Social Media Self Defence and Privacy Workshops

Total Page:16

File Type:pdf, Size:1020Kb

Social Media Self Defence and Privacy Workshops Social Media Self-Defence and Privacy Workshop Ed Yuwono - CryptoAustralia Who am I? • Information Security strategist (by day) • Director of Strategy CryptoAustralia (by night) • Blue Team/Defensive background • Based in Europe • Perpetual Traveller Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 2 Disclaimer • Please, please, please don't use material from this workshop to violate moral, ethical & legal norms • Views presented within are my own Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 3 Agenda/Objectives • Social Media Privacy Basics • Threats to privacy • Defensive options in everyday life • Q & A Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 4 In case you missed it Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 5 What does Zuck have to say? • Source (April 10th 2018): https://www.washingtonpost.com/news/the- switch/wp/2018/04/10/transcript-of-mark-zuckerbergs-senate- hearing/ Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 6 Basic privacy tenets • Individual: your physical and non physical traits (eg: memories, emotions, secrets) • Privacy protects your traits • There is no 'undo‘, a disclosed secret is perpetually public • Privacy important enough for the EU to declare as a basic human right Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 7 Speaking of EU GDPR… • Apr 19th • https://www.theguardian.com/technology/2018/apr/19/facebook- moves-15bn-users-out-of-reach-of-new-european-privacy-law Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 8 No ‘one size fits all’ • Some of you: • would like to remain private • maintain a reputation in the workplace • require a public presence • Strike a balance between personal life and your public image • Protect your • Assets • Reputation • Right for privacy Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 9 Defending against levels of ‘adversary’ BAD GOOD • Curious minds • Bad software apps/Artificial Intelligence • Unethical/immoral practices • Declared Enemies • Illegal acts • Nation states Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 10 Your adversary's motives • Progressing to an age where wealth is: • No longer physical • eg: cash vs card vs crypto currencies • Generated from information ‘on tap’ • eg: online ‘everything’: research, trading, betting,… • Your personal worth • Tangible: financial • Intangible: knowledge, status, reputation • What happens to you if your adversary steals, disputes, manipulates, block access to your information? Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 11 Adversarial Success • Success=ability to execute to completion • Ability to execute=capability x resources x time • Attainable knowledge (capability) • Cheaper computing power & access to information (resources) • The side with the most motivation & time will win • However, if you can exhaust one or more of the three elements, life will be hard for your adversary Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 12 Knowledge is power • You can deduce someone's: • Social status • Personal, Social, Public • Reputation • Social, Public • Net worth, purchasing potential, risk appetite • Personal, Public, Location • Movement • Personal, Location Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 13 The Age of Social Networks • Provide opportunity for data enrichment • Open Source Intelligence (OSINT) is a discipline • Case study Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 14 Who is watching the watchers? • Apr 19th • https://www.bloomberg.com/features/2018-palantir- peter-thiel/ Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 15 I have nothing to hide • Apr 19th • https://www.bloomberg.com/features/2018-palantir- peter-thiel/ Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 16 Ground Rules • Don’t feed the system (use archives/takeouts) • Look for • Personally Identifiable Information (PII) • Name, phone, address, work, gov ID, financials • Passwords/password reset messages! • Expletives • ‘Not Safe For Work’ (NSFW) • Anything personal/incriminating • Tested with a browser, might work with a mobile app • Small pauses Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 17 Countermeasures: Prevention • Behaviour: If it’s something you can’t say on TV, don’t post it • Platform: Check and cover any holes you might expose Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 18 Triage • ‘Stop the bleeding’ • Revisit what you have posted • Remember, not one size fits all • Find your balance • Search & destroy: selective delete • Nuke: wipe everything (sometimes easier to delete account) Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 19 Remediation • Someone is using your information • Horse has bolted • Limit further damage • Legal • Procedural Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 20 LinkedIn: Prevention • This is your professional persona • Assume your work colleague is looking • Manage your passwords!!! • Got an account before 2012? • Have I been pwned • https://haveibeenpwned.com/ Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 21 LinkedIn: Prevention • Import your contacts – think twice • Web/Mobile app • Are you using a personal/BYOD phone or personal email address? • Avoid importing your email/phone contacts • Spammy, sends out invites to everyone it discovers! • Working in a sensitive role? • Stay off LinkedIn/all social media • Use an alias • Your employer may have policy or guidelines Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 22 LinkedIn: Prevention • Settings & Privacy-Account: • Removing email/phone numbers • Microsoft (Applications) • Permitted Services (Applications) • Settings & Privacy-Privacy: • Edit your public profile (Search engines) • Who can see your Email address • Who can see your Connections • Last name • Representing your organisation (company policy?) Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 23 LinkedIn: Prevention • Settings-Privacy (continued): • Profile visibility off LinkedIn • Manage Active Status • Discover from email/phone number (FB did this!) • Sync contacts • Others: • Profile • Contact Info-Date of Birth-Visible to: Only you Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 24 LinkedIn: Triage • Takeout • Interesting items • Ad Targeting • Connections • Comments • Imported Contacts • Logins • Messages • Receipts • Registration • Search Queries • Security Challenges • Job Applications Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 25 LinkedIn: Triage • Social Profiling • Connections • Name, Email, Company, Position, Connected date • Imported Contacts • From your email or phone contacts! • Name, Company, Title, Email, Phone, Created, IM handle, Address • Messages • From, To, Date, Subject, Content Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 26 LinkedIn: Triage • Public Profiling • References • Endorsements • Comments • Group comments • Group Posts • Likes • Shares • Articles Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 27 LinkedIn: Triage • Personal Profiling • Profile • Ad Targeting • Ads Clicked • Job Applications • Messages • Search Queries • Applications Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 28 LinkedIn: Triage • Location Profiling • Logins • Profile • Receipts • Registration • Security Challenges Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 29 LinkedIn: Triage • Imported Contacts • My Network-’See All’-Manage synced and imported contacts-Imported • https://www.linkedin.com/mynetwork/contacts/imported • Select All-Delete (This does not delete your connections, only information stored on LinkedIn) Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 30 LinkedIn: Triage – Search & Destroy • Posts/Comments/Likes • Me-Posts & Activity-Posts or All Activity • Messages • Search for person and delete thread • Deletes entire thread! • https://www.linkedin.com/help/linkedin/answer/4 20/deleting-a-conversation • Job Applications • Jobs-Applied Jobs-Delete Job Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 31 LinkedIn: Triage – Search & Destroy • Search History • Click in Search bar • Wait • Click on ‘Clear’ Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 32 LinkedIn: Triage - Nuke • Close your Linkedin Account • Me-Settings & Privacy-Account-Account Management-Closing your LinkedIn Account • https://www.linkedin.com/psettings/acco unt-management/close-action-needed • You must downgrade to the Basic plan first • If you paid, you lose your credits Social Media Self-Defence and Privacy Workshop | OIC Qld PAW May 2018 | Ed Yuwono 33 Facebook: Prevention • Your personal persona • Exception: people in the personal/lifestyle industry • eg: fitness, home, health, etc • A higher level of engagement is required
Recommended publications
  • Pardot Pro Features Overview Extra Bells & Whistles That Will Get You More Sales & Leads
    Pardot Pro Features Overview Extra bells & whistles that will get you more sales & leads A Pardot Client Advocate Topical Office Hours Clare Kelly EMEA Client Advocate Pardot, Salesforce The Client Advocates help our customers achieve their marketing goals by providing Pardot strategy, marketing automation best practices, and industry trends. Next topical session: ‘Game Changer: 3 strategies to shorten your buyer journey’ Friday 15th April, 6pm GMT (register for recording) Check our calendar for all upcoming sessions! http://www2.pardot.com/advocates The Pardot Client Advocates Adam Waid Ginny Richardson Nicole Conley Molly Morris Futrell Kylie Nickles Richard Lewis Hannah Freeman Camille Barnet Dane McKinley Lindsay Stanford Caitlin Clark Howell Jazmyne Dodd Cristi Moscoso Paymaun “P$” Rezai Rob Valdez Jessica Williams Ami Kamei Jessica Marsh Cole McIntyre Virginia Baaklini Clare Kelly Leigh Falgoust David DiGiammarino Samantha Pang Whitney Rudeseal Pro Features Overview Businesses that personalize web With Pardot Pro Edition, you have access to: experiences see an average 19% ● Advanced Dynamic Content (avail as increase in sales. separate add on to Standard) ● Multivariate Landing Page Testing (addon) (MarketingProfs) ● Email A/B Testing (only Pro & Ultimate) ● Advanced Email Analytics + Email Rendering and Preview Analysis (addon) ● Google Adwords Connector (addon) ● Chat Support ● Social Profiling & Lookups (addon) ● Increased file storage, more SEO keyword and competitor monitoring ● Unlimited emails per month ● 10,000 mailable contacts ● File Hosting: 500 MB (standard 100MB) Advanced Testing Pro and Ultimate accounts have access to: ● AB Testing for emails ● Multivariate Testing for Landing Pages ● Advanced Email Analytics (Rendering and Spam Analysis) AB Email Testing AB Testing for emails allows you to change elements in your email, segment your recipient list into a test audience and winning audience, and then use the email’s engagement data to automatically determine and distribute the winning email.
    [Show full text]
  • Pattern Discrimination PATTERN
    Apprich, Chun, Cramer, Steyerl Pattern Discrimination Pattern PATTERN DISCRIMINATION APPRICH CHUN CRAMER STEYERL Pattern Discrimination IN SEARCH OF MEDIA Götz Bachman, Timon Beyes, Mercedes Bunz, and Wendy Hui Kyong Chun, Series Editors Communication Machine Markets Pattern Discrimination Remain Pattern Discrimination Clemens Apprich, Wendy Hui Kyong Chun, Florian Cramer, and Hito Steyerl IN SEARCH OF MEDIA University of Minnesota Press Minneapolis London meson press In Search of Media is a joint collaboration between meson press and the University of Minnesota Press. Bibliographical Information of the German National Library The German National Library lists this publication in the Deutsche Nationalbibliografie (German National Bibliography); detailed bibliographic information is available online at portal.d-nb.de. Published in 2018 by meson press (Lüneburg, Germany ) in collaboration with the University of Minnesota Press (Minneapolis, USA). Design concept: Torsten Köchlin, Silke Krieg Cover image: Sascha Pohflepp ISBN (PDF): 978-3-95796-145-7 DOI: 10.14619/1457 The digital edition of this publication can be downloaded freely at: meson.press. The print edition is available from University of Minnesota Press at: www.upress.umn.edu. This Publication is licensed under CC-BY-NC-4.0 International. To view a copy of this license, visit: creativecommons.org/ licenses/by-nc/4.0/ Contents Series Foreword vii Introduction ix Clemens Apprich [ 1 ] A Sea of Data: Pattern Recognition and Corporate Animism (Forked Version) 1 Hito Steyerl [ 2 ] Crapularity Hermeneutics: Interpretation as the Blind Spot of Analytics, Artificial Intelligence, and Other Algorithmic Producers of the Postapocalyptic Present 23 Florian Cramer [ 3 ] Queerying Homophily 59 Wendy Hui Kyong Chun [ 4 ] Data Paranoia: How to Make Sense of Pattern Discrimination 99 Clemens Apprich Authors 123 Series Foreword “Media determine our situation,” Friedrich Kittler infamously wrote in his Introduction to Gramophone, Film, Typewriter.
    [Show full text]
  • PROTECTING MY PERSONAL SPACE User Perceptions
    PROTECTING MY PERSONAL SPACE Devan S Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age. A social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Social network security and privacy issues result from the large amounts of information these sites process each day. Features that invite users to participate in messages, invitations, photos, open platform applications and other applications are often the venues for others to gain access to a user's private information. In addition, the technologies needed to deal with user's information may intrude their privacy. The advent of the Web 2.0 has caused social profiling and is a growing concern for internet privacy.
    [Show full text]
  • Time-Aware Egocentric Network-Based User Profiling
    Open Archive TOULOUSE Archive Ouverte ( OATAO ) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited version published in : http://oatao.univ-toulouse.fr/ Eprints ID : 15356 The contribution was presented at ASONAM 2015 : http://asonam.cpsc.ucalgary.ca/2015/ To cite this version : Canut, Marie-Françoise and On-At, Sirinya and Péninou, André and Sèdes, Florence Time-aware Egocentric network-based User Profiling. (2015) In: 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2015), 25 August 2015 - 28 August 2015 (Paris, France). Any correspondence concerning this service shoul d be sent to the repository administrator: staff -oatao@listes -diff.inp -toulouse.fr Time-aware Egocentric network-based User Profiling Marie-Françoise Canut, Sirinya On-At, André Péninou and Florence Sèdes IRIT, University of Toulouse, UMR CNRS 5505, 31062 TOULOUSE Cedex 9 {marie-francoise.canut, sirinya.on-at, andre.peninou, florence.sedes}@irit.fr Abstract — Improving the egocentric network-based user’s In this work, we focus on taking into account the profile building process by taking into account the dynamic evolution of user’s interests in social network-based user characteristics of social networks can be relevant in many profiling process in order to build a more relevant and up-to- applications. To achieve this aim, we propose to apply a time- date social profile. We try to answer the following problems: aware method into an existing egocentric-based user profiling (i) how to select the relevant individuals in the user social process, based on previous contributions of our team.
    [Show full text]
  • Social Measurement Depends on Data Quantity and Quality
    POINT OF VIEW SOCIAL MEASUREMENT DEPENDS ON DATA QUANTITY AND QUALITY Social Measurement Depends on Data Quantity and Quality As social platforms proliferate, enthusiastic users are generating more data than ever. Social media data are fast becoming the hottest commodity in market research. But can social data yield measurements that are comparable to those from other, more established The future of actionable forms of research? Is it really possible for brand managers to tap into these data streams to gain social media measurement insight into brand equity? is only as strong as its We believe it is too early to say for sure, even standards for data quality. though social data have been used effectively by PR and marketing departments for years. Anne Czernek For crisis management and on-the-fly campaign brands and more than 30 million online conversations Senior Research Analyst assessments, social monitoring involves to determine the most appropriate methodologies Emerging Media Lab Millward Brown/Dynamic Logic watching a wide stream of updates in real time for working with social measurement from a brand and using those to gauge immediate next steps. perspective. Our conclusion? The future of actionable For these purposes, a qualitative sense of the social media measurement is only as strong as its consumer mood is adequate; the precision of standards for data quality. quantitative research is not required. THE “SOCIAL” VOICE: HOW IS But increasingly, insight and brand strategy teams IT DIFFERENT? are interested in using social data, and they would like to place social measurement alongside other Social data are fundamentally different from types of brand metrics (attitudinal, behavioral, and traditional brand measurement data.
    [Show full text]
  • The Complete Guide to Marketing Attribution
    The Complete Guide to Marketing Attribution A MARKETER’S GUIDE TO REBUILDING MARKETING ATTRIBUTION www.queryclick.com Contents 04 Marketing attribution: the basics 09 Marketing attribution models explained The problem with current attribution 15 solutions Why your data is the foundation for your 18 attribution success Marketing attribution: a guide to your 26 choices A new approach to attribution: visit-level 33 attribution The powerful data views you need to 38 accurately drive marketing ROI 40 Closing thoughts ATTRIBUTION PLAYBOOK 3 The purpose of attribution is deceptively In this guide, we are going to take a close Overview simple: to most fairly share the value of a goal look at some of the key aspects of attribution conversion across all touchpoints that may including: have influenced that conversion. However, in the real world the complexity of touchpoints • What marketing attribution actually is and media opportunities in marketing create • Why it matters more now than ever an attribution challenge, even in a perfect • An introduction to the main attribution world of data availability. models including some of their limitations The customer journey is now very often • Why data is key to all of this – and some of a highly complex one. And being able to the challenges and opportunities around attribute the impact of specific marketing collecting data across websites, offline touchpoints is crucial, as pressure from media, social platforms and CRM/CDP/ERP internal stakeholders - including finance and • How techniques like Machine Learning and the boardroom - to link marketing to revenue, Deterministic and Probabilistic matching and prove ROI intensifies. Unravelling the can help overcome limitations in current impact of specific touchpoints on conversion attribution approaches is priority number 1 for marketers.
    [Show full text]
  • Approaching the Meaning of Measurement in the Digital Everyday
    MCS0010.1177/0163443720907017Media, Culture & SocietyBolin and Velkova 907017research-article2020 Main Article Media, Culture & Society 2020, Vol. 42(7-8) 1193 –1209 Audience-metric continuity? © The Author(s) 2020 Approaching the meaning of Article reuse guidelines: sagepub.com/journals-permissions measurement in the digital https://doi.org/10.1177/0163443720907017DOI: 10.1177/0163443720907017 everyday journals.sagepub.com/home/mcs Göran Bolin Södertörn University, Sweden Julia Velkova University of Helsinki, Finland Abstract This article argues for an expansion of existing studies on the meaning of metrics in digital environments by evaluating a methodology tested in a pilot study to analyse audience responses to metrics of social media profiles. The pilot study used the software tool Facebook Demetricator by artist Ben Grosser in combination with follow-up interviews. In line with Grosser’s intentions, the software indeed provoked reflection among the users. In this article, we reflect on three kinds of disorientations that users expressed, linked to temporality, sociality and value. Relating these to the history of audience measurement in mass media, we argue that there is merit in using this methodology for further analysis of continuities in audience responses to metrics, in order to better understand the ways in which metrics work to create the ‘audience commodity’. Keywords audience measurement, audiences, digital media, disruptive methods, everyday life, metrics Introduction Digital ‘media life’ (Deuze, 2012) is increasingly permeated by metrics. Social media platforms, apps and personal gadgets quantify an ever-expanding array of social life that has ‘never been quantified before – friendships, interests, casual conversations, Corresponding author: Göran Bolin, Department of Media & Communication Studies, Södertörn University, SE-14189 Huddinge, Sweden.
    [Show full text]
  • Social Media Strategy in the Chinese Market
    Social Media Strategy in the Chinese Market - Weibo Platform Case Study Anna Ivanova & Yunchun Wang Department of Business Studies Master thesis Spring 2014 Supervisors: Anna Bengtson & Susanne Åberg Abstract Problematisation Previous study has indicated that social media is an effective marketing tool. Moreover, Weibo, a Chinese social network contains large potential for the companies. However little theoretical guidance exists on what are the key features of Weibo marketing. Purpose and research question The purpose of this study contributes to a better understanding of the social media by analyzing the advantages and disadvantages of Weibo for Western companies that expect to launch a successful marketing strategy. Methodology This research is done through qualitative approach and is of an abductive nature . It uses a case-study methodology and relying on empirical data and theoretical conceptions. The main empirical findings are based on collection of 13 personal interviews. Results and conclusion The result of this paper contributed to deep understanding of Weibo marketing. Therefore, the theoretical guideline in form of model has been developed and includes 8 key features (4 advantages and 4 disadvantages) that should be considered by Western companies in order to apply successful marketing strategy on Weibo. Key words Web 2.0, Social media marketing, Sina Weibo, China, Digital marketing 2 Contents Abstract ....................................................................................................................................
    [Show full text]
  • Predicting User Interaction on Social Media Using Machine Learning Chad Crowe University of Nebraska at Omaha
    University of Nebraska at Omaha DigitalCommons@UNO Student Work 11-2018 Predicting User Interaction on Social Media using Machine Learning Chad Crowe University of Nebraska at Omaha Follow this and additional works at: https://digitalcommons.unomaha.edu/studentwork Part of the Computer Sciences Commons Recommended Citation Crowe, Chad, "Predicting User Interaction on Social Media using Machine Learning" (2018). Student Work. 2920. https://digitalcommons.unomaha.edu/studentwork/2920 This Thesis is brought to you for free and open access by DigitalCommons@UNO. It has been accepted for inclusion in Student Work by an authorized administrator of DigitalCommons@UNO. For more information, please contact [email protected]. Predicting User Interaction on Social Media using Machine Learning A Thesis Presented to the College of Information Science and Technology and the Faculty of the Graduate College University of Nebraska at Omaha In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Chad Crowe November 2018 Supervisory Committee Dr. Brian Ricks Dr. Margeret Hall Dr. Yuliya Lierler ProQuest Number:10974767 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. ProQuest 10974767 Published by ProQuest LLC ( 2019). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC.
    [Show full text]
  • Author Profiling in Social Media with Multimodal Information X
    Author Profiling in Social Media with Multimodal Information By: Miguel Ángel Álvarez Carmona A dissertation submitted in partial fulfillment of the requirements for the degree of: PH.D. IN COMPUTER SCIENCE at Instituto Nacional de Astrofísica, Óptica y Electrónica March, 2019 Tonantzintla, Puebla Supervised by: PhD. Luis Villaseñor Pineda, INAOE PhD. Esaú Villatoro Tello, UAM-C c INAOE 2019 All rights reserved The author grants to INAOE the right to reproduce and distribute copies of this dissertation Abstract Determine aspects of a person as gender, age, residency, occupation, among others, through his/her texts is a task that is part of the natural language processing and is known as author profiling. In this thesis work, we propose a solution for the task of profiling authors in social networks. Our solution uses a multimodal approach to extracting information from written messages and images shared by users. Previous work has shown the existence of useful information for this task in these modalities; however, our proposal goes further demonstrating the complementarity of the modalities when merging these two sources of information. To do this, we propose to map images in a text, and with that, to have the same framework of representation through which to achieve the fusion of information. Our work explores different methods for extracting information either from the text or from the images. To represent the textual information, different distributional term representations approaches were explored in order to identify the topics addressed by the user. For this purpose, an evaluation framework was proposed in order to identify the most appropriate method for this task.
    [Show full text]
  • Salience and Market-Aware Skill Extraction for Job Targeting
    Salience and Market-aware Skill Extraction for Job Targeting Baoxu Shi Jaewon Yang LinkedIn Corporation, USA LinkedIn Corporation, USA [email protected] [email protected] Feng Guo Qi He LinkedIn Corporation, USA LinkedIn Corporation, USA [email protected] [email protected] ABSTRACT At LinkedIn, we want to create economic opportunity for every- one in the global workforce. To make this happen, LinkedIn offers a reactive Job Search system, and a proactive Jobs You May Be Interested In (JYMBII) system to match the best candidates with their dream jobs. One of the most challenging tasks for developing these systems is to properly extract important skill entities from job postings and then target members with matched attributes. In this work, we show that the commonly used text-based salience and Figure 1: Snippet of a machine learning engineer job posted market-agnostic skill extraction approach is sub-optimal because it on LinkedIn. Squared text are detected skill mentions. only considers skill mention and ignores the salient level of a skill and its market dynamics, i.e., the market supply and demand influ- ence on the importance of skills. To address the above drawbacks, job postings to quality applicants who are both qualified and will- we present Job2Skills, our deployed salience and market-aware skill ing to apply for the job. To serve this goal, LinkedIn offers two job extraction system. The proposed Job2Skills shows promising re- targeting systems, namely Jobs You May Be Interested In (JYM- sults in improving the online performance of job recommendation BII) [13], which proactively target jobs to the quality applicants, (JYMBII) (+1:92% job apply) and skill suggestions for job posters and Job Search [19], which reactively recommend jobs that the job (−37% suggestion rejection rate).
    [Show full text]
  • User-Based Information Search Across Multiple Social Media —" Marte Lise Gåre INF-3981 Master’S Thesis in Computer Science - June 2015
    ! Faculty of Science and Technology ! Department of Computer Science ! User-Based Information Search across Multiple Social Media —" Marte Lise Gåre INF-3981 Master’s Thesis in Computer Science - June 2015 i Abstract Most of todays Internet users are registered to one or more social media applications. As so many are registered to multiple application, it has become difficult to locate friends, former colleagues, peers and acquaintances. Reasons for this include private profiles, name collisions, multiple usernames, lack of profile attributes and profile picture. The system designed and implemented in this thesis enable automatic user-based information search across multiple social media without relying on explicit user account registration as a basis for combining information. It uses information from a posting on a social media site to find a specific user on multiple other social media. Twitter is used as a starting point where the end-user can choose a tweet of interest, press the tweet and automatically be presented with information about the author of the tweet, including profiles on other social media. The application was tested and evaluated by running tweets from a set of 100 Twitter users, where 14 of these were public figures, through the system and documenting the results. ii iii Acknowledgements I would like to thank my supervisor Professor Randi Karlsen for her guidance, feedback, ideas and advice during all stages of this thesis. It has been great working with you and I really appreciate your feedbacks. Further I would like to thank my classmates for 5 great years of study. I wish you all the best of luck in the future.
    [Show full text]