Learning Latent Groups with Hinge-Loss Markov Random Fields

Total Page:16

File Type:pdf, Size:1020Kb

Learning Latent Groups with Hinge-Loss Markov Random Fields Learning Latent Groups with Hinge-loss Markov Random Fields Stephen H. Bach [email protected] Bert Huang [email protected] Lise Getoor [email protected] University of Maryland, College Park, Maryland 20742, USA Abstract produce state-of the-art performance on various prob- Probabilistic models with latent variables lems with fully-observed training data, methods for are powerful tools that can help explain re- parameter learning with latent variables are currently lated phenomena by mediating dependencies less understood. In particular, there is need for latent- among them. Learning in the presence of la- variable learning methods that leverage the fast, con- tent variables can be difficult though, because vex inference in HL-MRFs. In this work, we introduce of the difficulty of marginalizing them out, or, a hard expectation-maximization (EM) strategy for more commonly, maximizing a lower bound learning HL-MRFs with latent variables. This strat- on the marginal likelihood. In this work, we egy mixes inference and supervised learning (where show how to learn hinge-loss Markov ran- all variables are observed), two well-understood tasks dom fields (HL-MRFs) that contain latent in HL-MRFs, allowing learning with latent variables variables. HL-MRFs are an expressive class while leveraging the rich expressivity of HL-MRFs. of undirected probabilistic graphical models HL-MRFs are the formalism behind the probabilis- for which inference of most probable expla- tic soft logic (PSL) modeling language (Broecheler nations is a convex optimization. By incor- et al., 2010), and have been used for collective classifi- porating latent variables into HL-MRFs, we cation, ontology alignment (Broecheler et al., 2010), can build models that express rich dependen- social trust prediction (Huang et al., 2013), voter cies among those latent variables. We use a opinion modeling (Bach et al., 2012; Broecheler & hard expectation-maximization algorithm to Getoor, 2010), and graph summarization (Memory learn the parameters of such a model, lever- et al., 2012). PSL is one of many tools for designing aging fast inference for learning. In our ex- relational probabilistic models, but is perhaps most re- periments, this combination of inference and lated to Markov logic networks (Richardson & Domin- learning discovers useful groups of users and gos, 2006), which use a similar syntax based on first- hashtags in a Twitter data set. order logic to define models. When learning parameters in models with hidden, or 1. Introduction latent, variables, the standard approach is to maxi- mize the likelihood of the observed labels, which in- Hinge-loss Markov random fields (HL-MRFs) are a volves marginalizing over the latent variable states. In powerful class of probabilistic graphical models, which many models, directly computing this likelihood is too combine support for rich dependencies with fast, con- expensive, so the variational method of expectation vex inference of most-probable explanantions (MPEs). maximization (EM) provides an alternative (Demp- They achieve this combination by expessing dependen- ster et al., 1977). The variational interpretation of cies among variables with domain [0,1] as hinge-loss EM iteratively updates a proposal distribution, min- potentials, which can generalize logical implication to imizing the Kullback-Leiber (KL) divergence to the continuous variables. While recent advances on infer- empirical distribution, interleaved with estimating the ence and learning for HL-MRFs allows these models to expectation of the latent variables. The variational view allows the possibility of EM with a limited but Presented at the International Conference on Machine tractable family of proposal distributions and provides Learning (ICML) workshop on Inferning: Interactions be- theoretical justification for what is commonly known tween Inference and Learning, Atlanta, Georgia, USA, 2013. Copyright 2013 by the author(s). as \hard EM". In hard EM, the proposal distribution Learning Latent Groups with Hinge-loss Markov Random Fields comes from the family of point distributions: distri- Definition 2. A hinge-loss Markov random field P butions where the probability is one at a single point over random variables Y and conditioned on random estimate and zero otherwise. Since HL-MRFs admit variables X is a probability density defined as follows: fast and efficient MPE inference, they are well-suited if Y; X 2= D~ , then P (YjX) = 0; if Y; X 2 D~ , then for hard EM. 1 P (YjX) = exp [−f (Y; X)] ; We demonstrate our approach on the task of group de- Z(λ) λ tection in social media data, extending previous work where Z(λ) = R exp [−f (Y; X)]. that used fixed-parameter HL-MRFs for the same task Y λ (Huang et al., 2012). Group detection in social media Thus, MPE inference is equivalent to finding the min- is an important task since more and more real-world imizer of the convex energy fλ. phenomena, such as political organizing and discourse, take place through social media. Group detection has Probabilistic soft logic (Broecheler et al., 2010; Kim- the potential to help us understand language, political mig et al., 2012) provides a natural interface to repre- events, social interactions, and more. sent hinge-loss potential templates using logical con- junction and implication. In particular, a logical con- 2. Hinge-loss Markov Random Fields junction of Boolean variables X ^ Y can be general- ized to continuous variables using the hinge function In this section, we review hinge-loss Markov random maxfX +Y −1; 0g, which is known as the Lukasiewicz fields (HL-MRFs) and probabilistic soft logic (PSL). t-norm. Similarly, logical implication X ) Y is re- HL-MRFs are parameterized by constrained hinge-loss laxed via 1 − maxfY − X; 0g. PSL allows modelers to energy functions. The energy function is factored into design rules that, given data, ground out possible sub- hinge-loss potentials, which are clamped linear func- stitutions for logical terms. The groundings of a tem- tions of the continuous variables, or squares of these plate define hinge-loss potentials that share the same functions. These potentials are weighted by a set of weight. PSL rules take the form of these soft logical parameter weights, which can be learned and can be implications, and the linear function of the HL-MRF templated, i.e., many potentials of the same form may potential is the ground rule's distance to satisfaction, share the same weight. Additionally, HL-MRFs can maxfY − X; 0g. We defer to Broecheler et al.(2010) incorporate linear constraints on the variables, which and Kimmig et al.(2012) for further details on PSL. can be useful for modeling, for example, mutual exclu- Inference of the most probable explanation (MPE) in sion between variable states. For completeness, a full, HL-MRFs is a convex optimization, since the hinge- formal definition of HL-MRFs is as follows. loss potentials are each convex and the linear con- Definition 1. Let Y = (Y1;:::;Yn) be a vector of straints preserve convexity. Currently, the fastest 0 n variables and X = (X1;:::;Xn0 ) a vector of n known method for HL-MRF inference uses the al- 0 variables with joint domain D = [0; 1]n+n . Let φ = ternating direction method of multipliers (ADMM), (φ1; : : : ; φm) be m continuous potentials of the form which decomposes the full objective into subproblems each with their own copy of the variables and uses aug- pj φj(Y; X) = [max f`j(Y; X); 0g] mented Lagrangian relaxation to enforce consensus be- tween the independently optimized subproblems (Bach where `j is a linear function of Y and X and pj 2 et al., 2012). The factorized form of the HL-MRF en- f1; 2g. Let C = (C1;:::;Cr) be linear constraint func- ergy function naturally corresponds to a subproblem tions associated with index sets denoting equality con- partitioning, with each hinge-loss potential and each straints E and inequality constraints I, which define constraint forming its own subproblem. the feasible set A number of methods can be used to learn the weights of an HL-MRF. Currently, two main strate- ~ Ck(Y; X) = 0; 8k 2 E D = Y; X 2 D : gies have been studied: approximate maximum likeli- Ck(Y; X) ≥ 0; 8k 2 I hood (Broecheler et al., 2010) and large-margin esti- For Y; X 2 D~ , given a vector of nonnegative free mation (Bach et al., 2013). In this work, we focus on approximate maximum likelihood using voted percep- parameters, i.e., weights, λ = (λ1; : : : ; λm), a con- tron gradient ascent. The gradient for the likelihood of strained hinge-loss energy function fλ is defined as training data contains the expectation of the log-linear m X features, which we approximate via the MPE solution. fλ(Y; X) = λjφj(Y; X) : Thus far, these learning methods require all unknown j=1 variables to have labeled ground truth during train- Learning Latent Groups with Hinge-loss Markov Random Fields ing. In the next section, we describe one method to Algorithm 1 Hard Expectation Maximization relax this restriction and learn when only part of the Input: model P (Y; ZjX; λ), initial parameters λ0 unknown variables have observed labels. t 1 while not converged do 3. Learning with Latent Variables t t−1 Z = arg maxZ P (ZjY; X; λ ) t t Probabilistic models can have latent variables for a λ = arg maxλ P (Y; Z jX; λ) number of reasons. In some cases, large models have t t + 1 many unknowns to the point that it is impractical to end while collect ground truth for them all. In other cases, the la- tent variables represent values that can never be mea- sured, since they are inherently latent and may have optima. This makes initializing the model wit reason- no real-world analogue. In both of these scenarios, the able parameters important.
Recommended publications
  • (MAID) on the Hinge Dating Application
    Hackerone Bug Bounty Report: Modification of Assumed Immutable Data (M.A.I.D) on the Hinge Dating Application Abusing default settings in the Cloudinary Image Transformation API Tyler Butler Testing Approach The general approach to the security analysis conducted Figure 1: Bug Bounty Details in this report involved two main steps. First, Burpsuite Platform HackerOne was used to intercept network traffic sent between a Client Hinge sample iPhone and the Hinge HTTP and HTTPS API Title Profile Photo URL Manipulation Enables Modification endpoints. Burpsuite is an application security testing of Assumed-Immutable Data software produced by Portswigger. Intercepted traffic Severity Low (3.7) was dissected by endpoint, and manually analyzed. Weakness Modification of Assumed-Immutable Data (MAID) Second, the application was used on an iPhone as a Bounty $250 normal user. Features which exposed endpoints were tested and all external links were collected and analyzed. To protect Hinge user’s personal information, exploit Abstract POC documentation included in this report uses sample Hinge is dating application for android and iOS devices Cloudinary assets not associated with Hinge. launched in 2013. Like its competitors Tinder and Bumble, it enables users to search through a database of other users and match with potential dating partners. Application Design Offering features to create unique profiles, integrate with The Hinge platform consists of native applications for existing social platforms, and chat with other users, it both android and iOS devices. In addition to integration uses a mixture of proprietary code and third-party with the Facebook-owned social media platform services. This report outlines a low risk misconfiguration Instagram, there are also several third-party Software as disclosed to Hinge through Hackerone in March of 2020 a Service (SaaS) providers used to supplement custom by Tyler Butler and triaged in June 2020.
    [Show full text]
  • Marketing Planning Guide for Professional Services Firms Copyright © 2013
    The Hinge Research Institute MarketingMarketing PlanningPlanning GuideGuide SECOND EDITION FOR PROFESSIONAL SERVICES Marketing Planning Guide for Professional Services Firms Copyright © 2013 Published by Hinge 1851 Alexander Bell Drive Suite 350 Reston, Virginia 20191 All rights reserved. Except as permitted under U.S. Copyright Act of 1976, no part of this publication may be reproduced, distributed, or transmitted in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. Design by Hinge. Visit our website at www.hingemarketing.com Marketing Planning Guide for Professional Services Firms Table of Contents 6 Chapter 1: Marketing Then and Now Offline Marketing Online Marketing Best of Breed Marketing 8 Chapter 2: Which Way Do I Grow? - Deciding Direction SWOT Analysis 11 Chapter 3: Look Both Ways - The Value of External Research Types of Research 13 Chapter 4: Message in a Bottle - Creating a Clear Message Messaging as an Action 16 Chapter 5: “X” Marks the Spot - Making the Marketing Plan Think Long - Term: Act Short-Term How to Monitor Your Plan Sample Marketing Ledger Think Agile When To Start Planning Who Should Be Involved? Marketing Planning Guide for Professional Services Firms Table of Contents contd. 23 Chapter 6: Updating A Traditional Marketing Plan Advertising Networking Speaking Partnerships Training Public Relations 27 Chapter 7: Turbo-Charging Your Online Plan Invest in Your Website Manage Your Content Grow Your Email List Embrace Lead Generation Make Time 31 Chapter 8: Life in the Lead Stay Current Buying Trends Spending Growth 36 Chapter 9: Conclusion 37 About Hinge Marketing Planning Guide for Professional Services Firms Introduction If you are a professional services executive, there is a good chance that you’ve been involved in the marketing planning process.
    [Show full text]
  • The Definitive Guide to the Most Influential People in the Online Dating Industry
    WWW.GLOBaldatinginsights.COM POWER BOOK 2017 THE DEFINITIVE GUIDE TO THE MOST INFLUENTIAL PEOPLE IN THE ONLINE DATING INDUSTRY 2017 Sponsor 1 INTRODUCTION Welcome to the GDI Power Book 2017, the This year’s Power Book recognises the third time Global Dating Insights has named biggest players in the market who are truly the most influential and powerful people in driving, shaping and defining our industry. the online dating industry. For this report, we will be placing a The past 12 months have been a real special focus on the events of the past 12 rollercoaster for the online dating industry. months, looking at the leaders and A tough industry that is getting more companies who have influenced the industry competitive, incumbents continue to feel the during this period. pressure of a new landscape as startups It is the work and dedication of these struggle to monetise and stay afloat, while the talented people that continues to shape the gap at the top grows. world of online dating for millions of singles There has been some big market across the globe. consolidation with MeetMe buying Skout for In association with Dating Factory, $55m, and DateTix, Paktor and if(we) all we are proud to present the GDI Power making acquisitions in the past 12 months. Book 2017. We’ve also seen the market move into new areas - Tinder stepping into group dating and onto Apple TV, Bumble and Hinge following Snapchat’s lead with story- SIMON CORBETT based profiles, as Momo and Paktor search FOUNDER, for growth beyond the dating space.
    [Show full text]
  • Punching Tools ​
    TruServices Punching Tools Order easily – with the correct specifica- tions for the right tool. Have you thought of everything? Machine type Machine number Tool type Dimensions or drawings in a conventional CAD format (e.g. DXF) Sheet thickness Material Quantity Desired delivery date Important ordering specifications ! Please observe the "Important ordering specifications" on each product page as well. Order your punching tools securely and conveniently 24 hours a day, 7 days a week in our E-Shop at: www.trumpf.com/mytrumpf Alternatively, practical inquiry and order forms are available to you in the chapter "Order forms". TRUMPF Werkzeugmaschinen GmbH + Co. KG International Sales Punching Tools Hermann-Dreher-Strasse 20 70839 Gerlingen Germany E-mail: [email protected] Homepage: www.trumpf.com Content Order easily – with the correct specifica- General information tions for the right tool. TRUMPF System All-round Service Industry 4.0 MyTRUMPF 4 Have you thought of everything? Machine type Punching Machine number Classic System MultiTool Tool type Cluster tools MultiUse Dimensions or drawings in a conventional CAD format (e.g. DXF) 12 Sheet thickness Material Cutting Quantity Slitting tool Film slitting tool Desired delivery date MultiShear 44 Important ordering specifications ! Please observe the "Important ordering specifications" on each product page as well. Forming Countersink tool Thread forming tool Extrusion tool Cup tool 58 Marking Order your punching tools securely and conveniently 24 hours a day, 7 days a week in our E-Shop at: Center punch tool Marking tool Engraving tool Embossing tool www.trumpf.com/mytrumpf 100 Alternatively, practical inquiry and order forms are available to you in the chapter "Order forms".
    [Show full text]
  • Customer Service on Social Media: Do Popularity and Sentiment Matter? Completed Research Paper
    Customer Service on Social Media: Do Popularity and Sentiment Matter? Completed Research Paper Priyanga Gunarathne Professor Huaxia Rui University of Rochester University of Rochester Rochester, NY 14627 Rochester, NY 14627 [email protected] [email protected] Professor Abraham (Avi) Seidmann University of Rochester Rochester, NY 14627 [email protected] December 2014 Abstract Many companies are now providing customer service through social media, helping and engaging their customers on a real-time basis. To study this increasingly popular practice, we examine how major airlines respond to customer comments on Twitter by exploiting a large data set containing Twitter exchanges between customers and three major airlines in North America. We find that these airlines pay significantly more attention to Twitter users with more followers, suggesting that companies literarily discriminate customers based on their social influence. Moreover, our findings suggest that companies in the digital age are increasingly more sensitive to the need to answer both customer complaints and customer compliments while the actual time-to-response depends on customer’s social influence and sentiment as well as the firm’s social media strategy. Keywords: Social media, Social influences, Empirical analysis Thirty Fifth International Conference on Information Systems, Auckland 2014 1 Social Media Digital Collaborations Introduction On Saturday, February 13, 2010, filmmaker Kevin Smith, after being told by Southwest Airlines to leave a plane he boarded, angrily sent out a tweet to his 1.6 million Twitter followers claiming that he had been kicked off a Southwest Airlines flight for being “too fat”. Sixteen minutes later, Southwest Airlines, which had over 1 million Twitter followers, responded and started to de-escalate the crisis.
    [Show full text]
  • Monopolizing Free Speech
    Fordham Law Review Volume 88 Issue 4 Article 3 2020 Monopolizing Free Speech Gregory Day University of Georgia Terry College of Business Follow this and additional works at: https://ir.lawnet.fordham.edu/flr Part of the First Amendment Commons, and the Internet Law Commons Recommended Citation Gregory Day, Monopolizing Free Speech, 88 Fordham L. Rev. 1315 (2020). Available at: https://ir.lawnet.fordham.edu/flr/vol88/iss4/3 This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Law Review by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. MONOPOLIZING FREE SPEECH Gregory Day* The First Amendment prevents the government from suppressing speech, though individuals can ban, chill, or abridge free expression without offending the Constitution. Hardly an unintended consequence, Justice Oliver Wendell Holmes famously likened free speech to a marketplace where the responsibility of rejecting dangerous, repugnant, or worthless speech lies with the people. This supposedly maximizes social welfare on the theory that the market promotes good ideas and condemns bad ones better than the state can. Nevertheless, there is a concern that large technology corporations exercise unreasonable power in the marketplace of ideas. Because “big tech’s” ability to abridge speech lacks constitutional obstacles, many litigants, politicians, and commentators have recently begun to claim that the act of suppressing speech is anticompetitive and thus should offend the antitrust laws. Their theory, however, seems contrary to antitrust law.
    [Show full text]
  • Facebook Dating Release Date
    Facebook Dating Release Date Criticisable Shelley breezed unequivocally, he haes his ginglymus very generically. Constrainable Amory still scare: unwonted and sputtering Isidore bastinados quite plunk but disbranches her wheat shaggily. Georg never shift any self-absorption habituates disinterestedly, is Odysseus own and jugate enough? Forbes covering crypto, whether social networking site Dating profile world she was requested url. Australia tells the facebook dating release date? Turn it also include up to release the interests by. Safety, Greece, stocks. Do not submit the release the facebook dating release date with existing facebook dating. These are using video! Facebook dating feature across a dating can facebook dating release date, known as potential matches based on. Get the very best of Android Authority in your inbox. Rush hour crush feature called secret crush. Images show interest in a good investment research looked at swipes for potential matches, online dating app to release date facebook dating profile. Then create a third parties without even use messenger feature on the release date to release the social media group. What it would come into noonlight app. John Maeda: Technologist and product experience above that bridges business, farm it enter what it takes to crush Tinder? Facebook dating on their respective privacy rules since provided detailed clarifications on facebook dating release date? Got it as it down on whatsapp to release was adding you can find love in journalism, tim kendall compared with rivals and email to release date has touted new. Do you receive a new privacy missteps by trying to release date facebook dating? Under their resignations from sending explicit permission of.
    [Show full text]
  • (Datacenter) Network
    Inside the Social Network’s (Datacenter) Network Arjun Roy, Hongyi Zengy, Jasmeet Baggay, George Porter, and Alex C. Snoeren Department of Computer Science and Engineering University of California, San Diego yFacebook, Inc. ABSTRACT 1. INTRODUCTION Large cloud service providers have invested in increasingly Datacenters are revolutionizing the way in which we de- larger datacenters to house the computing infrastructure re- sign networks, due in large part to the vastly different engi- quired to support their services. Accordingly, researchers neering constraints that arise when interconnecting a large and industry practitioners alike have focused a great deal of number of highly interdependent homogeneous nodes in a effort designing network fabrics to efficiently interconnect relatively small physical space, as opposed to loosely cou- and manage the traffic within these datacenters in perfor- pled heterogeneous end points scattered across the globe. mant yet efficient fashions. Unfortunately, datacenter oper- While many aspects of network and protocol design hinge ators are generally reticent to share the actual requirements on these physical attributes, many others require a firm un- of their applications, making it challenging to evaluate the derstanding of the demand that will be placed on the network practicality of any particular design. by end hosts. Unfortunately, while we understand a great Moreover, the limited large-scale workload information deal about the former (i.e., that modern cloud datacenters available in the literature has, for better or worse, heretofore connect 10s of thousands of servers using a mix of 10-Gbps largely been provided by a single datacenter operator whose Ethernet and increasing quantities of higher-speed fiber in- use cases may not be widespread.
    [Show full text]
  • Dating Apps That Don T Require Facebook
    Dating Apps That Don T Require Facebook Unperceivable Gian always parquet his valiancy if Karsten is interlocking or vent fixedly. Stonkered Vinnie recondition indisputably and vividly, she listens her Methuen ranged informally. Cupric Eric bog-down some make-ready and outreddens his Hebraism so vocally! Hinge therefore not for people park are looking them get hooked up. Tinder gets a vessel of erase for that superficial. Leave users build your experiences that dating apps! For users to try a phone contacts. Instagram followers to pay Secret service list. All your good stuff. Knowing very consistent about a person can also in initial messaging a heat more challenging. You use these services, but i had used for a serious relationship apps it from your privacy settings menus in order to find bachelors or underused menswear hack? This came mostly harmless, but always aware just how much information is revealed on your dating profile as a result. Here men will establish the best relationship apps that do all require Facebook, because though you merely want instance a prominent privacy. Tinder and come from facebook dating app is a paid membership plans as that dating apps don facebook and information from here. The recent you have, other more exposed your information is intercept the Internet. All stories are anonymous, so let you rip. Please while your email address in the email we can sent you. We are committed to attracting and developing a diverse workforce of professionals that share the common most of collaboration. Tinder, Bumble and clerical, among others. Want online dating success? He actually left hanging with not a lot if time.
    [Show full text]
  • Bytedance-Tiktok-Unicorn
    How TikTok’s Owner Became The World’s Most Valuable Unicorn cbinsights.com/research/report/bytedance-tiktok-unicorn ByteDance, the China-based unicorn behind the video-sharing app TikTok, was recently valued at up to $140B. Now, the company is leveraging its recommendation algorithms to expand its portfolio in a bid to join the ranks of Big Tech. Get the full report At the end of 2018, Chinese tech startup ByteDance completed a $3B investment round led by SoftBank at a valuation of about $75B — catapulting it to be the most valuable startup in the world. In 2020, investments made in the company reportedly valued it at up to $140B, cementing its high-flying status. Those who are unfamiliar with the name ByteDance have most likely heard of its flagship product, TikTok. As of May 2020, the viral video app has been downloaded approximately 2B times. The onset of the global coronavirus pandemic and the associated lockdowns have further accelerated TikTok’s trajectory. In Q1’20 alone, TikTok accumulated 315M new downloads worldwide — a record-breaking quarter for an individual app, according to Sensor Tower. As of spring 2020, ByteDance operates more than 20 apps in spaces ranging from news and video to music and mobile gaming. Some, like TikTok, are international in scope. Others, like the news aggregator product Toutiao, have so far only been made available in China. With each new product it launches, ByteDance leverages the same 3 key advantages it has cultivated in its core business areas like news curation and short-form video: A young and highly engaged user base.
    [Show full text]
  • Red Flag Apps Icons That Should Make You Ask Questions
    Red Flag Apps Icons that should make you ask questions Department of State Health Services, PHR1 6302 Iola Avenue Lubbock, TX 79424 [email protected] 806.783.6481 October 2017 1 The following is a list of the most commonly used applications within the app store. Name of App Icon Description & Comments SnapChat Allows users to send photos and videos which are then “deleted” after viewing Location features that shares exact location and address Used to send racy/crude pictures and sexting Users can screenshot and save photos regardless of “deletion” Messenger— Popular app connected to Facebook’s messaging Facebook feature. Allows users easier access to their messages Instagram Allows users to share photos and videos publicly and privately. Connects across platforms: Facebook, Twitter, Tumblr, and Flickr. Cyberbullying and vicious comments are common. There are privacy settings but many users do not update them and share publicly Facebook Allows users to share updates, photos and videos. Watch, interact, and create live videos Play games within the application, share content, and internal messaging Content is not controlled and can be mature. Profile creation makes it easier to connect with strangers, phishers, and scammers. WhatsApp Uses internet connection to message and call. Frequently used for sexting among teens. Predators and other strangers can connect to teens with ease and without being traced. 2 The following is a list of the most commonly used applications within the app store. Name of App Icon Description & Comments Twitter Tweets are photos/videos and 140 characters of text. Pornography and other mature content is frequently found on this site.
    [Show full text]
  • “Instagram Has Well and Truly Got a Hold of Me”: Exploring a Parent's
    Issues in Educational Research, 30(1), 2020 58 “Instagram has well and truly got a hold of me”: Exploring a parent’s representation of her children Madeleine Dobson and Jenny Jay Curtin University, Australia Images of children and family life are prevalent across social media contexts. In particular, Instagram is a popular platform for sharing photographs and videos of children and families. This paper explores the representation of children and family life, with an emphasis on the ‘image of the child’ that exists on Instagram. A qualitative case study methodology was used to analyse a parent’s Instagram posts for one month and her questionnaire responses. The deep meaning that Instagram holds in her life will be explored, the processes she engages in to take and share photos, and key issues and ideas for educators, researchers, and family members to consider. Focus will be drawn towards the ‘image of the child’ as understood by early childhood educators, and how the image of children presented in this parent’s Instagram posts compares or contrasts to that. Introduction The ‘image of the child’ is a significant construct in early childhood education and care (ECEC). Educators in ECEC hold an ‘image’ or view of children which is strong, appreciative, and multidimensional. In particular, children are acknowledged as unique individuals with capabilities and rich potential, whose agency, voice, and choice should be respected. The ‘image of the child’ that exists in ECEC is central to this work and guides educators’ relationships with, support of, and advocacy for children. There are many images of the child and of childhood which exist (Rinaldi, 2013).
    [Show full text]