogging does not require programming knowledge since many types of Weblog software (software designed to simplify the creation and mainte- nance of blogs) are readily available. Some software tools are free, open source software (e.g., Apache Roller18, LiveJournal19, WordPress20). Others that are pro- prietary may require purchase of a user license, depending on the intended use (e.g., Telligent Community 21, Windows Live Writer and Windows Live Writer team blog22, Traction TreamPage23). Blog hosting services that are operated by the developer allow users to blog without having to install special software (e.g., Blogger, MySpace , Open Diary 24). Blogs serve as a friendly facilitator of discussion between the writer and read- ers since most blogging software provide simple means to post comments. And there appears to be a lower psychological barrier in the blogosphere to comment since there is an expectation of interactivity in the blogging community.
Recommended publications
  • Metadata for Semantic and Social Applications
    etadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008M will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Metadata for Web vocabularies to facilitate the ingration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their Semantic and information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. Social Applications DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice. Edited by Jane Greenberg and Wolfgang Klas DC-2008
    [Show full text]
  • CHAPTER 12 Making Your Web Site Mashable
    CHAPTER 12 Making Your Web Site Mashable This chapter is a guide to content producers who want to make their web sites friendly to mashups. That is, this chapter answers the question, how would you as a content producer make your digital content most effectively remixable and mashable to users and developers? Most of this book is addressed to creators of mashups who are therefore consumers of data and services. Why then should I shift in this chapter to addressing producers of data and services? Well, you have already seen aspects of APIs and web content that make it either easier or harder to remix, and you’ve seen what makes APIs easy and enjoyable to use. Showing content and data producers what would make life easier for consumers of their content provides useful guidance to service providers who might not be fully aware of what it’s like for consumers. The main audience for the book—as consumers (as opposed to producers) of services—should still find this chapter a helpful distillation of best practices for creating mashups. In some ways, this chapter is a review of Chapters 1–11 and a preview of Chapters 13–19. Chapters 1–11 prepared you for how to create mashups in general. I presented a lot of the technologies and showed how to build a reasonably sophisticated mashup with PHP and JavaScript as well as using mashup tools. Some of the discussion in this chapter will be amplified by in-depth discussions in Chapters 13–19. For example, I’ll refer to topics such as geoRSS, iCalendar, and microformats that I discuss in greater detail in those later chapters.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • How to Find the Best Hashtags for Your Business Hashtags Are a Simple Way to Boost Your Traffic and Target Specific Online Communities
    CHECKLIST How to find the best hashtags for your business Hashtags are a simple way to boost your traffic and target specific online communities. This checklist will show you everything you need to know— from the best research tools to tactics for each social media network. What is a hashtag? A hashtag is keyword or phrase (without spaces) that contains the # symbol. Marketers tend to use hashtags to either join a conversation around a particular topic (such as #veganhealthchat) or create a branded community (such as Herschel’s #WellTravelled). HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 1 WAYS TO USE 3 HASHTAGS 1. Find a specific audience Need to reach lawyers interested in tech? Or music lovers chatting about their favorite stereo gear? Hashtags are a simple way to find and reach niche audiences. 2. Ride a trend From discovering soon-to-be viral videos to inspiring social movements, hashtags can quickly connect your brand to new customers. Use hashtags to discover trending cultural moments. 3. Track results It’s easy to monitor hashtags across multiple social channels. From live events to new brand campaigns, hashtags both boost engagement and simplify your reporting. HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 2 HOW HASHTAGS WORK ON EACH SOCIAL NETWORK Twitter Hashtags are an essential way to categorize content on Twitter. Users will often follow and discover new brands via hashtags. Try to limit to two or three. Instagram Hashtags are used to build communities and help users find topics they care about. For example, the popular NYC designer Jessica Walsh hosts a weekly Q&A session tagged #jessicasamamondays.
    [Show full text]
  • The Engagement of Social Media Technologies by Undergraduate Informatics Students for Academic Purpose in Malaysia
    University of Wollongong Research Online Faculty of Social Sciences - Papers Faculty of Arts, Social Sciences & Humanities 2014 The engagement of social media technologies by undergraduate informatics students for academic purpose in Malaysia Jane Lim See Yin INTI Laureate International Universities Shirley Agostinho University of Wollongong, [email protected] Barry Harper University of Wollongong, [email protected] Joe F. Chicharo University of Wollongong, [email protected] Follow this and additional works at: https://ro.uow.edu.au/sspapers Part of the Education Commons, and the Social and Behavioral Sciences Commons Recommended Citation Lim See Yin, Jane; Agostinho, Shirley; Harper, Barry; and Chicharo, Joe F., "The engagement of social media technologies by undergraduate informatics students for academic purpose in Malaysia" (2014). Faculty of Social Sciences - Papers. 1141. https://ro.uow.edu.au/sspapers/1141 Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] The engagement of social media technologies by undergraduate informatics students for academic purpose in Malaysia Abstract The increase usage and employment of Social Media Technologies (SMTs) in personal, business and education activities is credited to the advancement of Internet broadband services, mobile devices, smart phones and web-based technologies. Informatics programs are technological-oriented in nature, hence students and academics themselves would arguably be quite adept at using SMTs. Students undertaking Informatics programs are trained to thrive in challenging, advanced technical environments as manifestations of the fast-paced world of Information Technology. Students must be able to think logically and learn “how to learn” as “knowledge upon demand” is one of the expected capabilities of Informatics graduates.
    [Show full text]
  • Twitter Crowd Mining and Data Fishing
    International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-1S4, June 2019 Twitter Crowd Mining and Data Fishing Sherin Eliyas, R. Naveen, M. Siva Krishna Abstract--- People use twitter as a medium to share their One variety or technique of data mining that can be used opinions, which in turn makes it a platform for analyzing public to extract information from organized data is Text Mining. opinion. This kind of information in various fields can be used Text mining focuses on textual data, this textual data is for further analysis. Text mining is used for classifying tweets unstructured, and it is difficult to deal with algorithmically, into negative and positive statements depending on their purpose. Text messages are used to define mind set of large groups of though, text is commonly used for information transfer by people. From perspective of decision makers, precious the present society. Vast amount of textual data comes from information is provided by collection of text messages. In this email and social media. Public post real time messages and paper, we use data collected from twitter and extract useful data their opinion on variety of topics, creating it as a valuable from it using data mining tools. The results is represented as platform for analyzing and tracking public opinion on decision trees and this can be used to make further analysis or current situation, including their opinion on the bus ticket used to take decision for analyst. Here we evaluate or analyze the impact of tweets by using emotic icons for process.
    [Show full text]
  • Studying Social Tagging and Folksonomy: a Review and Framework
    Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment.
    [Show full text]
  • Using RSS to Spread Your Blog
    10_588486 ch04.qxd 3/4/05 11:33 AM Page 67 Chapter 4 Using RSS to Spread Your Blog In This Chapter ᮣ Understanding just what a blog is ᮣ Creating the blog and the feed ᮣ Using your RSS reader ᮣ Creating a blog using HTML ᮣ Maintaining your blog ᮣ Publicizing your blog with RSS hat’s a blog, after all? Blog, short for Web log, is just a Web site with Wa series of dated entries, with the most recent entry on top. Those entries can contain any type of content you want. Blogs typically include links to other sites and online articles with the blogger’s reactions and com- ments, but many blogs simply contain the blogger’s own ramblings. Unquestionably, the popularity of blogging has fueled the expansion of RSS feeds. According to Technorati, a company that offers a search engine for blogs in addition to market research services, about one-third of blogs have RSS feeds. Some people who maintain blogs are publishing an RSS feed with- out even knowing about it, because some of the blog Web sites automatically create feeds (more about how this happens shortly). If you think that blogs are only personal affairs, remember that Microsoft has hundreds of them, and businesses are using them more and more to keep employees, colleagues, and customersCOPYRIGHTED up to date. MATERIAL In this chapter, I give a quick overview of blogging and how to use RSS with your blog to gain more readers. If you want to start a blog, this chapter explains where to go next.
    [Show full text]
  • Or “Reflective Blog”
    Guide for writing a “journal blog” or “reflective blog” What is a reflective blog and why should you use one? (Adapted from Professor Wayne Iwaoka, the University of Hawaii at Manoa and UMaine’s SMS 491/EDW 472/SMS416). The blog is used in this class as a modern replacement to the more traditional journal. It is an instrument for practicing writing and thinking. Unlike your typical class notes in which you “passively” record data/information given to you by an instructor your blog should reflect upon lessons you have learned-- a personal record of your educational experience in the class. Maintaining a blog serves several purposes: • A means of communication, conversation (e.g., between material and yourself, yourself and instructors). • Provides regular feedback between you and instructors and helps to match expectations. • Platform for synthesis of new knowledge and ideas. • Helps to develop critical thinking. • Helps to elicit topics of interest, challenging topics that need improvement, etc. • Help to clarify troublesome concepts. The purpose of the blog is for you to self reflect about your own learning. How to set up a blog? You can set a blog with many different companies. Below we provide instruction on how to do it with Google blogger. Note: If you already have one or more other blogs, please set up a new one for this course. 1. Because Google blogger requires a google mail account, use your official UMaine email account. Note: an account in the form of [email protected] is a gmail account. 2. Go to www.blogger.com and enter your Gmail address and password as required 3.
    [Show full text]
  • ‗DEFINED NOT by TIME, but by MOOD': FIRST-PERSON NARRATIVES of BIPOLAR DISORDER by CHRISTINE ANDREA MUERI Submitted in Parti
    ‗DEFINED NOT BY TIME, BUT BY MOOD‘: FIRST-PERSON NARRATIVES OF BIPOLAR DISORDER by CHRISTINE ANDREA MUERI Submitted in partial fulfillment of the requirements For the degree of Doctor of Philosophy Dissertation Adviser: Dr. Kimberly Emmons Department of English CASE WESTERN RESERVE UNIVERSITY August 2011 2 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis/dissertation of Christine Andrea Mueri candidate for the Doctor of Philosophy degree *. (signed) Kimberly K. Emmons (chair of the committee) Kurt Koenigsberger Todd Oakley Jonathan Sadowsky May 20, 2011 *We also certify that written approval has been obtained for any proprietary material contained therein. 3 I dedicate this dissertation to Isabelle, Genevieve, and Little Man for their encouragement, unconditional love, and constant companionship, without which none of this would have been achieved. To Angie, Levi, and my parents: some small piece of this belongs to you as well. 4 Table of Contents Dedication 3 List of tables 5 List of figures 6 Acknowledgements 7 Abstract 8 Chapter 1: Introduction 9 Chapter 2: The Bipolar Story 28 Chapter 3: The Lay of the Bipolar Land 64 Chapter 4: Containing the Chaos 103 Chapter 5: Incorporating Order 136 Chapter 6: Conclusion 173 Appendix 1 191 Works Cited 194 5 List of Tables 1. Diagnostic Criteria for Manic and Depressive Episodes 28 2. Therapeutic Approaches for Treating Bipolar Disorder 30 3. List of chapters from table of contents 134 6 List of Figures 1. Bipolar narratives published by year, 2000-2010 20 2. Graph from Gene Leboy, Bipolar Expeditions 132 7 Acknowledgements I gratefully acknowledge my advisor, Kimberly Emmons, for her ongoing guidance and infinite patience.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • D1.1 Somedi Vision
    D1.1 SoMeDi Vision D1.1 SoMeDi Vision WP1 Vision, architecture and data integration – T1.1 SoMeDi Vision and context Delivery Date: Project Number: Responsible partner: M3 - 28/02/2017 ITEA3 Call2 15011 1 D1.1 SoMeDi Vision DOCUMENT CONTRIBUTORS Name Company Email Elena Muelas HIB [email protected] Inmaculada Luengo HIB [email protected] Carlos A Iglesias UPM George Suciu BEIA [email protected] Cristina Ivan Siveco ROMANIA [email protected] Mirela Ardelean Siveco ROMANIA [email protected] Dragos Papatoiu Siveco ROMANIA [email protected] Emilio Madueño Innovati [email protected] DOCUMENT HISTORY Version Date Author Description 0.1 16.12.2016 HIB First ToC distribution requesting contributions 0.2 30.12.2016 BEIA Romanian contributions to SotA 0.3 04.01.2016 Innovati Contributions to architecture 0.4 10.01.2017 HIB New version with restructuration of the sections, integration of the different contributions. Also added Beyond SotA contribution to sentiment analysis, Manifesto section and Marketing use case description. 0.5 17.01.2017 UPM Contribution to Dashboards for social media 0.6 18.01.2017 SIVECO, BEIA Romanian contribution 0.7 18.01.2017 HIB Improvement on use cases and SOMEDI Manifesto 0.8 19.01.2017 INNOVATI Contributions to section 2 and 5 0.9 02.02.2017 BEIA, SIVECO Review of contributions 0.10 06.02.2017 Taiger, HIB Contribution to machine learning and big data technologies/Contribution to sentiment 2 D1.1 SoMeDi Vision analysis 0.11 20.02.2017 BEIA, SIVECO Small contribution on section 2 and 6, add references for section 3 AI 1.0 22.02.2017 HIB Final version distributed for review 3 D1.1 SoMeDi Vision TABLE OF CONTENTS 1.
    [Show full text]