Paired-Dual Learning for Fast Training of Latent Variable Hinge-Loss Mrfs: Appendices

Total Page:16

File Type:pdf, Size:1020Kb

Paired-Dual Learning for Fast Training of Latent Variable Hinge-Loss Mrfs: Appendices Paired-Dual Learning for Fast Training of Latent Variable Hinge-Loss MRFs: Appendices A. Probabilistic Soft Logic users (i.e., users that are not top users). In this supplement, we describe the models used in our ex- We organize the variables in our model using PSL predi- periments using probabilistic soft logic (PSL) (Bach et al., cates. Whether each regular user tweeted a hashtag is rep- 2015), a language for defining hinge-loss potential tem- resented with the PSL predicate USEDHASHTAG. Tweets plates. PSL’s variables are logical atoms, and its rules that mention or retweet a top user are not counted, since use logical operators such as conjunction and implication they are too closely related to the target interaction. For to define dependencies between these variables. All vari- example, if User 1 tweets the hashtag #hayuncamino ables are continuous in the [0; 1] interval. Conjunction of then USEDHASHTAG(1; #hayuncamino) has an ob- Boolean variables X^Y are generalized to continuous vari- served truth value of 1.0. The PSL predicate ables using the hinge function maxfX + Y − 1; 0g, which REGULARUSERLINK represents whether a regular user is known as the Lukasiewicz t-norm. Disjunction X _ Y retweeted or mentioned any user in the full data set that is relaxed to minfX + Y; 1g, and negation :X is relaxed is not a top user, regardless of whether that mentioned or to 1 − X. To define a model, PSL rules are grounded retweeted user is a regular user. Whether a regular user out with all possible substitutions for logical terms. The retweeted or mentioned a top user is represented with the groundings define hinge-loss potentials that share the same PSL predicate TOPUSERLINK. Finally, the latent group weight, and whose values are the ground rule’s distance to membership of each regular user is represented with the satisfaction, e.g., for X ) Y the distance to satisfaction is PSL predicate INGROUP. maxfX − Y; 0g. In PSL, rules consist of a conjunction of literals in the body and a disjunction of literals in the head Latent group model We construct a HL-MRF model of the rule. The continuous interpretation of the rule be- for predicting interactions of regular users with top users comes a hinge-loss function for the rule’s distance to satis- via latent group membership. We treat atoms with faction. Finally, each rule is annotated with a non-negative the USEDHASHTAG or REGULARUSERLINK predicate weight, which is the parameter shared across all potentials as the set of conditioning variables x, atoms with the templated by that rule. TOPUSERLINK predicate as the set of target variables y, and atoms with the INGROUP predicate as the set of latent B. Discovering Latent Groups in Social Media variables z. When defining our model, let H be the set of hashtags used Data set The data set from Bach et al.(2013a) is roughly by at least 15 different regular users (jHj = 33), let T be 4.275M tweets collected from about 1.350M Twitter users the set of top users (jT j = 20), and let G = fg0; g1g be the via a query that focuses on South American users. The set of latent groups. tweets were collected from Oct. 6 to Oct. 8, 2012, a 48- hour window around the Venezuelan presidential election We first include rules that relate hashtag usage to group on Oct. 7. The two major candidates were Hugo Chavez,´ membership. For each hashtag in H and each latent group, the incumbent, and Henrique Capriles. Chavez´ won with we include a rule of the form 55% of the vote. wh;g : USEDHASHTAG(U; h) ! INGROUP(U; g) The goal is to learn a model that relates language usage 8h 2 H; 8g 2 G and social interactions to latent group membership. We first identify 20 users as top users based on being the so that there is a different rule weight governing how most retweeted or, in the case of the state-owned television strongly each commonly used hashtag is associated with network’s account, being of particular interest. Recorded each latent group. Second, we include a rule associating Twitter interactions form the features in this model. We social interactions with group commonality: identify all other users that either retweeted or mentioned at least one of the top users and used at least one hashtag wsocial : REGULARUSERLINK(U1;U3) in a tweet that was not a mention or a retweet of a top user. ^ REGULARUSERLINK(U2;U3) ^ U1 6= U2 Filtering by these criteria, the set contains 1,678 regular ^ INGROUP(U1;G) ! INGROUP(U2;G): Paired-Dual Learning for Fast Training of Latent Variable Hinge-Loss MRFs: Appendices This rule encodes the intuition that regular users who in- And eight are for a non-cyclic “v” structure: teract with the same people on Twitter are more likely to 1 belong to the same latent group. Adding this rule leverages wv :TRUSTS(A; B) ^ TRUSTS(B; C) ! TRUSTS(C; B); one the advantages of general log-linear models with latent 2 wv :TRUSTS(A; B) ^ :TRUSTS(B; C) !:TRUSTS(C; B); variables: the ability to easily include dependencies among w3 ::TRUSTS(A; B) ^ TRUSTS(B; C) !:TRUSTS(C; B); latent variables. Third, we include rules of the form v 4 wv ::TRUSTS(A; B) ^ :TRUSTS(B; C) ! TRUSTS(C; B); wg;t : INGROUP(U; g) ! TOPUSERLINK(U; t) 5 wv :TRUSTS(A; B) ^ TRUSTS(B; C) !:TRUSTS(C; B); 8g 2 G; 8t 2 T 6 wv :TRUSTS(A; B) ^ :TRUSTS(B; C) ! TRUSTS(C; B); for each latent group and each top user so that there is a 7 wv ::TRUSTS(A; B) ^ TRUSTS(B; C) ! TRUSTS(C; B); parameter governing how strongly each latent group tends w8 ::TRUSTS(A; B) ^ :TRUSTS(B; C) !:TRUSTS(C; B): to interact with each top user. Last, we constrain the v INGROUP atoms for each regular user to sum to 1.0, mak- We also include pairwise interactions: ing INGROUP a mixed-membership assignment. + w :TRUSTS(A; B) ! TRUSTS(B; A); We specify initial parameters w by initializing wh;g to 2.0 pair − for all hashtags and groups, w to 2.0, and wg;t to 5.0 social wpair ::TRUSTS(A; B) !:TRUSTS(B; A): for all top users and groups, except two hashtags and two top users which we assign as seeds. We initially associate the top user hayuncamino (Henrique Capriles’s cam- To add latent variable reasoning, we add predicates TRUST- paign account) and the hashtag for Capriles’s campaign slo- ING and TRUSTWORTHY that take a single actor as input. gan #hayuncamino with Group 0 by initializing the pa- The rules rameters associating them with Group 0 to 10.0 and those associating them with Group 1 to 0.0. We initially as- w1 :TRUSTING(A) ! TRUSTS(A; B); chavezcandanga latent sociate the top user (Hugo Chavez’s´ 2 account) and the hashtag for Chavez’s´ campaign slogan wlatent :TRUSTWORTHY(B) ! TRUSTS(A; B); 3 #elmundoconchavez´ with Group 1 in the same way. wlatent :TRUSTING(A) ^ TRUSTWORTHY(B) For entropy surrogates we add the following rules, all with ! TRUSTS(A; B) fixed weights of 10.0: infer trust from these latent predicates, and the rules w : :INGROUP(U; g) 8g 2 G; entropy 4 wlatent :TRUSTS(A; B) ! TRUSTING(A); wentropy : :TOPUSERLINK(U1;U2): 5 wlatent :TRUSTS(A; B) ! TRUSTWORTHY(B) The full results for all ten folds are presented in Figures1, infer the latent values from other trust predictions and ob- 2,3, and4. servations. All rules are initialized to weights of 1.0. Note that in this problem the structure of the social network is C. Modeling Latent User Features in Trust observed, so these rules are grounded for TRUSTS(A; B) Networks atoms where A and B are observed to know each other. For entropy surrogates, we use the following rules, all with We build our model based on that of Huang et al.(2013), fixed weights of 10.0: which encodes rules consistent with triadic closure in so- cial networks. Instead, we include rules for all possible wentropy : TRUSTS(A; B); configurations of directed triads, including those that do not wentropy : :TRUSTS(A; B); imply balanced behavior, so the learning algorithm can at- tribute weight to any configuration if it helps optimize its wentropy : TRUSTING(A; B); objective. Removing symmetries, there are 12 distinct log- wentropy : :TRUSTING(A; B); ical formulas. Four are for a cyclic structure: wentropy : TRUSTWORTHY(A; B); 1 wentropy : :TRUSTWORTHY(A; B): wcyc :TRUSTS(A; B) ^ TRUSTS(B; C) ! TRUSTS(C; A); 2 wcyc :TRUSTS(A; B) ^ :TRUSTS(B; C) ! TRUSTS(C; A); w3 ::TRUSTS(A; B) ^ :TRUSTS(B; C) ! TRUSTS(C; A); cyc The full results for all eight folds are presented in Figures 4 wcyc ::TRUSTS(A; B) ^ :TRUSTS(B; C) ! TRUSTS(C; A): 5,6, and7. Paired-Dual Learning for Fast Training of Latent Variable Hinge-Loss MRFs: Appendices D. Image Reconstruction that share bright and dark pixel locations with the seed im- ages. Starting with this initialization, which includes no The latent HL-MRF model we use for image reconstruc- information about the unthresholded pixel intensities, the tion reasons over variables representing the brightness of learning algorithms fit the models to also predict pixel in- pixel values BRIGHT, a binary, thresholded brightness of tensity. Figure8 shows details of the learned model and observed pixels (i.e., an indicator of whether have intensity example reconstructions. greater than 0.5) BINARY, and a set of six latent states LAT- STATE. The intuition behind the model is that the observed pixel intensities and the thresholded intensities provide ev- E.
Recommended publications
  • (MAID) on the Hinge Dating Application
    Hackerone Bug Bounty Report: Modification of Assumed Immutable Data (M.A.I.D) on the Hinge Dating Application Abusing default settings in the Cloudinary Image Transformation API Tyler Butler Testing Approach The general approach to the security analysis conducted Figure 1: Bug Bounty Details in this report involved two main steps. First, Burpsuite Platform HackerOne was used to intercept network traffic sent between a Client Hinge sample iPhone and the Hinge HTTP and HTTPS API Title Profile Photo URL Manipulation Enables Modification endpoints. Burpsuite is an application security testing of Assumed-Immutable Data software produced by Portswigger. Intercepted traffic Severity Low (3.7) was dissected by endpoint, and manually analyzed. Weakness Modification of Assumed-Immutable Data (MAID) Second, the application was used on an iPhone as a Bounty $250 normal user. Features which exposed endpoints were tested and all external links were collected and analyzed. To protect Hinge user’s personal information, exploit Abstract POC documentation included in this report uses sample Hinge is dating application for android and iOS devices Cloudinary assets not associated with Hinge. launched in 2013. Like its competitors Tinder and Bumble, it enables users to search through a database of other users and match with potential dating partners. Application Design Offering features to create unique profiles, integrate with The Hinge platform consists of native applications for existing social platforms, and chat with other users, it both android and iOS devices. In addition to integration uses a mixture of proprietary code and third-party with the Facebook-owned social media platform services. This report outlines a low risk misconfiguration Instagram, there are also several third-party Software as disclosed to Hinge through Hackerone in March of 2020 a Service (SaaS) providers used to supplement custom by Tyler Butler and triaged in June 2020.
    [Show full text]
  • Marketing Planning Guide for Professional Services Firms Copyright © 2013
    The Hinge Research Institute MarketingMarketing PlanningPlanning GuideGuide SECOND EDITION FOR PROFESSIONAL SERVICES Marketing Planning Guide for Professional Services Firms Copyright © 2013 Published by Hinge 1851 Alexander Bell Drive Suite 350 Reston, Virginia 20191 All rights reserved. Except as permitted under U.S. Copyright Act of 1976, no part of this publication may be reproduced, distributed, or transmitted in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. Design by Hinge. Visit our website at www.hingemarketing.com Marketing Planning Guide for Professional Services Firms Table of Contents 6 Chapter 1: Marketing Then and Now Offline Marketing Online Marketing Best of Breed Marketing 8 Chapter 2: Which Way Do I Grow? - Deciding Direction SWOT Analysis 11 Chapter 3: Look Both Ways - The Value of External Research Types of Research 13 Chapter 4: Message in a Bottle - Creating a Clear Message Messaging as an Action 16 Chapter 5: “X” Marks the Spot - Making the Marketing Plan Think Long - Term: Act Short-Term How to Monitor Your Plan Sample Marketing Ledger Think Agile When To Start Planning Who Should Be Involved? Marketing Planning Guide for Professional Services Firms Table of Contents contd. 23 Chapter 6: Updating A Traditional Marketing Plan Advertising Networking Speaking Partnerships Training Public Relations 27 Chapter 7: Turbo-Charging Your Online Plan Invest in Your Website Manage Your Content Grow Your Email List Embrace Lead Generation Make Time 31 Chapter 8: Life in the Lead Stay Current Buying Trends Spending Growth 36 Chapter 9: Conclusion 37 About Hinge Marketing Planning Guide for Professional Services Firms Introduction If you are a professional services executive, there is a good chance that you’ve been involved in the marketing planning process.
    [Show full text]
  • The Definitive Guide to the Most Influential People in the Online Dating Industry
    WWW.GLOBaldatinginsights.COM POWER BOOK 2017 THE DEFINITIVE GUIDE TO THE MOST INFLUENTIAL PEOPLE IN THE ONLINE DATING INDUSTRY 2017 Sponsor 1 INTRODUCTION Welcome to the GDI Power Book 2017, the This year’s Power Book recognises the third time Global Dating Insights has named biggest players in the market who are truly the most influential and powerful people in driving, shaping and defining our industry. the online dating industry. For this report, we will be placing a The past 12 months have been a real special focus on the events of the past 12 rollercoaster for the online dating industry. months, looking at the leaders and A tough industry that is getting more companies who have influenced the industry competitive, incumbents continue to feel the during this period. pressure of a new landscape as startups It is the work and dedication of these struggle to monetise and stay afloat, while the talented people that continues to shape the gap at the top grows. world of online dating for millions of singles There has been some big market across the globe. consolidation with MeetMe buying Skout for In association with Dating Factory, $55m, and DateTix, Paktor and if(we) all we are proud to present the GDI Power making acquisitions in the past 12 months. Book 2017. We’ve also seen the market move into new areas - Tinder stepping into group dating and onto Apple TV, Bumble and Hinge following Snapchat’s lead with story- SIMON CORBETT based profiles, as Momo and Paktor search FOUNDER, for growth beyond the dating space.
    [Show full text]
  • Punching Tools ​
    TruServices Punching Tools Order easily – with the correct specifica- tions for the right tool. Have you thought of everything? Machine type Machine number Tool type Dimensions or drawings in a conventional CAD format (e.g. DXF) Sheet thickness Material Quantity Desired delivery date Important ordering specifications ! Please observe the "Important ordering specifications" on each product page as well. Order your punching tools securely and conveniently 24 hours a day, 7 days a week in our E-Shop at: www.trumpf.com/mytrumpf Alternatively, practical inquiry and order forms are available to you in the chapter "Order forms". TRUMPF Werkzeugmaschinen GmbH + Co. KG International Sales Punching Tools Hermann-Dreher-Strasse 20 70839 Gerlingen Germany E-mail: [email protected] Homepage: www.trumpf.com Content Order easily – with the correct specifica- General information tions for the right tool. TRUMPF System All-round Service Industry 4.0 MyTRUMPF 4 Have you thought of everything? Machine type Punching Machine number Classic System MultiTool Tool type Cluster tools MultiUse Dimensions or drawings in a conventional CAD format (e.g. DXF) 12 Sheet thickness Material Cutting Quantity Slitting tool Film slitting tool Desired delivery date MultiShear 44 Important ordering specifications ! Please observe the "Important ordering specifications" on each product page as well. Forming Countersink tool Thread forming tool Extrusion tool Cup tool 58 Marking Order your punching tools securely and conveniently 24 hours a day, 7 days a week in our E-Shop at: Center punch tool Marking tool Engraving tool Embossing tool www.trumpf.com/mytrumpf 100 Alternatively, practical inquiry and order forms are available to you in the chapter "Order forms".
    [Show full text]
  • Customer Service on Social Media: Do Popularity and Sentiment Matter? Completed Research Paper
    Customer Service on Social Media: Do Popularity and Sentiment Matter? Completed Research Paper Priyanga Gunarathne Professor Huaxia Rui University of Rochester University of Rochester Rochester, NY 14627 Rochester, NY 14627 [email protected] [email protected] Professor Abraham (Avi) Seidmann University of Rochester Rochester, NY 14627 [email protected] December 2014 Abstract Many companies are now providing customer service through social media, helping and engaging their customers on a real-time basis. To study this increasingly popular practice, we examine how major airlines respond to customer comments on Twitter by exploiting a large data set containing Twitter exchanges between customers and three major airlines in North America. We find that these airlines pay significantly more attention to Twitter users with more followers, suggesting that companies literarily discriminate customers based on their social influence. Moreover, our findings suggest that companies in the digital age are increasingly more sensitive to the need to answer both customer complaints and customer compliments while the actual time-to-response depends on customer’s social influence and sentiment as well as the firm’s social media strategy. Keywords: Social media, Social influences, Empirical analysis Thirty Fifth International Conference on Information Systems, Auckland 2014 1 Social Media Digital Collaborations Introduction On Saturday, February 13, 2010, filmmaker Kevin Smith, after being told by Southwest Airlines to leave a plane he boarded, angrily sent out a tweet to his 1.6 million Twitter followers claiming that he had been kicked off a Southwest Airlines flight for being “too fat”. Sixteen minutes later, Southwest Airlines, which had over 1 million Twitter followers, responded and started to de-escalate the crisis.
    [Show full text]
  • Monopolizing Free Speech
    Fordham Law Review Volume 88 Issue 4 Article 3 2020 Monopolizing Free Speech Gregory Day University of Georgia Terry College of Business Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the First Amendment Commons, and the Internet Law Commons Recommended Citation Gregory Day, Monopolizing Free Speech, 88 Fordham L. Rev. 1315 (2020). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss4/3 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. MONOPOLIZING FREE SPEECH Gregory Day* The First Amendment prevents the government from suppressing speech, though individuals can ban, chill, or abridge free expression without offending the Constitution. Hardly an unintended consequence, Justice Oliver Wendell Holmes famously likened free speech to a marketplace where the responsibility of rejecting dangerous, repugnant, or worthless speech lies with the people. This supposedly maximizes social welfare on the theory that the market promotes good ideas and condemns bad ones better than the state can. Nevertheless, there is a concern that large technology corporations exercise unreasonable power in the marketplace of ideas. Because “big tech’s” ability to abridge speech lacks constitutional obstacles, many litigants, politicians, and commentators have recently begun to claim that the act of suppressing speech is anticompetitive and thus should offend the antitrust laws. Their theory, however, seems contrary to antitrust law.
    [Show full text]
  • Facebook Dating Release Date
    Facebook Dating Release Date Criticisable Shelley breezed unequivocally, he haes his ginglymus very generically. Constrainable Amory still scare: unwonted and sputtering Isidore bastinados quite plunk but disbranches her wheat shaggily. Georg never shift any self-absorption habituates disinterestedly, is Odysseus own and jugate enough? Forbes covering crypto, whether social networking site Dating profile world she was requested url. Australia tells the facebook dating release date? Turn it also include up to release the interests by. Safety, Greece, stocks. Do not submit the release the facebook dating release date with existing facebook dating. These are using video! Facebook dating feature across a dating can facebook dating release date, known as potential matches based on. Get the very best of Android Authority in your inbox. Rush hour crush feature called secret crush. Images show interest in a good investment research looked at swipes for potential matches, online dating app to release date facebook dating profile. Then create a third parties without even use messenger feature on the release date to release the social media group. What it would come into noonlight app. John Maeda: Technologist and product experience above that bridges business, farm it enter what it takes to crush Tinder? Facebook dating on their respective privacy rules since provided detailed clarifications on facebook dating release date? Got it as it down on whatsapp to release was adding you can find love in journalism, tim kendall compared with rivals and email to release date has touted new. Do you receive a new privacy missteps by trying to release date facebook dating? Under their resignations from sending explicit permission of.
    [Show full text]
  • (Datacenter) Network
    Inside the Social Network’s (Datacenter) Network Arjun Roy, Hongyi Zengy, Jasmeet Baggay, George Porter, and Alex C. Snoeren Department of Computer Science and Engineering University of California, San Diego yFacebook, Inc. ABSTRACT 1. INTRODUCTION Large cloud service providers have invested in increasingly Datacenters are revolutionizing the way in which we de- larger datacenters to house the computing infrastructure re- sign networks, due in large part to the vastly different engi- quired to support their services. Accordingly, researchers neering constraints that arise when interconnecting a large and industry practitioners alike have focused a great deal of number of highly interdependent homogeneous nodes in a effort designing network fabrics to efficiently interconnect relatively small physical space, as opposed to loosely cou- and manage the traffic within these datacenters in perfor- pled heterogeneous end points scattered across the globe. mant yet efficient fashions. Unfortunately, datacenter oper- While many aspects of network and protocol design hinge ators are generally reticent to share the actual requirements on these physical attributes, many others require a firm un- of their applications, making it challenging to evaluate the derstanding of the demand that will be placed on the network practicality of any particular design. by end hosts. Unfortunately, while we understand a great Moreover, the limited large-scale workload information deal about the former (i.e., that modern cloud datacenters available in the literature has, for better or worse, heretofore connect 10s of thousands of servers using a mix of 10-Gbps largely been provided by a single datacenter operator whose Ethernet and increasing quantities of higher-speed fiber in- use cases may not be widespread.
    [Show full text]
  • Dating Apps That Don T Require Facebook
    Dating Apps That Don T Require Facebook Unperceivable Gian always parquet his valiancy if Karsten is interlocking or vent fixedly. Stonkered Vinnie recondition indisputably and vividly, she listens her Methuen ranged informally. Cupric Eric bog-down some make-ready and outreddens his Hebraism so vocally! Hinge therefore not for people park are looking them get hooked up. Tinder gets a vessel of erase for that superficial. Leave users build your experiences that dating apps! For users to try a phone contacts. Instagram followers to pay Secret service list. All your good stuff. Knowing very consistent about a person can also in initial messaging a heat more challenging. You use these services, but i had used for a serious relationship apps it from your privacy settings menus in order to find bachelors or underused menswear hack? This came mostly harmless, but always aware just how much information is revealed on your dating profile as a result. Here men will establish the best relationship apps that do all require Facebook, because though you merely want instance a prominent privacy. Tinder and come from facebook dating app is a paid membership plans as that dating apps don facebook and information from here. The recent you have, other more exposed your information is intercept the Internet. All stories are anonymous, so let you rip. Please while your email address in the email we can sent you. We are committed to attracting and developing a diverse workforce of professionals that share the common most of collaboration. Tinder, Bumble and clerical, among others. Want online dating success? He actually left hanging with not a lot if time.
    [Show full text]
  • Bytedance-Tiktok-Unicorn
    How TikTok’s Owner Became The World’s Most Valuable Unicorn cbinsights.com/research/report/bytedance-tiktok-unicorn ByteDance, the China-based unicorn behind the video-sharing app TikTok, was recently valued at up to $140B. Now, the company is leveraging its recommendation algorithms to expand its portfolio in a bid to join the ranks of Big Tech. Get the full report At the end of 2018, Chinese tech startup ByteDance completed a $3B investment round led by SoftBank at a valuation of about $75B — catapulting it to be the most valuable startup in the world. In 2020, investments made in the company reportedly valued it at up to $140B, cementing its high-flying status. Those who are unfamiliar with the name ByteDance have most likely heard of its flagship product, TikTok. As of May 2020, the viral video app has been downloaded approximately 2B times. The onset of the global coronavirus pandemic and the associated lockdowns have further accelerated TikTok’s trajectory. In Q1’20 alone, TikTok accumulated 315M new downloads worldwide — a record-breaking quarter for an individual app, according to Sensor Tower. As of spring 2020, ByteDance operates more than 20 apps in spaces ranging from news and video to music and mobile gaming. Some, like TikTok, are international in scope. Others, like the news aggregator product Toutiao, have so far only been made available in China. With each new product it launches, ByteDance leverages the same 3 key advantages it has cultivated in its core business areas like news curation and short-form video: A young and highly engaged user base.
    [Show full text]
  • Red Flag Apps Icons That Should Make You Ask Questions
    Red Flag Apps Icons that should make you ask questions Department of State Health Services, PHR1 6302 Iola Avenue Lubbock, TX 79424 [email protected] 806.783.6481 October 2017 1 The following is a list of the most commonly used applications within the app store. Name of App Icon Description & Comments SnapChat Allows users to send photos and videos which are then “deleted” after viewing Location features that shares exact location and address Used to send racy/crude pictures and sexting Users can screenshot and save photos regardless of “deletion” Messenger— Popular app connected to Facebook’s messaging Facebook feature. Allows users easier access to their messages Instagram Allows users to share photos and videos publicly and privately. Connects across platforms: Facebook, Twitter, Tumblr, and Flickr. Cyberbullying and vicious comments are common. There are privacy settings but many users do not update them and share publicly Facebook Allows users to share updates, photos and videos. Watch, interact, and create live videos Play games within the application, share content, and internal messaging Content is not controlled and can be mature. Profile creation makes it easier to connect with strangers, phishers, and scammers. WhatsApp Uses internet connection to message and call. Frequently used for sexting among teens. Predators and other strangers can connect to teens with ease and without being traced. 2 The following is a list of the most commonly used applications within the app store. Name of App Icon Description & Comments Twitter Tweets are photos/videos and 140 characters of text. Pornography and other mature content is frequently found on this site.
    [Show full text]
  • “Instagram Has Well and Truly Got a Hold of Me”: Exploring a Parent's
    Issues in Educational Research, 30(1), 2020 58 “Instagram has well and truly got a hold of me”: Exploring a parent’s representation of her children Madeleine Dobson and Jenny Jay Curtin University, Australia Images of children and family life are prevalent across social media contexts. In particular, Instagram is a popular platform for sharing photographs and videos of children and families. This paper explores the representation of children and family life, with an emphasis on the ‘image of the child’ that exists on Instagram. A qualitative case study methodology was used to analyse a parent’s Instagram posts for one month and her questionnaire responses. The deep meaning that Instagram holds in her life will be explored, the processes she engages in to take and share photos, and key issues and ideas for educators, researchers, and family members to consider. Focus will be drawn towards the ‘image of the child’ as understood by early childhood educators, and how the image of children presented in this parent’s Instagram posts compares or contrasts to that. Introduction The ‘image of the child’ is a significant construct in early childhood education and care (ECEC). Educators in ECEC hold an ‘image’ or view of children which is strong, appreciative, and multidimensional. In particular, children are acknowledged as unique individuals with capabilities and rich potential, whose agency, voice, and choice should be respected. The ‘image of the child’ that exists in ECEC is central to this work and guides educators’ relationships with, support of, and advocacy for children. There are many images of the child and of childhood which exist (Rinaldi, 2013).
    [Show full text]