Predicting Age and Gender from Language, Emoji, and Emoticon
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chinese Internet Companies and Their Quest for Globalization
International Conference on Information, Business and Education Technology (ICIBIT 2013) Chinese Internet Companies and Their Quest for Globalization Harlan D. Whatley1 1Swiss Management Center, Zurich, Switzerland Abstract players in the technology market (Sun, 2009). Chinese internet companies have seen an This qualitative research paper unprecedented growth over the past explores the quest for globalization of decade. However, very few are two successful Chinese internet recognized brands outside of China while companies: Baidu and Tencent Holdings. some seek to develop their brands in In this case study, the focus is on the foreign markets. This paper analyzes the marketing strategies of these expanding marketing strategies of two internet multinational enterprises and the companies: Baidu and Tencent and their challenges they face to become quest for globalization. recognized as global brands. All of the firms in this study were founded as Keywords: Baidu, Tencent, internet, private enterprises with no ownership ties branding, marketing, globalization, China to the Chinese government. Furthermore, an analysis of the countries and markets 1. Introduction targeted by the firms is included in the study. In addition to a review of the Innovation efforts by technology current academic literature, interviews companies in China are driven by adding were conducted with marketing and significant value to imported foreign strategy professionals from the technologies or by developing new perspective firms as well as journalists products to satisfy specific domestic that closely follow Chinese internet firms demands (Li, Chen & Shapiro, 2010). and the technology sector. This study on Firms in the emerging market of China do the globalization of Chinese internet not possess the R&D resources that their firms will contribute to marketing developed Western counterparts have. -
Tencent and China Mobile's Dilemma
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face. -
The Emoji Factor: Humanizing the Emerging Law of Digital Speech
The Emoji Factor: Humanizing the Emerging Law of Digital Speech 1 Elizabeth A. Kirley and Marilyn M. McMahon Emoji are widely perceived as a whimsical, humorous or affectionate adjunct to online communications. We are discovering, however, that they are much more: they hold a complex socio-cultural history and perform a role in social media analogous to non-verbal behaviour in offline speech. This paper suggests emoji are the seminal workings of a nuanced, rebus-type language, one serving to inject emotion, creativity, ambiguity – in other words ‘humanity’ - into computer mediated communications. That perspective challenges doctrinal and procedural requirements of our legal systems, particularly as they relate to such requisites for establishing guilt or fault as intent, foreseeability, consensus, and liability when things go awry. This paper asks: are we prepared as a society to expand constitutional protections to the casual, unmediated ‘low value’ speech of emoji? It identifies four interpretative challenges posed by emoji for the judiciary or other conflict resolution specialists, characterizing them as technical, contextual, graphic, and personal. Through a qualitative review of a sampling of cases from American and European jurisdictions, we examine emoji in criminal, tort and contract law contexts and find they are progressively recognized, not as joke or ornament, but as the first step in non-verbal digital literacy with potential evidentiary legitimacy to humanize and give contour to interpersonal communications. The paper proposes a separate space in which to shape law reform using low speech theory to identify how we envision their legal status and constitutional protection. 1 Dr. Kirley is Barrister & Solicitor in Canada and Seniour Lecturer and Chair of Technology Law at Deakin University, MelBourne Australia; Dr. -
Data Source Diversity in Identifying and Understanding Events
BABEL BEACON WORLDWIDE: DATA SOURCE DIVERSITY IN IDENTIFYING AND UNDERSTANDING EVENTS Introduction: As the online data landscape continues to exponentially expand, analysts are increasingly challenged to find where key pieces of information are hiding. Because actionable data can be found anywhere online, it is essential to cast the widest possible net over the vast pool of data sources – globally. It is our observation that many analysts, when analyzing publicly available information (PAI), tend to focus on just a few large social media (SM) platforms like Facebook, Instagram, and/or Twitter. Indeed, these data sources are useful for situational awareness in certain areas around the world. But they, in context, comprise only a small portion of the immense available data within the data universe. So, the appropriate question is: “What other data sources are there, relative to my question, that should be queried?” This Beacon explores the importance of leveraging the variety of global data sets by diving into historical social media posts and analyzing conversations they spawned both within and beyond the original posting site. Babel Street analysts winnowed down data from thousands of social media outlets, blogs and message boards, global news outlets, and the dark web to identify where else these posts were being referenced and by whom, in order to pinpoint relevant and potentially actionable intelligence. BLUF: o Focusing PAI research on only a few large SM platforms severely limits the information analysts can derive about ongoing -
Social Media Contracts in the US and China
DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L. -
Emoticon Style: Interpreting Differences in Emoticons Across Cultures
Emoticon Style: Interpreting Differences in Emoticons Across Cultures Jaram Park Vladimir Barash Clay Fink Meeyoung Cha Graduate School of Morningside Analytics Johns Hopkins University Graduate School of Culture Technology, KAIST [email protected] Applied Physics Laboratory Culture Technology, KAIST [email protected] clayton.fi[email protected] [email protected] Abstract emotion not captured by language elements alone (Lo 2008; Gajadhar and Green 2005). With the advent of mobile com- Emoticons are a key aspect of text-based communi- cation, and are the equivalent of nonverbal cues to munications, the use of emoticons has become an everyday the medium of online chat, forums, and social media practice for people throughout the world. Interestingly, the like Twitter. As emoticons become more widespread emoticons used by people vary by geography and culture. in computer mediated communication, a vocabulary Easterners, for example employ a vertical style like ^_^, of different symbols with subtle emotional distinctions while westerners employ a horizontal style like :-). This dif- emerges especially across different cultures. In this pa- ference may be due to cultural reasons since easterners are per, we investigate the semantic, cultural, and social as- known to interpret facial expressions from the eyes, while pects of emoticon usage on Twitter and show that emoti- westerners favor the mouth (Yuki, Maddux, and Masuda cons are not limited to conveying a specific emotion 2007; Mai et al. 2011; Jack et al. 2012). or used as jokes, but rather are socio-cultural norms, In this paper, we study emoticon usage on Twitter based whose meaning can vary depending on the identity of the speaker. -
Protocol Filter Planning Worksheet, V7.X
Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger -
Resolving Mobile Communique App Using Classification of Data Mining Technique
ISSN:0975-9646 M.Mohamed Suhail et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 583-587 Resolving Mobile Communique App Using Classification of Data Mining Technique M.Mohamed Suhail, Lecturer,Department of Computer Science, Jamal Mohamed College, Trichy, K.SyedKousarNiasi, Assistant Professor,Department of Computer Science, Jamal Mohamed College, Trichy, Abstract- A mobile app is a software application Data Mining refers to extracting or “mining” developed specifically for use on small, wireless computing knowledge from large amount of data.Many other terms devices, such as smartphones and tablets, rather than carry a similar or slightly different meaning to Data mining, desktop or laptop computers.On the Internet and mobile such as knowledge mining from data, knowledge app, chatting is talking to other people who are using the extraction, data/pattern analysis, Data archaeology, and Internet at the same time you are. Usually, this "talking" is Data dredging.Many people treat data mining as a synonym the exchange of typed-in messages requiring one site as the for another popularly used term, Knowledge Discovery repository for the messages (or "chat site") and a group of form Data, or KDD.Data mining has attracted a great deal users who take part from anywhere on the Internet.In this of attention in the information industry and in society as a work, we apply classification techniques of data mining whole in recent years, due to the wide availability of huge using a dataset of some mobile applications (eg. whatsapp, amounts of data and the imminent need for turning such Line…etc.,) to analyze the messengers. -
Researchers Take a Closer Look at the Meaning of Emojis. Like 30
City or Zip Marlynn Wei M.D., J.D. Home Find a Therapist Topics Get Help Magazine Tests Experts Urban Survival Researchers take a closer look at the meaning of emojis. Like 30 Posted Oct 26, 2017 SHARE TWEET EMAIL MORE TO GO WITH AFP STORY BY TUPAC POINTU A picture shows emoji characters also known a… AFP | MIGUEL MEDINA A new database introduced in a recent research paper (https://www.ncbi.nlm.nih.gov/pubmed/28736776)connects online dictionaries of emojis with a semantic network to create the first machine-readable emoji inventory EmojiNet (http://emojinet.knoesis.org). (http://emojinet.knoesis.org) In April 2015, Instagram reported that 40 percent of all messages contained an emoji. New emojis are constantly being added. With the rapid expansion and surge of emoji use, how do we know what emojis mean when we send them? And how do we ensure that the person at the other end knows what we mean? It turns out that the meaning of emojis varies a whole lot based on context. Emojis, derived from Japanese “e” for picture and “moji” for character, were first introduced in the late 1990s but did not become Unicode standard until 2009. Emojis are pictures depicting faces, food, sports (https://www.psychologytoday.com/basics/sport-and- competition), animals, and more, such as unicorns, sunrises, or pizza. Apple introduced an emoji keyboard to iOS in 2011 and Android put them on mobile platforms in 2013. Emojis are different from emoticons, which can be constructed from your basic keyboard, like (-:. The digital use of emoticons has been traced back to as early as 1982, though there are earlier reported cases in Morse code telegraphs. -
Why Are Some Websites Researched More Than Others? a Review of Research Into the Global Top Twenty Mike Thelwall
Why are some websites researched more than others? A review of research into the global top twenty Mike Thelwall How to cite this article: Thelwall, Mike (2020). “Why are some websites researched more than others? A review of research into the global top twenty”. El profesional de la información, v. 29, n. 1, e290101. https://doi.org/10.3145/epi.2020.ene.01 Manuscript received on 28th September 2019 Accepted on 15th October 2019 Mike Thelwall * https://orcid.org/0000-0001-6065-205X University of Wolverhampton, Statistical Cybermetrics Research Group Wulfruna Street Wolverhampton WV1 1LY, UK [email protected] Abstract The web is central to the work and social lives of a substantial fraction of the world’s population, but the role of popular websites may not always be subject to academic scrutiny. This is a concern if social scientists are unable to understand an aspect of users’ daily lives because one or more major websites have been ignored. To test whether popular websites may be ignored in academia, this article assesses the volume and citation impact of research mentioning any of twenty major websites. The results are consistent with the user geographic base affecting research interest and citation impact. In addition, site affordances that are useful for research also influence academic interest. Because of the latter factor, however, it is not possible to estimate the extent of academic knowledge about a site from the number of publications that mention it. Nevertheless, the virtual absence of international research about some globally important Chinese and Russian websites is a serious limitation for those seeking to understand reasons for their web success, the markets they serve or the users that spend time on them. -
A Sociolinguistic Analysis of Emoticon Usage in Japanese Blogs: Variation by Age, Gender, and Topic1
Selected Papers of Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers Phoenix, AZ, USA / 21-24 October 2015 A SOCIOLINGUISTIC ANALYSIS OF EMOTICON USAGE IN JAPANESE BLOGS: VARIATION BY AGE, GENDER, AND TOPIC1 Yukiko Nishimura Toyo Gakuen University, Japan Introduction This study explores how older men and women express themselves through blogging (Curtain 2004) in Japan, where the elderly population (aged 65 years and up) will comprise an estimated 40 percent of the country’s total population by 2050 (Statistics Bureau 2014), the greatest proportion of any nation in the world. Figure 1: Proportion of elderly by country (aged 65 and above) Source: Statistics Bureau, MIC; Ministry of Health, Labour and Welfare; United Nations. Internet usage among seniors in Japan has also been increasing in recent years, particularly since 2009 (Ministry of Internal Affairs and Communication 2014). One survey on PC penetration rate among elderly household reports that 78% of people surveyed (N=800 by random telephone number dialing) in their 60’s, 54.5 % in their 70’s, and 30.5 % in their 80’s possess PCs (GF Senior Marketing 2012). 1 I would like to express my gratitude to Patricia M. Clancy for her suggestions on this study. Funding for this research from the Japan Society for the Promotion of Science, Kakenhi Category (c) 24520479, for the period of 2012 to 2015 is gratefully acknowledged. Suggested Citation (APA): Nishimura, Y. (2015, October 21-24). A Sociolinguistic Analysis Of Emoticon Usage In Japanese Blogs: Variation By Age, Gender, And Topic. Paper presented at Internet Research 16: The 16th Annual Meeting of the Association of Internet Researchers. -
Rubáiyát Layout 1
I II III IV V VI Login! For the Motherboard, who Before the troll of Error restart And, as the Update manager Now the Latest Version reviving Find... indeed is deleted with And User’s directories are fragmented into sending crashed, popped up, those who old Belief-desire-intention all his Pixel, encrypted; but in super-fast For The Translated by The Icons before him from the Methought a Text-to-Speech stood before models, And Time Machine’s Sev’n- Broadband-enabled Code, with Motherboard: Published by Vanessa Hodgkinson Matrix of Shut Down, Reader within the Social Network The Social Network emoticon-ed- The intelligent Supercomputer to column’d Compile where no “Wine Platform! Wine Platform! The Rubáiyát The White Review Drives Shut Down along with them commented, “Open then the Browser! Atomicity retires, one knows; Wine Platform! from the Cloud, and hacks “When all the Hard Disk is U know how little Login Time we Where the White Cursor Of But still a Programming language Red Wine Platform!”-the Twitter of Omar Khayyám 2014 Typeset by The CEO’s Mainframe with a formatted within, have to Run, Prophet CRM on the Network kindles in the World Wide Web, logo cries to the Pixel James Bridle Cache of LCD. Why double-clicks the glitchy And, once logged out, may undo Puts out, and Alan John Miller And many a Forum by the Fluid That sallow fascia of hers t’ User outside?” no more.” from the Desktop reboots. flow uploads, Pantone / PMS 7427. VII VIII IX X XI XII XIII XIV XV XVI XVII XVIII Come, fill the Folder, and in the Whether at Silicon Valley