Detecting Abusive Language on Online Platforms: a Critical Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Detecting Abusive Language on Online Platforms: a Critical Analysis Detecting Abusive Language on Online Platforms: A Critical Analysis Preslav Nakov1,2∗ , Vibha Nayak1 , Kyle Dent1 , Ameya Bhatawdekar3 Sheikh Muhammad Sarwar1,4 , Momchil Hardalov1,5, Yoan Dinkov1 Dimitrina Zlatkova1 , Guillaume Bouchard1 , Isabelle Augenstein1,6 1CheckStep Ltd., 2Qatar Computing Research Institute, HBKU, 3Microsoft, 4University of Massachusetts, Amherst, 5Sofia University, 6University of Copenhagen {preslav.nakov, vibha, kyle.dent, momchil, yoan.dinkov, didi, guillaume, isabelle}@checkstep.com, [email protected], [email protected], Abstract affect not only user engagement, but can also erode trust in the platform and hurt a company’s brand. Abusive language on online platforms is a major Social platforms have to strike the right balance in terms societal problem, often leading to important soci- of managing a community where users feel empowered to etal problems such as the marginalisation of un- engage while taking steps to effectively mitigate negative ex- derrepresented minorities. There are many differ- periences. They need to ensure that their users feel safe, their ent forms of abusive language such as hate speech, personal privacy and information is protected, and that they profanity, and cyber-bullying, and online platforms do not experience harassment or annoyances, while at the seek to moderate it in order to limit societal harm, same time feeling empowered to share information, experi- to comply with legislation, and to create a more in- ences, and views. Many social platforms institute guidelines clusive environment for their users. Within the field and policies to specify what content is considered inappropri- of Natural Language Processing, researchers have ate. As manual filtering is hard to scale, and can even cause developed different methods for automatically de- post-traumatic stress disorder-like symptoms to human anno- tecting abusive language, often focusing on specific tators, there have been many research efforts to develop tools subproblems or on narrow communities, as what and technology to automate some of this effort. is considered abusive language very much differs The key feature of offensive language in online dialog is by context. We argue that there is currently a di- that it is harmful either to its target, the online community chotomy between what types of abusive language where it occurs, or the platform hosting the conversation. online platforms seek to curb, and what research ef- The degree of harm is a factor and might range from hate forts there are to automatically detect abusive lan- speech and cyber-bullying with extreme deleterious effects, guage. We thus survey existing methods as well over slightly less damaging derogatorylanguage and personal as content moderation policies by online platforms insults, to profanity and teasing, which might even be consid- in this light, and we suggest directions for future ered acceptable in some communities. This spectrum poses work. challenges for clear labeling of training data, as well as for computational modeling of the problem. Several studies have considered the application of 1 Introduction computational methods to deal with offensive lan- Online harm is not new. Groups and individuals who have guage, particularly for English [Davidson et al., 2017; Basile et al., 2019; Fortuna and Nunes, 2018]. How- arXiv:2103.00153v1 [cs.CL] 27 Feb 2021 been targets of abusive language have suffered real harms for many years. The problem has persisted over time and may ever, these efforts tend to constrain their scope to one well be growing. Thus, abusive language in social media is of medium, to a single or to just a few subtasks, or to particular concern to online communities, governments, and only limited aspects of the problem. Prior work has especially social media platforms. studied offensive language on Twitter [Xu et al., 2012; While combating abuse is a high priority, preserving indi- Burnap and Williams, 2015; Davidson et al., 2017; viduals’ rights to free expression is also vital, making the task Wiegand et al., 2018], in Wikipedia comments,1 and in of moderating conversations particularly difficult. Some form Facebook posts [Kumar et al., 2018]. The task is usually of moderation is clearly required. Platform providers face modeled as a supervised classification problem. The very challenging technical and logistical problems in limiting models are trained on posts annotated according to the abusive language, while at the same time allowing a level of presence of some type of abusive or offensive content. free speech which leads to rich and productive online con- Examples of such types content include hate speech versations. Negative interactions experienced by users pose [Davidsonetal.,2017; MalmasiandZampieri,2017; a significant risk to these social platforms and can adversely 1challengehttps://www.kaggle.com/c/jigsaw-toxic-comment- ∗Contact Author classification-challenge Platform Type Example • Misinformation is always referenced as false news in Facebook’s Community Guidelines. SocialMedia Twitter,Facebook,Instagram Online Marketplace Amazon, PinDuoDuo, Depop • Even though Facebook covers most areas which could Dating Bumble,Tinder,Hinge be subjected to abusive language, the coverage of med- Video Community TikTok, Triller, Clash ical advice is very broadly mentioned in its policies. It Forum Patient, BG Mamma, Reddit is unclear whether individuals are free to share medical Gaming Community Twitch, DLive, Omlet Arcade advice to others in their posts. For Twitter4: Table 1: Classification of online platforms. • Theterm animal abuse is not explicitly mentioned in the policy. It is implicitly mentioned under Twitter’s Sen- Malmasi and Zampieri, 2018], abusive language sitive media policy, where graphic and sexual content [Founta et al., 2018], toxicity [Georgakopoulos et al., 2018], featuring animals is not prohibited. cyber-bullying [Dinakar et al., 2011], and aggression • Hate speech is referred to as hateful conduct in Twitter’s [Kumar et al., 2018]. content policy. While there have been several surveys on offensive lan- • Only COVID-19 related medical advice is prohibited on guage, hate speech, and cyber-bullying, none of them have Twitter. focused on what platforms need vs. what technology has 5 to offer. For example, [Schmidt and Wiegand, 2017] and For Google : [Fortuna and Nunes, 2018] both surveyed automated hate • Google’s terms of service covers only basic guidelines speech detection, but focused primarily on the features on acceptable conduct on the platform. The more spe- which have been shown to be most effective in classi- cific clauses against hate speech, bullying and harass- fication systems. [Salawu et al., 2020] provided an ex- ment are covered in service-specific policies as indicated tensive survey of NLP for detecting cyber-bullying, and in Table 2. [Vidgen and Derczynski, 2021] did important work to cata- • There are no specific clauses addressing incidents of re- log abusive language training data, which serves as a pre-step venge porn and sexual abuse (adults). It is also unclear for system solutions. Here, we aim to bridge the gap between whether they fall under the category of illegal activities. this work and platform solution requirements. Amazon and Apple offer very different services in com- parison to Facebook, Twitter and Google, which is reflected 2 Requirements by Online Platforms in the clauses covered in their terms of service. 6 Below, we explore how abusive language differs from one For Apple : online platform to another, and what content moderation poli- • Apple’s policies very broadly mention clauses in re- cies have been put in place accordingly.2 sponse to Dangerous people, Glorifying crime, Illegal Online platforms is a broad term which represents various goods, Child sexual abuse, Sexual abuse (Adults), An- categories of providers such as social media, online market- imal abuse, Human trafficking under illegal acts. Vio- places, online video communities, dating websites and apps, lence falls under threatening and intimidating posts. support communities or forums, and online gaming commu- • There are no clauses in the policy which address Med- nities, among others. Each of these platforms is governed by ical advice, Spam, Sexual solicitation, Revenge porn, their own content moderation policies and has its own defini- Graphic content, and Self-Harm. tions of what constitutes abusive language. 7 Table 1 shows a classification of online platforms by type. For Amazon : Facebook, Instagram and Twitter represent big social media • Dangerous organization and people, Glorifying crime, platforms, while Amazon, TikTok, Patient and Twitch are ex- Illegal goods, Child sexual abuse, Sexual abuse (Adults), amples of platforms focusing on specific products. Animal abuse, Human trafficking are broadly mentioned in clauses pertaining to Illegal. 2.1 The Big Tech • Revenge porn, Graphic content, Nudity and pornogra- The big social media platforms, also commonly known as phy are broadly mentioned in clauses pertaining to ob- ‘Big Tech’, have stringent content moderation policies and scenity. the most advanced technology to help detect abusive lan- • There are no policies in place which directly address guage. We summarize these policies in Table 2. Medical advice, Misinformation, Sexual solicitation, We can see a lot of overlap, but also some differences in and Self-Harm. these policies. 4 For Facebook3: https://help.twitter.com/en/rules-and-policies/twitter-rules 5https://policies.google.com/terms?hl=en
Recommended publications
  • Google Cloud Issue Summary Multiple Products - 2020-08-19 All Dates/Times Relative to US/Pacific
    Google Cloud Issue Summary Multiple Products - 2020-08-19 All dates/times relative to US/Pacific Starting on August 19, 2020, from 20:55 to 03:30, multiple G Suite and Google Cloud Platform products experienced errors, unavailability, and delivery delays. Most of these issues involved creating, uploading, copying, or delivering content. The total incident duration was 6 hours and 35 minutes, though the impact period differed between products, and impact was mitigated earlier for most users and services. We understand that this issue has impacted our valued customers and users, and we apologize to those who were affected. DETAILED DESCRIPTION OF IMPACT Starting on August 19, 2020, from 20:55 to 03:30, Google Cloud services exhibited the following issues: ● Gmail: The Gmail service was unavailable for some users, and email delivery was delayed. About ​ 0.73% of Gmail users (both consumer and G Suite) active within the preceding seven days experienced 3 or more availability errors during the outage period. G Suite customers accounted for 27% of affected Gmail users. Additionally, some users experienced errors when adding attachments to messages. Impact on Gmail was mitigated by 03:30, and all messages delayed by this incident have been delivered. ● Drive: Some Google Drive users experienced errors and elevated latency. Approximately 1.5% of Drive ​ users (both consumer and G Suite) active within the preceding 24 hours experienced 3 or more errors during the outage period. ● Docs and Editors: Some Google Docs users experienced issues with image creation actions (for ​ example, uploading an image, copying a document with an image, or using a template with images).
    [Show full text]
  • Verification of Declaration of Adherence | Update May 20Th, 2021
    Verification of Declaration of Adherence | Update May 20th, 2021 Declaring Company: Google LLC Verification-ID 2020LVL02SCOPE015 Date of Upgrade May 2021 Table of Contents 1 Need and Possibility to upgrade to v2.11, thus approved Code version 3 1.1 Original Verification against v2.6 3 1.2 Approval of the Code and accreditation of the Monitoring Body 3 1.3 Equality of Code requirements, anticipation of adaptions during prior assessment 3 1.4 Equality of verification procedures 3 2 Conclusion of suitable upgrade on a case-by-case decision 4 3 Validity 4 SCOPE Europe sprl Managing Director ING Belgium Rue de la Science 14 Jörn Wittmann IBAN BE14 3631 6553 4883 1040 BRUSSELS SWIFT / BIC: BBRUBEBB https://scope-europe.eu Company Register: 0671.468.741 [email protected] VAT: BE 0671.468.741 2 | 4 1 Need and Possibility to upgrade to v2.11, thus approved Code version 1.1 Original Verification against v2.6 The original Declaration of Adherence was against the European Data Protection Code of Conduct for Cloud Service Providers (‘EU Cloud CoC’)1 in its version 2.6 (‘v2.6’)2 as of March 2019. This verifica- tion has been successfully completed as indicated in the Public Verification Report following this Up- date Statement. 1.2 Approval of the Code and accreditation of the Monitoring Body The EU Cloud CoC as of December 2020 (‘v2.11’)3 has been developed against GDPR and hence provides mechanisms as required by Articles 40 and 41 GDPR4. As indicated in 1.1. the services con- cerned passed the verification process by the Monitoring Body of the EU Cloud CoC, i.e., SCOPE Eu- rope sprl/bvba5 (‘SCOPE Europe’).
    [Show full text]
  • What's New for Google in 2020?
    Kevin A. McGrail [email protected] What’s new for Google in 2020? Introduction Kevin A. McGrail Director, Business Growth @ InfraShield.com Google G Suite TC, GDE & Ambassador https://www.linkedin.com/in/kmcgrail About the Speaker Kevin A. McGrail Director, Business Growth @ InfraShield.com Member of the Apache Software Foundation Release Manager for Apache SpamAssassin Google G Suite TC, GDE & Ambassador. https://www.linkedin.com/in/kmcgrail 1Q 2020 STORY TIME: Google Overlords, Pixelbook’s Secret Titan Key, & Googlesplain’ing CES Jan 2020 - No new new hardware was announced at CES! - Google Assistant & AI Hey Google, Read this Page Hey Google, turn on the lights at 6AM Hey Google, Leave a Note... CES Jan 2020 (continued) Google Assistant & AI Speed Dial Interpreter Mode (Transcript Mode) Hey Google, that wasn't for you Live Transcripts Hangouts Meet w/Captions Recorder App w/Transcriptions Live Transcribe Coming Next...: https://mashable.com/article/google-translate-transcription-audio/ EXPERT TIP: What is Clipping? And Whispering! Streaming Games - Google Stadia Android Tablets No more Android Tablets? AI AI AI AI AI Looker acquisition for 2.6B https://www.cloudbakers.com/blog/why-cloudbakers-loves-looker-for-business-intelligence-bi From Thomas Kurian, head of Google Cloud: “focusing on digital transformation solutions for retail, healthcare, financial services, media and entertainment, and industrial and manufacturing verticals. He highlighted Google's strengths in AI for each vertical, such as behavioral analytics for retail,
    [Show full text]
  • Google Apps Form to Spreadsheet
    Google Apps Form To Spreadsheet Hewet skited her liquorice thereunder, she overdosing it metrically. Pincas is indrawn and sturt skulkingly as silkiest Fox focus conscionably and glorifying strange. Diphyletic Martie never schillerizes so narrow-mindedly or misclassifies any diluteness abiogenetically. Maybe i used to be so much cleaner of this integration by hampshire community accurately represents the data. Google forms account. Click google apps script, only work for example, says no need! For our support. Forms app is happening? We want google forms turns out a question, a reporting visitor already then if statement to? Add files until it to create specific data from people, right of a separate them access. Anyway i can form app script forms to spreadsheets from the quick and marketing tactics from a few problems i try to help you make! All fields update spreadsheets anywhere you copy and end architect of a new information can take a google apps to form? Google apps script work done much appreciated! Likewise i just click on spreadsheet created forms, or fields will recognize and intimidating to learn also autocomplete feature. Google form are preview feature that is ready and a submission, click submit button to contact me? Autofill for forms app script is getting an error? From spreadsheet app script will be able to apps script to boost collaboration across sheets whenever possible. Google apps script editor if you want to the google sheets api and click on new features you can easily that takes a new cloud storage. Simply hover over the value that you can organize with the palette icon to book a custom bot generates a form more powerful tool to? Beyond the form or google apps to form spreadsheet icon.
    [Show full text]
  • Google Groups User Guide Link
    Google Groups User Guide afterAldric Gilles name-drops grudge mercuriallyimperviously, while quite manducatory stoneware. JimmieSancho rations is brambly venially and orblue gats supportably divertingly. while Neurosurgical galactophorous Gustavo Dante fishtails denaturalizes no czarist and sledged quadruplicates. equivocally Sms application in groups user guide is committed to automatically migrated over the web and services and dynamic maps into the years Asking you bring it will be invited, and creating and apis. Sql server for google guide is the upper left of the selection. Purchase through your contacts to delete a group to messages to the list. Refresh the end of incoming messages to start with your apps ready for your business? Albums icon of google displays a number of the chat. Voice and volunteers who have a group or a zapier. Build and web applications for google informs you might feel a purchase. Neither affiliated with the group in the originals on the manager can add services button in production and external users. Ready for google user guide is a message confirming the bottom right of interest to the contact from a group content production and creating and vms. Proactively plan and empower employees to weed out the google is the class and api keys to save. Like shared mailboxes and drop clips to put a little change. Designate group is google groups user guide is a discussion groups for running containerized apps picker in and security. Company information about collaborative mailboxes and to use zapier from there are also has a small commission. Shot was pretty funny but under groups, click the group.
    [Show full text]
  • Building Secure and Reliable Systems
    Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers.
    [Show full text]
  • Google Cloud Lite No DR
    Level-1 IT Support Messaging Service Provider Enterprise Architecture Diagram Messaging Services Enterprise Level-2/3 IT Support Google Messaging and Adjunct Services (GMAS) 727 Logging Blackberry 727 Server and Associated Storage supporting GMAS 413 SMTP Relay Support Handles all COV SMTP relay requests from 3rd Party apps and multifunction devices ????? 413 GMR01 GMR02 GMR03 ????? Veritas EV.Cloud ????? On-Premise Portion 727 Hosted Mail Archiving ????? All servers listed are virtual. (HMA) GMAS has infrastructure in the COV based datacenter. Server infrastructure including the associated storage used to support the Google Load Balancer Custom VITA Log Application Server Messaging and Adjunct Services are provided by LAP04201 (Syslog) the Server Services Supplier. As part of that service, storage is included. Custom app created for VITA to log various events within the G Suite environment by utilizing Google’s Reports API. App uses both Google Cloud Platform (GCP) and on an on-premise server. Atos Server where TN FTP’s SIEM data in Syslog format. Email Data Loss Prevention (EDLP) AirWatch Cloud Mobile Devices Load Balancer Unified Communication (UC) Management Email Encryption 727 Messaging Service X.X.77.91 727 Integrated unified messaging and communication services integrated with G-Suite and existing Cisco 727 Workspace ONE communication system. Unified Endpoint CloudLink provisions and disables users. Management (UEM) SaaS Cloud CloudLink Service Platform Servers for AD User Sync VM’s – W2008 R2 TCP 443 / 2001 Directory Integration Servers to COV All servers listed Currently in VAR submission stage. COVMSGCES-ACC1 COVMSGCES-ACC2 are virtual. AD Acct Sync CoV L AD Acct Sync CoV COVMSGCES-APL02 COVMSGCES-APL07 COVMSGCES-APL11 COVMSGCES-APL16 COVMSGCES-APL06 GMAS COV Users and VITA Agencies All servers listed are virtual.
    [Show full text]
  • Cost Optimization in Cloud Computing
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Master's Programme in ICT Innovation Andrea Nodari Cost Optimization in Cloud Computing Master's Thesis Espoo, June 22, 2015 Supervisor: Professor Jukka K. Nurminen, Aalto University Advisor: Christian Fr¨uhwirth, M.Sc. Aalto University ABSTRACT OF MASTER'S THESIS School of Science Degree Programme in Computer Science and Engineering Master's Programme in ICT Innovation Author: Andrea Nodari Title: Cost Optimization in Cloud Computing Number of Pages: 84 Date: June 22, 2015 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka K. Nurminen, Aalto University Advisor: Christian Fr¨uhwirth, M.Sc. In recent years, cloud computing has increased in popularity from both industry and academic perspectives. One of the key features of the success of cloud computing is the low initial capital expenditure needed compared to the cost of planning and purchasing physical machines. However, owners of large and complex cloud infrastructures may incur high operating costs. In order to reduce operating costs and allow elasticity, cloud providers offer two types of computing resources: on-demand instances and reserved instances. On-demand instances are paid only when utilized and they are useful to satisfy a fluctuating demand. Conversely, reserved instances are paid for a certain time period and are independent of usage. Since reserved instances require more commitment from users, they are cheaper than on-demand instances. However, in order to be cost-effective compared to on- demand instances, they have to be extensively utilized.
    [Show full text]
  • An Introduction to Google Talk
    [Not for Circulation] An Introduction to Google Talk Google Talk is a Google App that is a great tool to use to communicate with your Google Contacts. In contrast to Google Chat within Gmail, Google Talk is a desktop program, and allows users to not only instant message with their contacts, but to call them and voice chat with them as well. Currently, Google Talk is only available for Windows computers. Signing In To sign into Google Apps for Education, 1. Go to http://go.uis.edu/google 2. Select Continue. Log in with your NetID and password. 3. In the browser, enter http://www.talk.google.com. Installing Google Talk 1. After entering http://www.talk.google.com into your browser, you will come to a page allowing you to download two different items; one is a video and voice plug-in for chatting within Gmail, and the other is Google Talk software. Click Download Google Talk. Information Technology Services, UIS 1 [Not for Circulation] 2. Click Save File. 3. Select Run. 4. Agree to Google’s license agreement. 5. After the installation has finished, Google Talk will be installed on your computer. The following screen will popup, prompting you to log-in with your Username and Password. Information Technology Services, UIS 2 [Not for Circulation] Google Talk Interface and Customization All your contacts appear as listed with their status icon on the left (available, busy, idle). If they have the Phone icon, you can call them. Click Add to add contacts, and view Check your Gmail, as well as missed calls to sort the way you see your contacts 1.
    [Show full text]
  • End to End Innovation with Google Cloud
    End to End Innovation with Google Cloud Nigel Watson Head of Cloud Technology Partners Google Japan and Asia Pacific Why the cloud? My experience What’s I suppose we “the cloud?” can use it for a few things but we don’t trust it 2007 2009 2012 Today Cloud? It can be more You’re crazy reliable and secure than your own data center (and most of my personal apps run on it) Personal time increasingly spent Google Grab Netflix in the cloud Photos Workers are using more apps and devices than ever before 22 cloud-based apps and 3 devices Okta: Businesses at Work, Citrix: 7 Enterprise Mobility Statistics You Should Know Businesses are moving to the Cloud with no signs of stopping 69% of ENT/MM companies with >80% SaaS by 2020. 42% of ENT/MM companies with >80% SaaS by 2018. 27% of ENT/MM companies with >80% SaaS by 2016. BetterCloud, 2017 State of the SaaS-Powered Workplace Report Innovating with the cloud-enabled workspace 1 A new breed of worker They spend 4.6 hours in the browser a day using cloud-native apps – cloud worker They are untethered from device and location. They are no longer searching for information, but working to develop insights and make critical decisions. The cloud can benefit all workers Industrial worker Service worker Cloud worker Knowledge worker Meet Chrome Enterprise A browser, an OS, and powerful devices built for the enterprise. Bridging silos to enable any app, any device Secure, always-on access Consistent user experience Any application, device, location EMM and identity management Comprehensive security Protect
    [Show full text]
  • Google Hangouts Protocols and Fostering Community
    Verhulstlaan 21, 3055WJ, Rotterdam T +31 (0)10422 5351 www.naisr.nl NAISR Google Hangouts Protocols and Fostering Community Behavioural Guidelines & ‘Netiquette’: Students & Parents: • NAISR Google Settings do not allow Students to use Google Hangouts with anyone outside the domain. • Students should only use Hangouts with their peers, when it is related to what is going on in School or the classroom. Students should use their normal medium of Social Media, ie: What’s App, Facetime etc for daily social interactions. The school maintains the right to have the student History of Google Hangout Conferences. • Students should always keep their language and interaction appropriate, as they would in face to face conversations, whether with teachers, or their peers. • Students should always dress appropriately for a Hangout, following the same NAISR guidelines, as at school. • Students are expected to attend all teacher scheduled Hangouts, unless the teacher has been previously notified. Non-attendance will be seen as a no- show to class. • Students are not permitted to share any video recordings of a Hangout, with anyone, or any online media outside the Hangout class group. Any deviance from this rule will be taken very seriously by NAISR. • Students should ALWAYS make sure they leave the Hangout. Always double check and get in the habit of closing your laptop when not in use, to prevent the camera from working regardless. • The teacher has the right to remove an unruly student from a live class. • Parents have ultimate responsibility to make sure students not only attend, but follow the correct protocols when online Hangout Meetings are scheduled with teachers.
    [Show full text]
  • The Use of Cloud Computing Technology in Professional Training of Future Programmers
    The use of cloud computing technology in professional training of future programmers Kateryna P. Osadcha1, Viacheslav V. Osadchyi2 1Bogdan Khmelnitsky Melitopol state pedagogical university, 20 Hetmanska Str., Melitopol, 72300, Ukraine Abstract The article provides a brief analysis of the current state of the study of cloud technologies by future software engineers at foreign and Ukrainian universities. The author experience in the application of cloud technologies in the training of future software engineers in Ukraine is presented. The application of cloud business automation systems, online services to monitor the implementation of the software projects, Google services for collaboration, planning and productivity while studying professional disciplines and carrying out diploma projects is described. Based on the survey conducted at Stackoverflow, the state of application of cloud technologies by software engineers around the world has been analyzed. The cloud technologies that are not studied at the analyzed universities of Ukraine and those that are not popular with software developers in the world, but studied at Ukrainian universities by future software engineers are outlined. Conclusions are made on the modernization of training programs for future software engineers. Topics for the study of cloud technologies by future software engineers in the content of professional disciplines are proposed. Keywords future programmers, cloud technologies, content of professional disciplines, training of software engi- neers 1. Introduction According to International Data Corporation (IDC), leading global provider of market informa- tion and consulting services, in the world over the past decade there appeared technology and services in the market of “cloud computing” [1]. According to the Bureau of Labor Statistics [2], the development of cloud computing has promoted an increase of the demand for the information technology specialists.
    [Show full text]