+

Borden et al., 2020 - Google Patents

Improving automated crisis detection via an improved understanding of crisis language: Linguistic categories in social media crises

Borden et al., 2020

View PDF
Document ID
16389745445177892979
Author
Borden J
Zhang X
Hwang J
Publication year
Publication venue
Journal of Contingencies and Crisis Management

External Links

Snippet

Abstract By applying the Linguistic Category Model (LCM) in crisis communication, this study explores the potential of verb tracking on social media to examine how linguistic categories can elucidate the intentional and/or unintentional communication of crisis attribution frames …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2765Recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • G06F17/2785Semantic analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models

Similar Documents

Publication Publication Date Title
Robertson et al. Negativity drives online news consumption
Jiang et al. Linguistic signals under misinformation and fact-checking: Evidence from user comments on social media
Gallagher et al. Reclaiming stigmatized narratives: The networked disclosure landscape of# MeToo
Boberg et al. Pandemic populism: Facebook pages of alternative news media and the corona crisis--A computational content analysis
Borden et al. Improving automated crisis detection via an improved understanding of crisis language: Linguistic categories in social media crises
Zhang et al. Predictors of the authenticity of Internet health rumours
Becker Measuring privacy risk in online social networks
Smith et al. The Instagram/Facebook ban on graphic self‐harm imagery: a sentiment analysis and topic modeling approach
Vasalou et al. Privacy as a fuzzy concept: A new conceptualization of privacy for practitioners
Adhikari et al. Evolution of composition, readability, and structure of privacy policies over two decades
Sutton et al. Willingness to click: Risk information seeking during imminent threats
Arowosegbe Data bias, intelligent systems and criminal justice outcomes
Sutcliffe et al. Discovering affect-laden requirements to achieve system acceptance
Gutiérrez Critical appraisal of large language models in judicial decision-making
Perlstein Risk perception and interpersonal discussion on risk: A systematic literature review
Johnson et al. Re-imagining procedural justice in policing sexual violence: centring survivors
Bäumler et al. Harnessing Inter-Organizational Collaboration and Automation to Combat Online Hate Speech: A Qualitative Study with German Reporting Centers
Duong et al. Social media and privacy concerns: exploring university student’s privacy concerns in TikTok platform in Vietnam
Ingber Understanding screenshot collection and sharing on messaging platforms: a privacy perspective
Pacilli et al. Bystanders’ reactions to a woman victim of sextortion: Moral outrage, victim blaming and reputational damage
Robertshaw et al. Tweeting on dementia: A snapshot of the content and sentiment of tweets associated with dementia
Lyerly Study Finds AI Language Models Show Bias Against Individuals With Disabilities
Alharthi et al. Target-oriented investigation of online abusive attacks: A dataset and analysis
Phillips A significant solidus: Punctuating sexual exploitation with discretionary practices
Himaja et al. An AI based mental health support chat-bot for cyber bullied victims
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载