Competence Modeling in Twitter : Mapping Theory to Practice

Availability of “big data” from the Social Web provides a unique opportunity for synergy between the computational and social sciences. On one hand, psychologists and social scientists have developed and established models of human competence, credibility, trust and skill over many years. Currently, much research is being conducted by computer scientists to evaluate these human-behavioral aspects using real-world data from Twitter and other sources. However, many of these algorithms are formulated in an ad-hoc way, without much reference to established theory from the existing literature. This paper presents a framework for mapping existing models of human competence and skill onto a real world streaming data from a social network. An example mapping is described using the Dreyfus model of skill acquisition, and an analysis and discussion of resulting feature distributions is presented on four topic-specific data collections from Twitter, including one on the 2014 Winter Olympics in Sochi, Russia. The mapping is evaluated using human assessments of competence through a crowd sourced study of 150 participants.

[1]  Sibel Adali,et al.  Understanding Information Credibility on Twitter , 2013, 2013 International Conference on Social Computing.

[2]  Sibel Adali,et al.  Credibility in Context: An Analysis of Feature Distributions in Twitter , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[3]  Wendy Liu,et al.  Homophily and Latent Attribute Inference: Inferring Latent Attributes of Twitter Users from Neighbors , 2012, ICWSM.

[4]  Tobias Höllerer,et al.  Modeling topic specific credibility on twitter , 2012, IUI '12.

[5]  Luís Carriço,et al.  Proceedings of the 2012 ACM international conference on Intelligent User Interfaces , 2012 .

[6]  Scott Counts,et al.  Tweeting is believing?: understanding microblog credibility perceptions , 2012, CSCW.

[7]  Kevin Robert Canini,et al.  Finding Credible Information Sources in Social Networks Based on Content and Social Structure , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[8]  David Yarowsky,et al.  Hierarchical Bayesian Models for Latent Attribute Detection in Social Media , 2011, ICWSM.

[9]  Ana-Maria Popescu,et al.  A Machine Learning Approach to Twitter User Classification , 2011, ICWSM.

[10]  Barbara Poblete,et al.  Information credibility on twitter , 2011, WWW.

[11]  David Yarowsky,et al.  Classifying latent user attributes in twitter , 2010, SMUC '10.

[12]  Kyumin Lee,et al.  You are where you tweet: a content-based approach to geo-locating twitter users , 2010, CIKM.

[13]  Jahna Otterbacher,et al.  Inferring gender of movie reviewers: exploiting writing style, content and metadata , 2010, CIKM.

[14]  Barbara Poblete,et al.  Twitter under crisis: can we trust what we RT? , 2010, SOMA '10.

[15]  Hakan Ferhatosmanoglu,et al.  Short text classification in twitter to improve information filtering , 2010, SIGIR.

[16]  Ingmar Weber,et al.  The demographics of web search , 2010, SIGIR.

[17]  Barry Smyth,et al.  Using twitter to recommend real-time topical news , 2009, RecSys '09.

[18]  David Yarowsky,et al.  Modeling Latent Biographic Attributes in Conversational Genres , 2009, ACL.

[19]  Timothy W. Finin,et al.  Geolocating Blogs from Their Textual Content , 2009, AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0.

[20]  Lars Schmidt-Thieme,et al.  Proceedings of the third ACM conference on Recommender systems , 2008, RecSys 2008.

[21]  Ravi Kumar,et al.  "I know what you did last summer": query logs and user privacy , 2007, CIKM '07.

[22]  John C. Paolillo,et al.  Gender and genre variation in weblogs , 2006 .

[23]  Matt Thomas,et al.  Get out the vote: Determining support or opposition from Congressional floor-debate transcripts , 2006, EMNLP.

[24]  Claire Cardie,et al.  OpinionFinder: A System for Subjectivity Analysis , 2005, HLT.

[25]  Dell Zhang,et al.  Proceedings of HLT/EMNLP on Interactive Demonstrations , 2005 .

[26]  John Riedl,et al.  PolyLens: A recommender system for groups of user , 2001, ECSCW.

[27]  Sameer Singh,et al.  A Pilot Study on Gender Differences in Conversational Speech on Lexical Richness Measures , 2001, Lit. Linguistic Comput..

[28]  S. Epstein,et al.  Individual differences in intuitive-experiential and analytical-rational thinking styles. , 1996, Journal of personality and social psychology.

[29]  S. Dreyfus,et al.  A Five-Stage Model of the Mental Activities Involved in Directed Skill Acquisition , 1980 .

[30]  J. Mccroskey Scales for the measurement of ethos , 1966 .

[31]  J. O'Donovan,et al.  Cutting Through the Noise : Defining Ground Truth in Information Credibility on Twitter , 2013 .

[32]  Robert Thomson,et al.  Trusting tweets: The Fukushima disaster and information source credibility on Twitter , 2012, ISCRAM.

[33]  Eni Mustafaraj,et al.  From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search , 2010 .

[34]  John D. Burger,et al.  An Exploration of Observable Features Related to Blogger Age , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.

[35]  Paola Batistoni,et al.  International Conference , 2001 .