Bias Misperceived: the Role of Partisanship and Misinformation in Youtube Comment Moderation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Moderated Mediation Analysis: a Review and Application to School Climate Research
Practical Assessment, Research, and Evaluation Volume 25 Article 5 2020 Moderated Mediation Analysis: A Review and Application to School Climate Research Kelly D. Edwards University of Virginia Timothy R. Konold University of Virginia Follow this and additional works at: https://scholarworks.umass.edu/pare Part of the Educational Assessment, Evaluation, and Research Commons, Educational Methods Commons, and the Social Statistics Commons Recommended Citation Edwards, Kelly D. and Konold, Timothy R. (2020) "Moderated Mediation Analysis: A Review and Application to School Climate Research," Practical Assessment, Research, and Evaluation: Vol. 25 , Article 5. Available at: https://scholarworks.umass.edu/pare/vol25/iss1/5 This Article is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Practical Assessment, Research, and Evaluation by an authorized editor of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. Moderated Mediation Analysis: A Review and Application to School Climate Research Cover Page Footnote We thank members of our research team including Dewey Cornell, Anna Grace Burnette, Brittany Zellers Crowley, Katrina Debnam, Francis Huang, Yuane Jia, Jennifer Maeng, and Shelby Stohlman. This project was supported by Grant #NIJ 2017-CK-BX-007 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Surveying was conducted in collaboration with the Center for School and Campus Safety at the Virginia Department of Criminal Justice Services. The opinions, findings, and conclusions or ecommendationsr expressed in this report are those of the authors and do not necessarily reflect those of the U.S. -
Mediation and Moderation Analyses with R
Mediation and Moderation Analyses with R Stephen D. Short Saturday, February 28, 2015 Stephen D. Short (College of Charleston) Mediation and Moderation Analyses with R Saturday, February 28, 2015 1 / 25 Overview Mediation analysis in R Simple mediation model example Multiple mediator model example Moderation analysis in R Continuous moderator model example Simple slope figures Tips For slides and code please visit http://stephendshort.wix.com/psyc Stephen D. Short (College of Charleston) Mediation and Moderation Analyses with R Saturday, February 28, 2015 2 / 25 Mediation Occurs when the effect of one variable (X) on another variable (Y) “passes through” a third variable (M) M = a0 + aX + eM 0 Y = b0 + bM + c X + ey The indirect effect is quantified as ab Stephen D. Short (College of Charleston) Mediation and Moderation Analyses with R Saturday, February 28, 2015 3 / 25 Notable Mediation Packages Available in R R packages for mediation analyses BayesMed (Nuijten, Wetzels, Matzke, Dolan, & Wagenmakers, 20015) bmem (Zhang & Wang, 2011) mediation (Tingley, Yamamoto, Hirose, Keele, & Imai, 2014) powerMediation (Qui, 2015) RMediation (Tofighi & MacKinnon, 2010) Functions within other packages mediate () in psych package (Revelle, 2012) mediation () in MBESS package (Kelley & Lai, 2012) Note. This is not a complete list, but merely suggestions for social science researchers Stephen D. Short (College of Charleston) Mediation and Moderation Analyses with R Saturday, February 28, 2015 4 / 25 Example 1: Data From Pollack, VanEpps, & Hayes (2012) Also example data in Hayes (2013) mediation text Does economic stress (X) lead to a desire to withdraw from small business (Y), as a result of negative affect (M)? N = 262 small business owners X = estress (1-7 Likert scale) M = affect (1-5 Likert scale) Y = withdraw (1-7 Likert scale) Example data available from www.afhayes.com Stephen D. -
Setting the Record Straighter on Shadow Banning
Setting the Record Straighter on Shadow Banning Erwan Le Merrer, Benoˆıt Morgan, Gilles Tredan,´ Univ Rennes, Inria, CNRS, Irisa IRIT/ENSHEEIT LAAS/CNRS [email protected] [email protected] [email protected] Abstract—Shadow banning consists for an online social net- happens on the OSN side, collecting information about po- work in limiting the visibility of some of its users, without them tential issues is difficult. In this paper, we explore scientific being aware of it. Twitter declares that it does not use such approaches to shed light on Twitter’s alleged shadow banning a practice, sometimes arguing about the occurrence of “bugs” to justify restrictions on some users. This paper is the first to practice. Focusing on this OSN is crucial because of its central address the plausibility of shadow banning on a major online use as a public communication medium, and because potential platform, by adopting both a statistical and a graph topological shadow banning practices were recently commented. approach. Shadow banning and moderation techniques. shadow banning We first conduct an extensive data collection and analysis (SB or banning for short, also known as stealth banning [6]) campaign, gathering occurrences of visibility limitations on user profiles (we crawl more than 2:5 millions of them). In such is an online moderation technique used to ostracise undesired a black-box observation setup, we highlight the salient user user behaviors. In modern OSNs, shadow banning would refer profile features that may explain a banning practice (using to a wide range of techniques that artificially limit the visibility machine learning predictors). -
Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition
Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes — Second Edition — Arjun Panesar Machine Learning and AI for Healthcare Big Data for Improved Health Outcomes Second Edition Arjun Panesar Machine Learning and AI for Healthcare Arjun Panesar Coventry, UK ISBN-13 (pbk): 978-1-4842-6536-9 ISBN-13 (electronic): 978-1-4842-6537-6 https://doi.org/10.1007/978-1-4842-6537-6 Copyright © 2021 by Arjun Panesar This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. -
Analyzing Twitter Users' Behavior Before and After Contact By
Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency UPASANA DUTTA, RHETT HANSCOM, JASON SHUO ZHANG, RICHARD HAN, TAMARA 90 LEHMAN, QIN LV, SHIVAKANT MISHRA, University of Colorado Boulder, USA Social media platforms have been exploited to conduct election interference in recent years. In particular, the Russian-backed Internet Research Agency (IRA) has been identified as a key source of misinformation spread on Twitter prior to the 2016 U.S. presidential election. The goal of this research is to understand whether general Twitter users changed their behavior in the year following first contact from an IRA account. We compare the before and after behavior of contacted users to determine whether there were differences in their mean tweet count, the sentiment of their tweets, and the frequency and sentiment of tweets mentioning @realDonaldTrump or @HillaryClinton. Our results indicate that users overall exhibited statistically significant changes in behavior across most of these metrics, and that those users that engaged with the IRA generally showed greater changes in behavior. CCS Concepts: • Applied computing ! Law, social and behavioral sciences; • Human-centered com- puting ! Collaborative and social computing. Additional Key Words and Phrases: Internet Research Agency; IRA; Twitter; Trump; democracy ACM Reference Format: Upasana Dutta, Rhett Hanscom, Jason Shuo Zhang, Richard Han, Tamara Lehman, Qin Lv, Shivakant Mishra. 2021. Analyzing Twitter Users’ Behavior Before and After Contact by Russia’s Internet Research Agency. Proc. ACM Hum.-Comput. Interact. 5, CSCW1, Article 90 (April 2021), 24 pages. https://doi.org/10.1145/3449164 INTRODUCTION For many years, the growth of online social media has been seen as a tool used to bring people together across borders and time-zones. -
Generating Counter Narratives Against Online Hate Speech: Data and Strategies
Generating Counter Narratives against Online Hate Speech: Data and Strategies Serra Sinem Tekiroglu˘ 1, Yi-Ling Chung1,2, and Marco Guerini1 1Fondazione Bruno Kessler, Via Sommarive 18, Povo, Trento, Italy [email protected],[email protected],[email protected] 2University of Trento, Italy Abstract the conversations (Bielefeldt et al., 2011; Jurgens et al., 2019). In this line of action, some Non- Recently research has started focusing on avoiding undesired effects that come with Govermental Organizations (NGOs) train operators content moderation, such as censorship and to intervene in online hateful conversations by writ- overblocking, when dealing with hatred on- ing counter-narratives. A Counter-Narrative (CN) line. The core idea is to directly intervene in is a non-aggressive response that offers feedback the discussion with textual responses that are through fact-bound arguments and is considered as meant to counter the hate content and prevent the most effective approach to withstand hate mes- it from further spreading. Accordingly, au- sages (Benesch, 2014; Schieb and Preuss, 2016). tomation strategies, such as natural language generation, are beginning to be investigated. To be effective, a CN should follow guidelines simi- 1 Still, they suffer from the lack of sufficient lar to those in ‘Get the Trolls Out’ project , in order amount of quality data and tend to produce to avoid escalating the hatred in the discussion. generic/repetitive responses. Being aware of Still, manual intervention against hate speech the aforementioned limitations, we present a is not scalable. Therefore, data-driven NLG ap- study on how to collect responses to hate ef- proaches are beginning to be investigated to assist fectively, employing large scale unsupervised language models such as GPT-2 for the gen- NGO operators in writing CNs. -
Smartphone Use and Academic Performance of University Students: a Mediation and Moderation Analysis
sustainability Article Smartphone Use and Academic Performance of University Students: A Mediation and Moderation Analysis Rizwan Raheem Ahmed 1,* , Faryal Salman 2, Shahab Alam Malik 1, Dalia Streimikiene 3,* , Riaz Hussain Soomro 2 and Munwar Hussain Pahi 4 1 Faculty of Management Sciences, Indus University, Block-17, Gulshan, Karachi 75300, Pakistan; [email protected] 2 Institute of Health Management, Dow University of Health Sciences, Mission Road, Karachi 74200, Pakistan; [email protected] (F.S.); [email protected] (R.H.S.) 3 Institute of Sport Science and Innovations, Lithuanian Sports University, Sporto str. 6, Kaunas 44221, Lithuania 4 College of Business Management, PAF-KIET University, Korangi Creek, Karachi 75190, Pakistan; [email protected] * Correspondence: [email protected] (R.R.A.); [email protected] (D.S.) Received: 3 December 2019; Accepted: 1 January 2020; Published: 6 January 2020 Abstract: The purpose of the undertaken study is to examine the influence of smartphones on the performance of university students in Pakistan. This paper also investigates the functions of a smartphone as exogenous predictors such as smartphone applications, multimedia messaging service (MMS), short message service (SMS), warp-speed processing, and entertainment on the academic performance of a student. This paper also addresses the impact of electronic word of mouth (eWOM) and attitude as mediating variables between exogenous and endogenous variables. Finally, we incorporated technology and addiction as moderating variables between independent variables and the outcome variable to measure the influence of moderating variables. We have taken 684 responses from seven universities in Pakistan and employed the SEM-based multivariate approach for the analysis of the data. -
Moderation Fundamentals
Moderation Fundamentals: - Moderation refers to a change in the relationship between an independent variable and a dependent variable, depending on the level of a third variable, termed the moderator variable. Moderating effects are also referred to as interaction and conditioning effects. * For two continuous variables, moderation means that the slope of the relationship between the independent and dependent variable varies (i.e., increases or decreases) according to the level of the moderator variable. * For a continuous independent variable and a categorical moderator variable, moderation means that the slope of the relationship between the independent and dependent variable differs across the groups represented by the categorical moderator variable. * For a categorical independent variable and a continuous moderator variable, moderation means that the differences between the group means represented by the levels of the categorical independent variable differ according to the level of the moderator variable. * For two categorical variables, moderation means that the difference between the group means for the categorical independent variable differ depending on group membership on the moderator variable. - When the predictor and moderator variables are continuous, a single product is needed to capture the moderating effect. When one variable is continuous and the other is categorical, the required number of product terms is g – 1, where g equals the number of groups represented by the categorical variable. When both variables are categorical, the required number of product terms is (g1 – 1)(g2 – 1), where g1 and g2 are the number of groups represented by the two categorical variables. - Interactions can range up to the kth order, where k represents the number of variables on the right side of the equation. -
Countering Terrorism Online with Artificial Intelligence an Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia
COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE AN OVERVIEW FOR LAW ENFORCEMENT AND COUNTER-TERRORISM AGENCIES IN SOUTH ASIA AND SOUTH-EAST ASIA COUNTERING TERRORISM ONLINE WITH ARTIFICIAL INTELLIGENCE An Overview for Law Enforcement and Counter-Terrorism Agencies in South Asia and South-East Asia A Joint Report by UNICRI and UNCCT 3 Disclaimer The opinions, findings, conclusions and recommendations expressed herein do not necessarily reflect the views of the Unit- ed Nations, the Government of Japan or any other national, regional or global entities involved. Moreover, reference to any specific tool or application in this report should not be considered an endorsement by UNOCT-UNCCT, UNICRI or by the United Nations itself. The designation employed and material presented in this publication does not imply the expression of any opinion whatsoev- er on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area of its authorities, or concerning the delimitation of its frontiers or boundaries. Contents of this publication may be quoted or reproduced, provided that the source of information is acknowledged. The au- thors would like to receive a copy of the document in which this publication is used or quoted. Acknowledgements This report is the product of a joint research initiative on counter-terrorism in the age of artificial intelligence of the Cyber Security and New Technologies Unit of the United Nations Counter-Terrorism Centre (UNCCT) in the United Nations Office of Counter-Terrorism (UNOCT) and the United Nations Interregional Crime and Justice Research Institute (UNICRI) through its Centre for Artificial Intelligence and Robotics. -
Congressional Record—Senate S4658
S4658 CONGRESSIONAL RECORD — SENATE August 3, 2020 The PRESIDING OFFICER. Without companies censor political viewpoints employ disturbing and familiar im- objection, it is so ordered. that they find objectionable. That was agery. COMMUNICATIONS DECENCY ACT 2 years ago. It has only worsened in the According to the ESPN investiga- Mr. WICKER. Madam President, for 2 years since then. tion, one former league employee com- almost 25 years, the internet has grown These concerns come at a time when pared the atmosphere at the Xinjiang and thrived under the light-touch regu- tech companies wield unprecedented camp to ‘‘World War II Germany.’’ latory framework established by the power within our economy and our cul- An American coach, who worked at a Communications Decency Act. I hope ture at large, and no one can deny that. similar facility, described it as a we can continue that. I think some A bipartisan chorus of committee ‘‘sweat camp for athletes.’’ changes need to be made. members from the other body pointed Now, according to the investigation, Passed in 1996, the law that the Com- this out just last week. More and more almost immediately after the NBA munications Decency Act is a part of of our daily business is taking place launched this program back in 2016, helped create the internet. Section 230 online, and that trend is only accel- multiple coaches who were staffing the of that law gives broad liability protec- erating during the current pandemic. camps reported to high-ranking organi- tions to interactive computer services, As we near the 2020 election, Ameri- zation officials that they had witnessed such as Facebook, Twitter, and other cans have serious concerns about Chinese coaches beating and berating social media platforms. -
The Great Moderation and the Relationship Between Output Growth and Its Volatility
The Great Moderation and the Relationship between Output Growth and Its Volatility WenShwo Fang Department of Economics Feng Chia University 100 WenHwa Road Taichung, TAIWAN [email protected] and Stephen M. Miller* College of Business University of Nevada, Las Vegas 4505 Maryland Parkway Las Vegas, Nevada, USA 89154-6005 [email protected] Abstract: This study examines the effect of the Great Moderation on the relationship between U.S. output growth and its volatility over the period 1947 to 2006. First, we consider the possible effects of structural change in the volatility process. In so doing, we employ GARCH-M and ARCH-M specifications of the process describing output growth rate and its volatility with and without a one-time structural break in volatility. Second, our data analyses and empirical results suggest no significant relationship between the output growth rate and its volatility, favoring the traditional wisdom of dichotomy in macroeconomics. Moreover, the evidence shows that the time-varying variance falls sharply or even disappears once we incorporate a one-time structural break in the unconditional variance of output starting 1982 or 1984. That is, the integrated GARCH effect proves spurious. Finally, a joint test of a trend change and a one-time shift in the volatility process finds that the one-time shift dominates. Keywords: Great Moderation, economic growth and volatility, structural change in variance, IGARCH JEL classification: C32; E32; O40 * Corresponding author 1. Introduction Macroeconomic volatility declined substantially during the past 20 years. Kim and Nelson (1999), McConnell and Perez-Quiros (2000), Blanchard and Simon (2001), Stock and Watson (2003), and Ahmed, Levin, and Wilson (2004), among others, document this Great Moderation in the volatility of U.S. -
Netchoice V. Moody
Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 1 of 48 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF FLORIDA TALLAHASSEE DIVISION NETCHOICE, LLC, et al., Plaintiffs, v. Civil Action No. ASHLEY BROOKE MOODY, in her official 4:21-cv-220- RH-MAF capacity as Attorney General of the State of Florida, et al., Defendants. BRIEF OF INTERNET ASSOCIATION AS AMICUS CURIAE IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Patrick J. Carome (pro hac vice pending) Peter W. Homer (D.C. SBN 385676) (FL SBN 291250) Paul R.Q. Wolfson (pro hac vice pending) HOMER BONNER (D.C. SBN 414759) 1200 Four Seasons Tower Ari Holtzblatt (pro hac vice pending) 1441 Brickell Avenue (D.C. SBN 1009913) Miami, Florida 33131 WILMER CUTLER PICKERING (305) 350-5139 HALE AND DORR LLP 1875 Pennsylvania Avenue, NW Washington, DC 20006 (202) 663-6000 Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 2 of 48 DISCLOSURE STATEMENT OF AMICUS CURIAE INTERNET ASSOCIATION Amicus Curiae Internet Association is not a publicly held corporation, does not have a parent corporation, and has not issued stock. Therefore, no publicly traded corporation owns ten percent or more of its stock. None of the counsel for the parties in this litigation has authored this brief, in whole or in part. Furthermore, no party, party’s counsel, or outside organization has funded the research, writing, preparation, or submission of this brief. /s/ Peter W. Homer Peter W. Homer i Case 4:21-cv-00220-RH-MAF Document 77-2 Filed 06/14/21 Page 3 of 48 TABLE OF CONTENTS Page DISCLOSURE STATEMENT OF AMICUS CURIAE INTERNET ASSOCIATION ...............................................................................................