Borden et al., 2020 - Google Patents
Improving automated crisis detection via an improved understanding of crisis language: Linguistic categories in social media crisesBorden et al., 2020
View PDF- Document ID
- 16389745445177892979
- Author
- Borden J
- Zhang X
- Hwang J
- Publication year
- Publication venue
- Journal of Contingencies and Crisis Management
External Links
Snippet
Abstract By applying the Linguistic Category Model (LCM) in crisis communication, this study explores the potential of verb tracking on social media to examine how linguistic categories can elucidate the intentional and/or unintentional communication of crisis attribution frames …
- 238000001514 detection method 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2785—Semantic analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Robertson et al. | Negativity drives online news consumption | |
| Jiang et al. | Linguistic signals under misinformation and fact-checking: Evidence from user comments on social media | |
| Gallagher et al. | Reclaiming stigmatized narratives: The networked disclosure landscape of# MeToo | |
| Boberg et al. | Pandemic populism: Facebook pages of alternative news media and the corona crisis--A computational content analysis | |
| Borden et al. | Improving automated crisis detection via an improved understanding of crisis language: Linguistic categories in social media crises | |
| Zhang et al. | Predictors of the authenticity of Internet health rumours | |
| Becker | Measuring privacy risk in online social networks | |
| Smith et al. | The Instagram/Facebook ban on graphic self‐harm imagery: a sentiment analysis and topic modeling approach | |
| Vasalou et al. | Privacy as a fuzzy concept: A new conceptualization of privacy for practitioners | |
| Adhikari et al. | Evolution of composition, readability, and structure of privacy policies over two decades | |
| Sutton et al. | Willingness to click: Risk information seeking during imminent threats | |
| Arowosegbe | Data bias, intelligent systems and criminal justice outcomes | |
| Sutcliffe et al. | Discovering affect-laden requirements to achieve system acceptance | |
| Gutiérrez | Critical appraisal of large language models in judicial decision-making | |
| Perlstein | Risk perception and interpersonal discussion on risk: A systematic literature review | |
| Johnson et al. | Re-imagining procedural justice in policing sexual violence: centring survivors | |
| Bäumler et al. | Harnessing Inter-Organizational Collaboration and Automation to Combat Online Hate Speech: A Qualitative Study with German Reporting Centers | |
| Duong et al. | Social media and privacy concerns: exploring university student’s privacy concerns in TikTok platform in Vietnam | |
| Ingber | Understanding screenshot collection and sharing on messaging platforms: a privacy perspective | |
| Pacilli et al. | Bystanders’ reactions to a woman victim of sextortion: Moral outrage, victim blaming and reputational damage | |
| Robertshaw et al. | Tweeting on dementia: A snapshot of the content and sentiment of tweets associated with dementia | |
| Lyerly | Study Finds AI Language Models Show Bias Against Individuals With Disabilities | |
| Alharthi et al. | Target-oriented investigation of online abusive attacks: A dataset and analysis | |
| Phillips | A significant solidus: Punctuating sexual exploitation with discretionary practices | |
| Himaja et al. | An AI based mental health support chat-bot for cyber bullied victims |