Algorithmically Supported Moderation in Children's Online Communities Flora
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How Modern Learning Resources Fail Conversational Programmers April Y
Mismatch of Expectations: How Modern Learning Resources Fail Conversational Programmers April Y. Wang1, Ryan Mitts1, Philip J. Guo2, and Parmit K. Chilana1 1Computing Science 2Design Lab Simon Fraser University UC San Diego Burnaby, BC Canada La Jolla, CA USA {ayw7, rmitts, pchilana}@sfu.ca [email protected] ABSTRACT Conversational programmers represent a class of learners variety of learners, such as computer science (CS) students who are not required to write any code, yet try to learn pro- [17,28,53], end-user programmers [14,15,30,32] and profes- gramming to improve their participation in technical con- sional programmers [1,3,13]. A large focus of these projects versations. We carried out interviews with 23 conversation- has been on improving learners’ understanding of program- al programmers to better understand the challenges they ming syntax and logic and facilitating interaction with fea- face in technical conversations, what resources they choose ture-rich programming environments as these are known to to learn programming, how they perceive the learning pro- present key challenges for new learners. cess, and to what extent learning programming actually Unfortunately, most of what we know about the programming helps them. Among our key findings, we found that conver- learning process and the challenges that learners face is based sational programmers often did not know where to even on studies of students in the classroom [53] or professionals in begin the learning process and ended up using formal and industry [1]. Only recently have we started seeing studies into informal learning resources that focus largely on program- informal learning processes among non-traditional popula- ming syntax and logic. -
``At the End of the Day Facebook Does What It Wants'': How Users
“At the End of the Day Facebook Does What It Wants”: How Users Experience Contesting Algorithmic Content Moderation KRISTEN VACCARO, University of Illinois Urbana-Champaign CHRISTIAN SANDVIG, University of Michigan KARRIE KARAHALIOS, University of Illinois Urbana-Champaign Interest has grown in designing algorithmic decision making systems for contestability. In this work, we study how users experience contesting unfavorable social media content moderation decisions. A large-scale online experiment tests whether different forms of appeals can improve users’ experiences of automated decision making. We study the impact on users’ perceptions of the Fairness, Accountability, and Trustworthiness of algorithmic decisions, as well as their feelings of Control (FACT). Surprisingly, we find that none of the appeal designs improve FACT perceptions compared to a no appeal baseline. We qualitatively analyze how users write appeals, and find that they contest the decision itself, but also more fundamental issues like thegoalof moderating content, the idea of automation, and the inconsistency of the system as a whole. We conclude with suggestions for – as well as a discussion of the challenges of – designing for contestability. CCS Concepts: • Human-centered computing → Human computer interaction (HCI); Social media. Additional Key Words and Phrases: content moderation; algorithmic experience ACM Reference Format: Kristen Vaccaro, Christian Sandvig, and Karrie Karahalios. 2020. “At the End of the Day Facebook Does What It Wants”: How Users Experience Contesting Algorithmic Content Moderation. Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 167 (October 2020), 22 pages. https://doi.org/10.1145/3415238 1 INTRODUCTION As algorithmic decision making systems become both more prevalent and more visible, interest has grown in how to design them to be trustworthy, understandable and fair. -
The Computer Clubhouse: Helping Youth Develop Fluency with New Media
The Computer Clubhouse: Helping Youth Develop Fluency with New Media Mitchel Resnick The Media Laboratory Massachusetts Institute of Technology Cambridge, MA 02140 [email protected] http://www.media.rnit.edu/~mres/ Natalie Rusk Science Museum of Minnesota St. Paul, MN55101 [email protected] Abstract: The gap between the technological haves and have-nots is widening, leading to dangerous economic and cultural riftsin our society. But access to technology alone is not enough to bridge this gap. This paper describes a new model of a learning community, called the Computer Clubhouse, that breaks away from the traditional computer lab. At the Clubhouse, inner-city youth become designers and creators-not just consumers-of computer-based products. The paper describes four core principles of the Clubhouse educational approach-and discusses how the Clubhouse helps prepare today's youth for life and work in tomorrow's world. Introduction Ever since the personal computer was invented in the late 1970s, there have been concerns about inequities in access to this new technology [Piller, 1992]. Over the years, the gap between the technological haves and have nots has widened, leading to dangerous economic and cultural rifts in our society. In an effort to narrow these rifts, some groups have worked to acquire computers for inner-city schools. Other groups have opened community-access centers, recognizing that schools are not the only (or necessarily the best) place for learning to occur. At these community-access centers, members of inner-city communities (youth and adults alike) can use computers at little or no charge. -
Download Paper
Lawless: the secret rules that govern our digital lives (and why we need new digital constitutions that protect our rights) Submitted version. Forthcoming 2019 Cambridge University Press. Nicolas P. Suzor Table of Contents Part I: a lawless internet Chapter 1. The hidden rules of the internet ............................................................................................. 6 Process matters ....................................................................................................................................................... 12 Chapter 2. Who makes the rules?.......................................................................................................... 17 Whose values apply? ............................................................................................................................................... 22 The moderation process .......................................................................................................................................... 25 Bias and accountability ........................................................................................................................................... 28 Chapter 3. The internet’s abuse problem ............................................................................................... 41 Abuse reflects and reinforces systemic inequalities ................................................................................................ 50 Dealing with abuse needs the involvement of platforms ....................................................................................... -
Content Moderation
Robert Lewington (Twitch) & The Fair Play Alliance Executive Steering Committee April 2021 Being ‘Targeted’ about Content Moderation: Strategies for consistent, scalable and effective response to Disruption & Harm 1 Content Moderation: Best Practices for Targeted Reporting & reactive UGC Management At Scale March 2021 Abstract This document provides replicable best practice information on how to moderate User-Generated Content (UGC) in social applications or services (including digital media and video games). Its focus is on reactive moderation, a central component of the growing content moderation toolkit where a service provider responds to reports submitted by users of its service regarding UGC that may violate its Terms of Service. Specifically, the document explores and advocates for a ‘targeted’ approach to the creation of reporting mechanisms. This allows users to closely identify the specific infraction, utilise evidence of the infraction—access to which is facilitated as part of the design of the reporting process—enabling consistent content moderation at scale. Note, however, that we will also make passing-reference to pre, post and proactive (see Appendix A) moderation approaches. Specifics of how best to tailor these best practices to a particular application or service will differ based on various parameters, including: type of service (social media, video game etc.); type of media (text, image, audio, video etc.); sharing mechanism (feed/gallery, avatar, communication etc.); persistence (ephemeral vs. static/umutable) and others, and therefore this document should be considered a set of high-level instructive principles rather than prescriptive guidelines. Contents i. Background ii. The Content Moderation Flywheel ○ Community Guidelines/Code of Conduct ○ Targeted reporting ■ Context ○ Scalable Content Moderation ○ Education ○ Technology iii. -
Accessible Tools and Curricula for K-12 Computer Science Education
Accessible Tools and Curricula for K-12 Computer Science Education White paper from the Accessible Computer Science Education Fall Workshop (Draft for Review) November 17-19, 2020 Earl Huff, Clemson University Varsha Koushik, University of Colorado Richard E. Ladner, University of Washington Stephanie Ludi, University of North Texas Lauren Milne, Macalester College Aboubakar Mountapmbeme, University of North Texas Margaret Perkoff, University of Colorado Andreas Stefik, University of Nevada, Las Vegas Introduction Ladner Computer science is rapidly becoming an integral part of the K-12 school curriculum in the United States (US) and other countries. This white paper will focus on the US because we understand K-12 education better than in other countries. Since 1984, computer science has been part of the curriculum in schools that offered AP Computer Science A (CSA). This introduction to programming was originally taught using Pascal, then moved to C++ in 1999, and then Java in 2003. Since 2007, there has been a concerted effort by the National Science Foundation to bring computer science education to a much broader audience and to all levels in K-12. This includes all students regardless of gender, ethnicity, race, or disability. The effort began with Exploring Computer Science (ECS) which was a gentler introduction to computer science at the high school level. Shortly thereafter, the idea of an AP Computer Science Principles (CSP) course arose that was to be a gentler introduction to computer science than AP CSA with a college level equivalent, introductory computer science for non-majors. In 2016, AP CSP became a reality with 43,780 students taking the exam in spring 2017 and two years later that number rose to 94,361. -
Adolescent Mothers' Meaning Making and Mindset I
MEANING MAKING AND MINDSET IN YOUNG MOTHERHOOD i “I Think Different Now”: Adolescent Mothers’ Meaning Making and Mindset in the Transition to Parenthood Dissertation submitted by Anne Bentley Waddoups, M.A. In partial fulfillment of the requirements for the degree of Doctor of Philosophy in Child Study and Human Development Eliot-Pearson Department of Child Study and Human Development Tufts University August 2015 Dissertation Committee members: M. Ann Easterbrooks, Ph.D. (Chair) Jayanthi Mistry, Ph.D. Natalie Rusk, Ph.D. Gilda A. Morelli, Ph.D. MEANING MAKING AND MINDSET IN YOUNG MOTHERHOOD i Abstract Using a meaning making lens and a qualitative methodology, this dissertation study sought to explore transformative meaning making and implicit beliefs of parenting among a sample of 40 adolescent mothers participating in a home visiting program during their transition to parenthood. Given the high attrition rate for interventions serving adolescent moms, the study also explored the alignments between meaning making and home visiting program participation. Through iterative coding and theme analysis, this investigation revealed that participants’ beliefs about parenting evolve as they transition from pregnancy to parenting. They engage in meaning making throughout the process, which leads to scripts of change in three areas: improvements in relationships, changes in life outlook, and changes to self. Two groups emerged on either end of the spectrum of meaning making. High meaning-making transformers tended to remain actively enrolled in the intervention while the low meaning-making remainers all dropped out by the second year. An analysis of implicit beliefs about parenting, or meta-parenting mindset, identified three groups of participants: fixed theorists, incremental theorists, and mixed theorists. -
Integrating Human and Machine Intelligence for Enhanced Curriculum Design
Integrating Human and Machine Intelligence for Enhanced Curriculum Design Shayan Doroudi CMU-CS-19-110 May 15, 2019 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee: Emma Brunskill, Chair Vincent Aleven Ken Koedinger Chinmay Kulkarni Eric Horvitz (Microsoft Research) Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Copyright © 2019 Shayan Doroudi This research was sponsored by the PIER Fellowship, Microsoft, Google, the Air Force Research Laboratory under grant number F87501720152, and the Department of Education under grant numbers R305A130215 and R305B150008. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of any sponsoring institution, the U.S. government or any other entity. Keywords: curriculum design, learnersourcing, content creation, reinforcement learning, in- structional sequencing, student modeling, model misspecification, bias-variance tradeoff If there is any good in these pages, it is for Fatima and her father and her husband and her two sons, peace and blessings be upon them. iv Abstract From the mechanical teaching machines of the early twentieth century to the wave of massive open online courses in recent years, many have been motivated by the dream of delivering a personalized adaptive curriculum to each learner. To achieve this dream, many researchers have focused on rule-based systems that rely on extensive domain expertise and psychological theories. While this approach has led to the development of successful intelligent tutoring systems with high quality content, (1) developing such systems can be very costly and (2) these systems typ- ically employ a very limited form of adaptive instructional sequencing. -
Deeper Attention to Abusive User Content Moderation
Deeper Attention to Abusive User Content Moderation John Pavlopoulos Prodromos Malakasiotis Ion Androutsopoulos Straintek, Athens, Greece Straintek, Athens, Greece Athens University of Economics [email protected] [email protected] and Business, Greece [email protected] Abstract suffer from abusive user comments, which dam- age their reputations and make them liable to fines, Experimenting with a new dataset of 1.6M e.g., when hosting comments encouraging illegal user comments from a news portal and an actions. They often employ moderators, who are existing dataset of 115K Wikipedia talk frequently overwhelmed, however, by the volume page comments, we show that an RNN op- and abusiveness of comments.3 Readers are dis- erating on word embeddings outpeforms appointed when non-abusive comments do not ap- the previous state of the art in moderation, pear quickly online because of moderation delays. which used logistic regression or an MLP Smaller news portals may be unable to employ classifier with character or word n-grams. moderators, and some are forced to shut down We also compare against a CNN operat- their comments sections entirely. ing on word embeddings, and a word-list We examine how deep learning (Goodfellow baseline. A novel, deep, classification- et al., 2016; Goldberg, 2016, 2017) can be em- specific attention mechanism improves the ployed to moderate user comments. We experi- performance of the RNN further, and can ment with a new dataset of approx. 1.6M manually also highlight suspicious words for free, moderated (accepted or rejected) user comments without including highlighted words in the from a Greek sports news portal (called Gazzetta), training data. -
The Berkman Klein Center for Internet & Society
Annual Report Academic Year 2016–2017 Contents I. Part One: Report of Activities .............................................................................................. 3 A. Summary of Academic Year: 2016–2017 ........................................................................ 3 1. Executive Summary ..................................................................................................... 3 2. Research, Scholarship and Project Activities ............................................................... 5 3. Contributions to HLS Teaching Program .....................................................................63 4. Participation of HLS Students in Program Activities ....................................................65 5. Faculty Participation ....................................................................................................65 6. Other Contributions to the HLS Community ................................................................66 7. Law Reform and Advocacy .........................................................................................66 8. Connections to the Profession ....................................................................................67 Research ...........................................................................................................................67 The Future of Digital Privacy ..............................................................................................67 Executive Education: Digital Security for Directors and Senior Executives -
Comprehension First: Evaluating a Novel Pedagogy and Tutoring System for Program Tracing in CS1
Session1: Novice Programmer ICER’17, August 18–20, 2017, Tacoma, WA, USA Comprehension First: Evaluating a Novel Pedagogy and Tutoring System for Program Tracing in CS1 Greg L. Nelson Benjamin Xie Andrew J. Ko University of Washington University of Washington University of Washington Allen School, DUB Group e Information School, DUB Group e Information School, DUB Group Seale, Washington 98195 Seale, Washington 98195 Seale, Washington 98195 [email protected] [email protected] [email protected] ABSTRACT building writing [17, 39, 68] and visualization tools [29, 34, 34, What knowledge does learning programming require? Prior work 57, 81, 87, 91]. Pedagogy has also evolved, reordering [23, 61, 80, has focused on theorizing program writing and problem solving 84, 85] and changing what is taught [14, 50, 72], rening worked skills. We examine program comprehension and propose a formal examples [58], explicitly teaching problem solving [48, 61] and theory of program tracing knowledge based on control ow paths program design [27], and exploring a discovery pedagogy [46]. through an interpreter program’s source code. Because novices Most of these diverse approaches have been evaluated in a writ- cannot understand the interpreter’s programming language nota- ing-focused pedagogical context. People receive instruction on a tion, we transform it into causal relationships from code tokens to programming construct’s syntax and semantics, practice by writing instructions to machine state changes. To teach this knowledge, code, then advance to the next construct (roughly a spiral syn- we propose a comprehension-rst pedagogy based on causal infer- tax approach [76]). In contrast, lile prior work has explored a ence, by showing, explaining, and assessing each path by stepping comprehension-rst pedagogy, teaching program semantics—how through concrete examples within many example programs. -
Freshia Sackey
Jiradi: Reflective Documentation to Support Learning and Skills Development by Marian Mwikali Muthui B.Sc. Mechanical Engineering, University of Nairobi (2014) Submitted to the Program in Media Arts and Sciences, School of Architecture and Planning, in partial fulfillment of the requirements for the degree of Master of Science in Media Arts and Sciences at the Massachusetts Institute of Technology May 2020 © Massachusetts Institute of Technology, 2020. All rights reserved. Author ……………………………………………………………………………………………………………… Program in Media Arts and Sciences May 19, 2020 Certified by ……………………………………………………………………………………………………………… Mitchel Resnick LEGO Papert Professor of Learning Research Program in Media Arts and Sciences Thesis Advisor Accepted by ……………………………………………………………………………………………………………… Tod Machover Academic Head, Program in Media Arts and Sciences 2 Jiradi: Reflective Documentation to Support Learning and Skills Development by Marian Mwikali Muthui Submitted to the Program in Media Arts and Sciences, School of Architecture and Planning, on May 19, 2020 in partial fulfillment of the requirements for the degree of Master of Science in Media Arts and Sciences Abstract In creative learning, reflection encourages learners to think critically about their experiences and helps to generate new ideas, insights, and outlooks. Maker practices recommend documentation, typically in the form of digital portfolios, as a method to encourage reflection. Documentation can serve two important roles: as a tool to support personal reflection about your learning experience and as a sharable record to showcase your skills development. Unfortunately, there are not currently any documentation tools that are optimized to support both personal reflection and skills development. In this thesis, I introduce “reflective documentation” -- a term that I use to describe digital documentation tools that adopt a process-oriented approach to support both personal reflection and skills development.