Opening the Black Box of Social Media Research Methods: SoMe Ways Forward

Size: px
Start display at page:

Download "Opening the Black Box of Social Media Research Methods: SoMe Ways Forward"

Transcription

1 Opening the Black Box of Social Media Research Methods: SoMe Ways Forward Work in progress by the SoMe UW: Joe Eckert*, Shawn Walker, Jeff Hemsley, Karine Nahon, and Bob Mason * orresponding author, jeckert1@uw.edu Abstract This workshop reports on a research effort that spans about 15 months. It describes how we have collected data on the Occupy Wall Street (OWS) movement, how we prepared this data for analysis and visualization, and the choices we have made in getting this far. We start from the position of social scientists (although several of us have technical backgrounds) because we became familiar with the difficulties and hurdles researchers face when attempting to research phenomena involving social media artifacts. We prepared this workshop so that you can learn from our experiences: what went right, what went wrong, and what could have been done better. You ll receive a first look at the SoMe Lab Toolkit, a work in progress that we currently use to query and analyze an extensive corpus of Twitter data. Moreover, by attending this workshop you also have the ability to shape this project-inprogress by sharing your own personal research needs and desires. Although our current project focuses on Twitter, the development of the platform as well as this workshop is oriented toward a more holistic practice of social media research across platforms. We want to help you make your research better, just as we hope that your input can improve our toolkit -- and you ll be first on the list to receive more information and software releases! 1. Context and Background Our Social Media Lab (SoMeLab.net) effort began because three of the founders shared an interest in social media as a means of social change. We began collecting data about the Occupy Wall Street (OWS) movement and found that Twitter appeared to be a hub for social media communications. Consequently, we directed much of our attention on collecting Twitter data, and we have amassed a collection of over 100 million tweets. As we examined the related literature, we discovered two things: social media research is popular; and most empirical papers were not very clear about the foundational assumptions and methods underlying the research. This is understandable--the decisions and assumptions in collecting and analyzing social media data can be complex and often require numerous tradeoffs. Adequately covering these complexities and tradeoffs would result in excessively long papers. However, the lack of detail about method and procedures constrains what other researchers can learn from such studies and limits the generalizability of the findings. We wanted to change this situation. What follows is a discussion of our own work on social media and the lessons we feel we have learned from our experiences. The objective of this synopsis is to sketch a framework for social media research decisions as we have experienced them. We provide examples of how HICSS Workshop 2013 Research in Social Media SoMeLab.net page 1

2 we made these decisions in our collection and analysis of Twitter data related to the Occupy Movement. We make no claim that this is an exhaustive list of choices or that the framework we describe will be best suited for everyone or even for us as we progress. This is clearly a work in progress. Our research continues, aided by almost $1 million from the US National Science Foundation [IIS : INSPIRE: Tools, Models, and Innovation Platforms for Research on Social Media]. One objective of the NSF-funded project is the development of an open source toolkit that will be shared with other researchers who may not be prepared to undertake the necessary technical development on their own. This HICSS workshop is an opportunity for us to share what we have learned so far and to get comments and feedback from participants. We would like the workshop to contribute to a widening conversation among social media researchers. We hope this conversation will enable the continual improvement of methods and a broader base of shared empirical studies. 2. Introduction This document is designed to offer insight into the decision-making processes that feed into methodological strategies for social media analysis. This accompanies the demonstration of the alpha version of SoMe Lab s Toolkit for Social Media collection and analysis. Far from an exhaustive review of analytical techniques, we use our own experiences collecting a corpus of social media data captured as relating to the Occupy Wall Street set of contentious politics and tactics (although not all data are related and not all related data can be captured). Using our own experiences as a case study, we hope to meet two objectives: First, we hope to illuminate some of the decisions that are often black boxed within academic writing about social media analysis. Second, we d like to inform some of the decisions you re likely to be making in your own social media projects, offering some considerations that are not obvious at first glance, difficult to derive from the Twitter documentation for developers, and may be costly to change later in the process. 3. Overview This document traces the different decisions we ve made and the possibilities for alternate decisions in light of heterogeneous research needs. We primarily review methods involving Twitter, as this is the first platform we elected to tackle in our study. We first cover the process of selecting a phenomenon to study, explaining what we chose. Next, we review the multiplicity of platforms available to social media researchers and provide an explanation of our decision to use Amazon Web Services in our own work. After describing platform selection, we then delve into the thorny question of exactly what data to capture, what options you have available to you via Twitter s set of APIs, and the reasons we selected the streaming API as an appropriate means of capturing an emergent event. Before you start, consider this: Social media data are ephemeral; site and links change often. URLs disappear, content changes, and pictures are removed. A good heuristic is to collect (meta) data as close to the time of posting as possible. Each social media platform has its own formula for matching keywords; be sure to understand this before you start collecting data. Different approaches are required for point-in-time (snapshot) vs. longitudinal data collection (curation of dynamic information). HICSS Workshop 2013 Research in Social Media SoMeLab.net page 2

3 After this overview we further outline the keyterm selection process of the streaming API by discussing rate-limiting, the processes of ongoing data curation, and how to handle the noise inherent in the data collection process. We briefly cover the often labyrinthine terms of service provided by Twitter to developers and how they might relate to you as a researcher. We conclude this document with a consideration of possible ethical dilemmas that a social media analyst might encounter. 4. A Research Method Outline The following is not the only procedure one can chose, but this outline gives us the opportunity to discuss the choices we made in our work. Your approach may differ, but we expect that you ll be making similar choices and tradeoffs. 4.1: Selecting a phenomenon The first step to any good research project is to figure out what exactly it is that you re supposed to be researching. Ideally, this might take the form of a well thought-out research question, particularly if you take a deductive approach to research development. However, sometimes quickly emerging events and the ephemeral nature of Twitter require a more inductive approach. We ll consider both methods in turn, and then explain why we opted for a grab it all and sort it out later approach with our own Occupy-related corpus. In general, it is best for academics to think of Twitter data as being ephemeral. Collecting (historical) tweets about a past event is either prohibitively expensive or not possible. This means that for a deductive approach we would need to know details about an event before it happens. There are many ways to do this. For example, you might be able to leverage existing connections within a community in which you re interested to determine future activities or topics of interest. Alternately, depending on the community, you may be able to derive this information from public meetings, listservs, personal communications with community partners, news publications, or observed use of social media platforms. This comes with two shortcomings: first, even well planned events can unfold unpredictably and spawn relevant data streams that may not be in the scope of the original search criteria. Second, a sudden emergent event could be relevant to a research agenda, but waiting to collect data until a solid research question is formed could result in missing an opportunity to collect critical data. Emergent events may demand a more inductive, grounded approach to data gathering. There are a number of ways that you can go about this, but we recommend participant observation as an initial approach to understanding how Twitter might be viewed by an end-user with an interest in the topic. Some questions you might ask yourself: is there anything having to do with my topic in the trending topics display from Twitter? Is there a website that participants in the phenomenon are using to organize collaborative work or workspaces? If you look at a highly used hashtag, are there other hashtags that frequently cooccur with that hashtag? By encountering Twitter data in the wild, you will gain a better sense of the limited perspective of a single user within the system. For our Occupy data corpus, we took an inductive, grounded route that we affectionately refer to as the baleen whale approach, named for the grand beast that filters delicious plankton from gallons upon gallons of ocean water. We hopped onto Twitter, looked initially at the hashtag HICSS Workshop 2013 Research in Social Media SoMeLab.net page 3

4 #ows, and found two major points of interest: first, an organizational site named OccupyTogether maintained a list of relevant hashtags, account names, and occupied locations via crowdsourcing. Second, we found a number of event-related tags, like #nov5 ( Bank Transfer Day ) that would have gone unnoticed without continued monitoring of related tweets and accounts associated with Occupy Wall Street. A careful accounting of related terms also forces the researcher to consider issues related to rate-limiting and the shifting representations of hashtags, covered later in this document. But first, we have to figure out where to place what will be a growing social media corpus. 4.2: Pick a computing platform In picking a computing platform with which to collect data, you will have to balance price, processing capabilities, storage, resources available to you and your organization, and the type/amount of data required to address your research project. It is worth noting that there are several paid solutions to social media data gathering available in the market that might be acceptable to your needs. However, no chain of custody exists for these data; you re reliant on third-party vendors to accurately provide the data which you re requesting. In many cases these tools do not explain how the data were collected, processed, or analyzed. In response to the limitations and expense of commercial tools, we are developing the SoMe Lab Toolkit which offers the capability to capture data in the raw as an alternative to third-party dependencies. We have successfully installed our toolkit on desktop, cloud computing services, and high performance computing environments. Using a desktop computer or laptop for data collection, analysis, and visualization is possible. This approach has three advantages: desktop processing is comparatively inexpensive, requires little knowledge of high performance computing environments, and may be more than sufficient for communities of interest using Twitter in a way to produce a smaller dataset. The desktop approach also has significant limitations, and these drawbacks warrant considering other computing platforms. A key requirement is that data collection requires constant connectivity; an interruption in connectivity means a potentially irretrievable loss of data, and a complete data collection may be essential to the research. Other limitations are the potential need for faster computation, larger memory, and even larger storage than the typical desktop/laptop solution can provide. Other solutions include services that might be provided by the department or university or commercial cloud-based services such as Amazon Web Services (AWS) or Rackspace. Factors affecting the choice of services include the financial ones of price (set up and ongoing), technical support (responsiveness), and sustainability. 4.3: Collect the Data The data you re able to collect and consequently explore depends on several factors: your computing capacity as described above, the application programming interfaces (APIs) to which you have access for a given platform, the resources made available to you via these APIs, and the methods by which you perform your collection. These are all interrelated issues that change drastically given a difference in platforms. The SoMe Lab Toolkit is initially constructed to gather and explore Twitter data, so we ll be using Twitter as a means to explain what some of these ramifications look like, with a particular attention to different APIs available within Twitter HICSS Workshop 2013 Research in Social Media SoMeLab.net page 4

5 and how that might shape your research methodology. We conclude with a few initial considerations about the actual process of exploration, keeping in mind that this might look differently depending on your research goals. Twitter has numerous APIs that we will not describe in detail in this document. Twitter s documentation for these APIs is written for developers. It can often be quite confusing. Each of these APIs has a specific purpose, and each comes with its own list of advantages and disadvantages. As a result, researchers must spend time pondering which API would fit best with their research. We ll focus on two specific APIs that a great deal of current research tends to utilize: the Streaming API and the Search API. We use the Streaming API in order to obtain real-time ephemeral data from Twitter s network. The streaming API has two main advantages over other APIs in the REST architecture. First, the rate limits are higher allowing users with the default level of access to receive up to 1% of the Twitter stream at any point in time. Second, the streaming API pushes data out rather than forcing the software on the user s end to check for additional data at regular intervals (polling). The remaining components to the REST API are focused on the development of client applications or accessing specific user s Twitter streams -- each of these require authorization from the user. The Search API does not offer real-time access to tweets. Instead, it offers historical access to tweets over about a 6-9 day window. Unlike the streaming API, this is not intended to be an exhaustive collection of tweets that match the terms of your search query, so it s unlikely to be useful unless you have an extremely small amount of tweets to collect. Likewise, you can t assume that the returned results represent a random sample. Twitter documentation is frustratingly opaque about how the method by Twitter selects which tweets you receive. In our work, we elected to utilize the streaming API. The Occupy Wall Street event was emergent, and we expected related events to outlast the 6-9 day window of the Search API. We anticipated the volume of tweets gathered to be fairly extensive and suspected that the rate of collection might vary from day to day. Our research team enjoys sleeping, so we thought it best if we didn t need to manually poll the Search API on a regular basis. Many of our team members have quantitative backgrounds, so curating an exhaustive collection of tweets that matches our list of keyterms would give us a more reliable sample and allow us to consider it complete with regard to our keyterm match. We didn t utilize other REST API components because authorization via the user would have drastically limited our ability to react elastically to changing events, as well as making the process of IRB approval considerably more onerous. Our team is unable to code mobile applications at this time, so we thought it best to spend our energies elsewhere. 4.4: Explore and Refine the Data Our experience suggests that iterative data exploration should be a priority in the development of your research project. At the most basic level, initial data exploration ensures that your collection system is working properly and that you re collecting the types of Tweets you re intending to collect. You ll also be more aware of rate-limiting events as they happen, and will allow you to tweak your keyterm list to account for under- or over-collection. If your approach is deductive or quantitative in nature, it may not make sense to iterate the keyterm gathering list over time; however, as explained above, it isn t terribly difficult to query out specific components of your dataset. This means that keeping the original and subsequent HICSS Workshop 2013 Research in Social Media SoMeLab.net page 5

6 revisions of your keyterm list (with dates!) will allow quantitative members of your team to iterate their samples according to the keyterms collected over a given date range. It still remains important to continue looking at your keyterm collection list in conjunction with the data you re gathering, largely owing to the mutability of hashtags as explained above. If your approach is inductive or qualitative in nature, you ll almost certainly want to iterate your keyterm gathering list over time. Our system currently does not deal with this issue automatically, but it is feasible to count terms that co-occur with your already existing dataset using database queries. One other possible approach is to stake out a participant observer who is responsible for monitoring various Twitter datastreams. The difficulty lies in creating a plan for continual iteration at the outset of your project; without such a plan, ongoing curation of the dataset becomes increasingly difficult. As one aspect of data exploration, we encourage you to engage with Twitter (or other focal social media platform) whether you are taking a quantitative or qualitative approach. Within our own team, we ve noticed that members who are versed in the norms of a social media platform can (sometimes) discern bot accounts from non-automated users, topically related information from marketing ploys. These experienced members generally gain a feel for the mutability of the topic through everyday living on a social media platform. Moreover, the social media platforms are a wonderful outlet for research outreach to communities outside the ivory tower and the feedback can be insightful. Regardless, you ll need to initially explore the data you receive to determine if your research questions and methods remain appropriate. Depending on the type of research you are doing and how much data you are collecting, this can be as simple as scanning the tweet text or as involved as creating network visualizations to get a sense of the complexity of relationships among actors, groups, and meta-data. Simple descriptive statistics can give you an idea of what s in the data, but maybe not the correct idea. Reporting the average will not tell the story if your data is multi-modal or is distributed in a non-normal way. Statisticians have long advised plotting your data as way to help you make sense of it, but when your research questions are complex or you have a massive dataset, you face a number of challenges. Here are some examples: Which fields to use: Twitter returns more than 20 meta data fields, many with sub fields. Often it is necessary to extract a small sample of documents to get familiar with the structure of the data. Be aware that Twitter returns different fields in different cases and adds new fields from time to time. Also, don t assume a consistent data type: retweet count was limited to NULL, 1:99 and Volume of data: Count before find is a good rule of thumb for saving time. A find on all Tweets with OccupyOakland, depending on your settings, can return more data than you really want. Note that programs like Excel work well on datasets with less than a few tens of thousands of rows, otherwise consider using some other tool (R, SPSS, SAS, Stata, etc...). HICSS Workshop 2013 Research in Social Media SoMeLab.net page 6

7 Multiple Plots: The same dataset can look very different depending on how you plot it. The same dataset was used for each of the plots in the diagram above. Multiple plots allow us to examine the data in different ways, but this approach raises some cautions. For example, the plot on the bottom left and bottom right use different techniques for sorting, which could lead to different interpretations. Often the data are complex and standard types of plots - line, bar, pie, network - do not help in understanding what you have or in communicating it with others. Suppose you want to get a sense of the changing volume of tweets, retweets, user participation and user intensity on a given set of tweets. You can print many plots and compare them, but can also iteratively experiment with different ways to visualize the data as a whole (see the bottom left and right corners of the plot above). Visualizations can offer a means by which to holistically evaluate large datasets that would be too time-consuming to analyze as individual artifacts. Equivalent to histograms or data plots for quantitative samples, such diagrams can be especially helpful in emergent research or grounded theory approaches. In exploratory research, visualizations can be generative (suggest hypotheses or theories), confirmatory (for postulates or initial ideas), and test the limits of more established models. 5. Other Concerns 5.1: Complexity of keyterm search Whichever decisions you elect to make, whether they be inductive or deductive approaches, search or streaming APIs, ongoing curation or static keyterm sets, the selection of keyterms is a key component to robust social media research design. Selecting keyterms is more complex than we envisioned. The choice has a myriad number of pitfalls that we initially didn t expect. This section is summarizes how keyterm matching operates and offers some suggestions regarding keyterm selection constructed from our own experiences. First, it helps to know a little bit about how what a keyterm list is and how it operates in relation to the data. For Twitter, the public end point offers a very generous match. If the HICSS Workshop 2013 Research in Social Media SoMeLab.net page 7

8 keyterm appears in the text of the tweet, the URL (extended URL?), or within the text of mention, the entire Tweet and its associated metadata is relayed through the API for capture. So for instance, if your keyterm is chicken, the tweet This chicken is finger lickin good! would be captured. This is not limited to hashtags, although many researchers elect to focus on hashtags as either an initial means or their entire means of keyterm selection. Regardless of what keyterms you select, you re likely to run into some difficulties along the way. We discovered that the actual selection of keyterms is a bit trickier than we initially guessed, judging by some of the barriers we ve seen within our own work. These can roughly be grouped into three categories: issues with the volume of tweets, issues concerning the mutable qualities of keyterms and hashtags, and issues regarding the (often misunderstood) noise issue within data (borrowing the more formal terms from information searching, we might refer to this as the precision and recall issue). Volume. The volume of the tweets you re collecting over time is of primary concern because of rate-limiting. Rate-limiting is the process by which the Twitter API detects your project collection exceeding the 1% sample granted by default levels of access, which causes tweets exceeding this amount to be discarded. Moreover, the process of rate-limiting remains black boxed; we re unsure whether or not this is either a representative or random sample. Because of some of the complications with real-time database services that don t necessarily serve queries in temporal order, we think both situations are highly unlikely. Once you re rate-limited, you no longer have a complete sample for that keyword, nor do you have a representative or random sample. This forecloses certain modes of research. Keyterm selection has a lot to do with whether or not you experience rate-limiting in your own project. Extremely popular terms can instigate rate-limitation. For instance, two of the most popular hashtags on Twitter, #p2 (progressive political tweets) and #tcot (top conservatives on Twitter), will find you nearly immediately rate limited using the default 1% sample. This means that monitoring your collection for rate-limitations during the initial deployment as well as periods where a keyterm might see a significant increase in usage. Within our own work, we found that our 176 keyterms (one of which was #ows, the main keyterm for the movement) allowed us to stay below rate-limitations. Mutuability. You may find that (some) keyterms are mutable in unexpected ways. This seems to particularly happen in cases where hashtags are being selected for keyterm match. We ve noticed in many cases that long hashtags within our main Occupy-related corpus become truncated, perhaps to free up some of the limited 140 characters within a tweet. For instance, users of #occupyoakland would eventually take up #oo as their main hashtag. If you re studying #yourconference2012, the tag may change to #yourconf12. These mutations may also cause unintended consequences for your dataset -- for instance, who knew that #oo bears relevance to tweets made in Portuguese? In our case, we ve got a lot of noise to sort through, leading us to issues of validity and noise. Precision and recall. You can t collect all of the tweets related to a topic or community. You can t collect only those tweets related to a topic or community. And even given these two sources of errors, you don t want to delete Tweets. For instance, consider the following hypothetical tweet: Where did all of these hippies in the Financial District come from? This tweet is almost certainly related to Occupy Wall Street, but none of the words in the text could feasibly be used given our previous keyterm guidelines. So if we were to say we ve collected every tweet about Occupy, we d certainly be incorrect, as would anyone who makes such a HICSS Workshop 2013 Research in Social Media SoMeLab.net page 8

9 claim. Likewise, your keyterm selection will also almost always contain some noise unless you ve been extremely conservative in your selection. Consider the #oo example above. Removing #oo would entirely eliminate the later more popular Occupy Oakland hashtag. Removing tweets according to language would remove Portuguese speakers actually concerned about Occupy Oakland or events happening there, including local and international speakers. Don t concern yourself too much about noise at the outset! for instance, we captured protest activity in Nigeria termed Occupy Nigeria but having arguably little relation to OWS in terms of types of protest activity, goals, causality, or actors. So don t delete Tweets from your database. You can t re-obtain them after they re gone, and you ruin the validity gained by having every Tweet that matches your keyterm set. You can always query out Tweets that don t match your current research objectives, or create separate databases for those that do. 5.2: Terms of service One of the unfortunate hurdles social media researchers face is how to deal with the myriad terms of service (ToS) associated with each platform, at both the level of the user as well as the level of the developer or person accessing the API. We recommend finding the pages related to these terms of service at each of these labels, and setting up an alert for when these pages change, as they can often do so without warning. There is little uniformity to these across platforms, which may mean some platforms are more open to research possibilities than others. For Twitter, the most relevant ToS involve what you can do with the data that you collect. At the time of this writing (an extremely important boundary here), the most relevant rule is that you can t share raw data with another party unless you pay Twitter s licensing fees or are directly in collaboration with another researcher. It isn t terribly clear what that last phrase means, but to our knowledge the most stringent action taken against a researcher has been delivery of a cease & desist notice. You are permitted to share aggregated data that has been stripped of identifying features as noted in their ToS. Because the purpose of the SoMe Lab Toolkit is to provide an opening for you to avoid paying third-party vendors of licensed Tweets, if you use this toolset, you ll be collecting the data yourself. This also allows you access to all of the raw data through your own means. This does mean that you re bound by Twitter s ToS regardless of which toolset you use, including our own. So be extremely cautious in sharing the data you collect. 5. Ethics We believe that social media researchers have a special ethical obligation to consider the risks and potential impacts of their research. We have observed that the boards within institutions originally tasked with evaluating risks to human participants over the past decades have become increasingly concerned with the protection of the research institution itself, with an aim of avoiding legal entanglement associated with research and research findings. The local policies and practices vary considerably, but our experiences at universities with medical schools suggest that the local institutional review boards (IRBs) are better equipped to deal with biological and medical research issues than with social science research. Because you often can make the case for social media data as public, it s possible that you won t have much trouble from your own IRB. This section is intended to help move you beyond what s good enough for IRB human subjects review and into a mode of research that treats subjects ethically and responsibly. To that end, we ll review what it might mean to be public with regard to social media use both from IRB s perspective and the perspectives gleaned from HICSS Workshop 2013 Research in Social Media SoMeLab.net page 9

10 ethnographic work with social media users. We ll then turn to a discussion of risk with regard to the subjects of social media research, focusing on ramifications largely gleaned from our panel discussion at the Internet Research 13 (IR13) conference. We d also like to point you to the Association of Internet Researchers document dealing with the ethics of internet research as a more robust piece that addresses items we re unable to note due to space and time constraints. You can find that document at this address: Public is an increasingly bizarre concept in today s rich information ecosystem, and the notion of whether or not certain activities are public is a main point of contention in a human subjects review. The truth is, thanks to the ToS for most social media platforms, the content within these platforms is deemed publically available, both legally and in regards to a human subject review. This means that you re unlikely to face resistance toward your research project if you stick to public streams. However, this doesn t necessarily mean that users intend for their actions to be public. For instance, you may have picked your nose in a public space at some point in your life. We d suspect that you d rather not be photographed picking your nose and then see that photograph on the front page of Reddit. Sometimes public actions aren t intended for public consumption. As danah boyd and Kate Crawford discuss in their 2011 paper, 1 the explosion of interest in Big Data presents challenges for researchers looking at the traces people leave as they interact with artifacts, systems, and other people. They point out issues associated not only with data collection but also with the research methods used. Helen Nissenbaum s work (2010) 2 considers the fundamental issue of privacy from a privacy in context perspective, looking at the reasonable expectations individuals and groups may have about their social behavior being observed (or recorded) in different settings. Taking this viewpoint, researchers might place themselves in the position of those being observed and ask what they would like to have reported about their behavior. In spite of the terms of service and legal protections available, users often don t think of the data they produce as being open to public consumption. While this legal gray area is profitable for social media companies, we feel that researchers should give more attention to the ethical dimensions of our work. One useful framework for evaluating your ethical obligations as a researcher is a consideration of risk to the subjects whom you study. Carefully evaluating the visibility of subjects within your research reports is tremendously important with social media, as many social media platforms are archived, catalogued, and searchable through a variety of different engines. With that in mind, you might consider using pseudonyms for users instead of their actual user accounts in reports. This might not be an issue for public figures (e.g., George Takei), but it should certainly be taken into consideration for those who don t fit that metric. Likewise, directly quoting the text of tweets allows the text to be tied to a user account regardless of whether or not you use a pseudonym. Search engines may only allow for a limited number of days retrievable through a social media platform, but folks with unfettered access to the platform can also likewise match the user to the tweet. Keep in mind that 1 boyd, danah and Crawford, Kate, Six Provocations for Big Data (September 21, 2011). A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, September Available at SSRN: or 2 Nissenbaum, Helen Fay Privacy in context : technology, policy, and the integrity of social life. Stanford, Calif.: Stanford Law Books. HICSS Workshop 2013 Research in Social Media SoMeLab.net page 10

11 unfettered access often also means historical access, which means platforms, state-interests, and market elite can all match your research report to the users in question. Does this put your users at risk? It depends entirely on your research. You should also think about the security of your data, both in terms of technical security and legal security. In terms of technical security, you ll want to ensure that all of your data are encrypted, particularly if your subjects may be at risk from your research. Amazon Web Services do this extremely well with little intervention on your part. But once your data leave an encrypted environment, have a plan to protect the data which might include encrypted file folders with password protection, perhaps on media that you can lock in a filing cabinet. Likewise, don t keep your data in unsecured locations, such as a cloud based service like Dropbox. In terms of legal security, if you are part of a state-funded school or receive federal funding for your research, your work may be subject to a Freedom of Information Act request. To this end, we highly recommend using non-university associated accounts to discuss research. And never send your data across accounts. And as with all work involving human subjects, you may find yourself in morally compromising situations involving the law. You may uncover illegal activity through the collection of your tweets. Likewise, law enforcement officials may also request your data, as they ve subpoenaed Twitter for some of the tweets related to Occupy activities. You ll ideally want to have a plan in place for each of these instances before they come to pass, particularly in relation to what your institutional policies regarding the independence of researchers. 6. Conclusion Social media research is challenging. As an emerging field, current social media work presents even experienced researchers with some of the most interesting and exciting yet some of the most perplexing socio-technical opportunities we can imagine. If our experience in the SoMe Lab is typical, researchers going into this emerging field find themselves diving deeper into technical issues and socio-ethical questions than they initially expect. Our work has required developing new technical skill sets and gaining experience with a dynamic and sometimes bewildering set of rules and terms of service. We see the need for all of us working in the field to share experiences and research tools and to develop a shared set of expectations for reporting our findings. Although each project may be unique and require multiple decisions, we see the value in finding efficient ways to make these decisions transparent (through standards or other frameworks), as the details of these decisions can significantly affect the research outcomes. Our open source SoMe Lab toolkit can be one part of a foundation for sharing work, lowering the technical barriers to social media research. However, it can only be the beginning of what we see as what can be a broad-based community of researchers who share what we are learning about how to improve our approaches. At our HICSS workshop, we ll be seeking ways to maintain such a learning community. HICSS Workshop 2013 Research in Social Media SoMeLab.net page 11

ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE

ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE Best Practices to Scale Oracle Service Cloud Analytics for High Performance ORACLE WHITE PAPER MARCH 2015 Table of Contents Target Audience

More information

6 Steps to Faster Data Blending Using Your Data Warehouse

6 Steps to Faster Data Blending Using Your Data Warehouse 6 Steps to Faster Data Blending Using Your Data Warehouse Self-Service Data Blending and Analytics Dynamic market conditions require companies to be agile and decision making to be quick meaning the days

More information

Tables in the Cloud. By Larry Ng

Tables in the Cloud. By Larry Ng Tables in the Cloud By Larry Ng The Idea There has been much discussion about Big Data and the associated intricacies of how it can be mined, organized, stored, analyzed and visualized with the latest

More information

The Emerging Ethics of Studying Social Media Use with a Heritage Twist

The Emerging Ethics of Studying Social Media Use with a Heritage Twist The Emerging Ethics of Studying Social Media Use with a Heritage Twist Sophia B. Liu Technology, Media and Society Program, ATLAS Institute University of Colorado, Boulder, CO 80302-0430, USA Sophia.Liu@colorado.edu

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45 Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net

More information

GUIDE Social Media Strategy Guide. How to build your strategy from start to finish

GUIDE Social Media Strategy Guide. How to build your strategy from start to finish GUIDE Social Media Strategy Guide How to build your strategy from start to finish Social Media Strategy Guide How to build your strategy from start to finish Whether you re a social media coordinator for

More information

Improving on a Good Idea from Employee Survey to Measurecom tm

Improving on a Good Idea from Employee Survey to Measurecom tm Improving on a Good Idea from Employee Survey to Measurecom tm Theresa M. Welbourne, Ph.D. Associate Professor of Organization Behavior and Human Resource Management University of Michigan Business School

More information

Top 5 best practices for creating effective dashboards. and the 7 mistakes you don t want to make

Top 5 best practices for creating effective dashboards. and the 7 mistakes you don t want to make Top 5 best practices for creating effective dashboards and the 7 mistakes you don t want to make p2 Financial services professionals are buried in data that measure and track: relationships and processes,

More information

CORRALLING THE WILD, WILD WEST OF SOCIAL MEDIA INTELLIGENCE

CORRALLING THE WILD, WILD WEST OF SOCIAL MEDIA INTELLIGENCE CORRALLING THE WILD, WILD WEST OF SOCIAL MEDIA INTELLIGENCE Michael Diederich, Microsoft CMG Research & Insights Introduction The rise of social media platforms like Facebook and Twitter has created new

More information

TRANSACTION DATA ENRICHMENT AS THE FIRST STEP ON THE BIG DATA JOURNEY

TRANSACTION DATA ENRICHMENT AS THE FIRST STEP ON THE BIG DATA JOURNEY TRANSACTION DATA ENRICHMENT AS THE FIRST STEP ON THE BIG DATA JOURNEY A key part of its industry-leading platform for digital financial services, the new Yodlee TransactionDataEnrichment solution enables

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts.

Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. Best Practices for Monitoring: Reduce Outages and Downtime. Develop an effective monitoring strategy with the right metrics, processes and alerts. 1 TABLE OF CONTENTS INTRODUCTION WHAT TO MONITOR ENSURING

More information

Top 5 Mistakes Made with Inventory Management for Online Stores

Top 5 Mistakes Made with Inventory Management for Online Stores Top 5 Mistakes Made with Inventory Management for Online Stores For any product you sell, you have an inventory. And whether that inventory fills dozens of warehouses across the country, or is simply stacked

More information

The Complete Guide to DEVELOPING CUSTOM SOFTWARE FOR ANY BUSINESS CHALLENGE

The Complete Guide to DEVELOPING CUSTOM SOFTWARE FOR ANY BUSINESS CHALLENGE The Complete Guide to DEVELOPING CUSTOM SOFTWARE FOR ANY BUSINESS CHALLENGE Developing Custom Software for Any Business Challenge: The Complete Guide Copyright 2015 Published by Art & Logic All rights

More information

IFF SOCIAL MEDIA GUIDE

IFF SOCIAL MEDIA GUIDE IFF SOCIAL MEDIA GUIDE 2014 INTERNATIONAL Table of content Social Media in short:...2 Basic Social Media Guidelines...2 Social Media Use Policy in short...3 The Golden Rules of Social Marketing (Marketo)...4

More information

smart. uncommon. ideas.

smart. uncommon. ideas. smart. uncommon. ideas. Executive Overview Your brand needs friends with benefits. Content plus keywords equals more traffic. It s a widely recognized onsite formula to effectively boost your website s

More information

STEPS TO COLLECTING AMAZING CUSTOMER FEEDBACK. a publication of

STEPS TO COLLECTING AMAZING CUSTOMER FEEDBACK. a publication of 5 STEPS TO COLLECTING AMAZING CUSTOMER FEEDBACK a publication of Contents INTRODUCTION....1 STEP 1: SET GOALS...2 STEP 2: CHOOSE A SOLUTION...3 STEP 3: PUT IT EVERYWHERE...5 STEP 4: RESPOND IN A TIMELY

More information

Windows IT Pro. Storage Optimization for. SharePoint. by David Chernicoff. sponsored by. Brought to you by AvePoint and Windows IT Pro

Windows IT Pro. Storage Optimization for. SharePoint. by David Chernicoff. sponsored by. Brought to you by AvePoint and Windows IT Pro Windows IT Pro Storage Optimization for SharePoint by David Chernicoff sponsored by Tech Advisor AvePoint p. 2 Contents Chapter 1 Dealing with Existing and Legacy Data page 3 Chapter 2 Optimizing SharePoint

More information

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints

More information

Why You Need Email Archiving

Why You Need Email Archiving Why You Need Email Archiving www.exclaimer.com Table of Contents Introduction...2 The IT Administrator...3 The Email User...5 The Team Leader...6 The Senior Manager/Business Owner...7 Conclusion...8-1

More information

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective

VMware vcenter Log Insight Delivers Immediate Value to IT Operations. The Value of VMware vcenter Log Insight : The Customer Perspective VMware vcenter Log Insight Delivers Immediate Value to IT Operations VMware vcenter Log Insight VMware vcenter Log Insight delivers a powerful real-time log management for VMware environments, with machine

More information

Measure Social Media like a Pro: Social Media Analytics Uncovered SOCIAL MEDIA LIKE SHARE. Powered by

Measure Social Media like a Pro: Social Media Analytics Uncovered SOCIAL MEDIA LIKE SHARE. Powered by 1 Measure Social Media like a Pro: Social Media Analytics Uncovered # SOCIAL MEDIA LIKE # SHARE Powered by 2 Social media analytics were a big deal in 2013, but this year they are set to be even more crucial.

More information

Putting Critical Applications in the Public Cloud. The Very Latest Best Practices & Methodologies

Putting Critical Applications in the Public Cloud. The Very Latest Best Practices & Methodologies Putting Critical Applications in the Public Cloud The Very Latest Best Practices & Methodologies Business White Paper December 2011 Introduction Many organizations are beginning to realize that there are

More information

Visualization methods for patent data

Visualization methods for patent data Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes

More information

CREATE TAX ADVANTAGED RETIREMENT INCOME YOU CAN T OUTLIVE. create tax advantaged retirement income you can t outlive

CREATE TAX ADVANTAGED RETIREMENT INCOME YOU CAN T OUTLIVE. create tax advantaged retirement income you can t outlive create tax advantaged retirement income you can t outlive 1 Table Of Contents Insurance Companies Don t Just Sell Insurance... 4 Life Insurance Investing... 5 Guarantees... 7 Tax Strategy How to Get Tax-Free

More information

Web applications today are part of every IT operation within an organization.

Web applications today are part of every IT operation within an organization. 1 Introduction Web applications today are part of every IT operation within an organization. Independent software vendors (ISV) as well as enterprises create web applications to support their customers,

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Medium Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external sources

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

What is a Social Media Playbook, and Why Do I Need One?

What is a Social Media Playbook, and Why Do I Need One? What is a Social Media Playbook, and Why Do I Need One? Table of Contents Introduction 03 Start at the Beginning 05 Determine Roles, Responsibilities, and Expectations 06 Decide What Needs a Response 08

More information

Six Signs. you are ready for BI WHITE PAPER

Six Signs. you are ready for BI WHITE PAPER Six Signs you are ready for BI WHITE PAPER LET S TAKE A LOOK AT THE WAY YOU MIGHT BE MONITORING AND MEASURING YOUR COMPANY About the auther You re managing information from a number of different data sources.

More information

USER GUIDE. 2013 VMware, Inc. Web: socialcast.com Twitter: @socialcast

USER GUIDE. 2013 VMware, Inc. Web: socialcast.com Twitter: @socialcast 2013 VMware, Inc. Web: socialcast.com Twitter: @socialcast Table of Contents GET STARTED 1 Edit Your Profile 1 Select Notifications Preferences 2 Change Your Password 2 Invite Others to Your Community

More information

Controlling Hybrid IT Spend BY DAVID S. LINTHICUM

Controlling Hybrid IT Spend BY DAVID S. LINTHICUM Controlling Hybrid IT Spend A WHITE PAPER BY DAVID S. LINTHICUM Contents Executive Summary 3 The Rise of Hybrid IT 5 What is a Hybrid Cloud? 7 The Need for Consumption Tracking 7 The Need for Visibility

More information

Winning with an Intuitive Business Intelligence Solution for Midsize Companies

Winning with an Intuitive Business Intelligence Solution for Midsize Companies SAP Product Brief SAP s for Small Businesses and Midsize Companies SAP BusinessObjects Business Intelligence, Edge Edition Objectives Winning with an Intuitive Business Intelligence for Midsize Companies

More information

Contents. Meltwater Quick-Start Guide

Contents. Meltwater Quick-Start Guide Meltwater Quick-Start Guide Contents Introduction... 2 Meltwater at a Glance... 2 Logging in... 3 Account Management... 3 Searches... 4 Keyword Search... 6 Advanced Search... 7 Source Selections... 9 Inbox...

More information

Using Twitter for Business

Using Twitter for Business Using Twitter for Business The point is, Twitter can be a tremendously valuable marketing tool! In this section, we ll explain some specific usecases of Twitter for marketing. HOW TO USE TWITTER FOR MARKETING:

More information

Using Social Media to Plan and Promote Your Events

Using Social Media to Plan and Promote Your Events Using Social Media to Plan and Promote Your Events Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 Phone: 1-866-876-8464 How to Use Social Media to Plan and Promote Your Events An

More information

A New Foundation For Customer Management

A New Foundation For Customer Management The Customer Data Platform: A New Foundation For Customer Management 730 Yale Avenue Swarthmore, PA 19081 info@raabassociatesinc.com The Marketing Technology Treadmill Marketing automation. Inbound marketing.

More information

WordPress SEO 101 http://philacsinclair.com

WordPress SEO 101 http://philacsinclair.com WordPress SEO 101 http://philacsinclair.com Copyright All rights reserved worldwide. YOUR RIGHTS: This book is restricted to your personal use only. It does not come with any other rights. LEGAL DISCLAIMER:

More information

Multi-Factor Authentication

Multi-Factor Authentication Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to

More information

DEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you.

DEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you. DEMYSTIFYING BIG DATA What it is, what it isn t, and what it can do for you. JAMES LUCK BIO James Luck is a Data Scientist with AT&T Consulting. He has 25+ years of experience in data analytics, in addition

More information

OPEN TEXT VS. WORD CLOUDS. Your guide to making the most of your qualitative data

OPEN TEXT VS. WORD CLOUDS. Your guide to making the most of your qualitative data OPEN TEXT VS. WORD CLOUDS Your guide to making the most of your qualitative data THE TROUBLE WITH QUALITATIVE DATA Identifying patterns in open ended questions Qualitative data, which is collected via

More information

Exploratory Data Analysis with R

Exploratory Data Analysis with R Exploratory Data Analysis with R Roger D. Peng This book is for sale at http://leanpub.com/exdata This version was published on 2015-11-12 This is a Leanpub book. Leanpub empowers authors and publishers

More information

Add Social Media to Your Event Strategy

Add Social Media to Your Event Strategy Add Social Media to Your Event Strategy Tips on how to build buzz & boost attendance 2012 Copyright Constant Contact, Inc. 12-XXXX BEST PRACTICES Guide Social Media MARKETING An event be it a networking

More information

Planning a Responsive Website

Planning a Responsive Website Planning a Responsive Website Planning a website is important for both web designers and website owners. Planning your website before you start building it can save you time, keep your site code more accurate

More information

IBM Cognos Analysis for Microsoft Excel

IBM Cognos Analysis for Microsoft Excel IBM Cognos Analysis for Microsoft Excel Explore and analyze data in a familiar spreadsheet format Highlights Explore and analyze data drawn from IBM Cognos TM1 models and IBM Cognos Business Intelligence

More information

Compass Interdisciplinary Virtual Conference 19-30 Oct 2009

Compass Interdisciplinary Virtual Conference 19-30 Oct 2009 Compass Interdisciplinary Virtual Conference 19-30 Oct 2009 10 Things New Scholars should do to get published Duane Wegener Professor of Social Psychology, Purdue University Hello, I hope you re having

More information

The Cloud for Insights

The Cloud for Insights The Cloud for Insights A Guide for Small and Midsize Business As the volume of data grows, businesses are using the power of the cloud to gather, analyze, and visualize data from internal and external

More information

HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM

HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM Prepared by Gwen Thomas of the Data Governance Institute Contents Why Data Governance?... 3 Why the DGI Data Governance Framework

More information

WHITE PAPER. The Five Fundamentals of a Successful FCR Program

WHITE PAPER. The Five Fundamentals of a Successful FCR Program The Five Fundamentals of a Successful FCR Program April 2012 Executive Summary Industry analysts agree that First Contact Resolution (FCR) is the best way to measure the effectiveness of your contact center.

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Is Your Data Cloud Ready?

Is Your Data Cloud Ready? WHITE PAPER Is Your Data Cloud Ready? Of all the questions to be answered before taking advantage of the cloud, this one is the most pertinent; is my data cloud ready? The question is especially important

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED.

9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED. 9 Principles of Killer Dashboards SELL. SERVICE. MARKET. SUCCEED. The information provided in this e-book is strictly for the convenience of our customers and is for general informational purposes only.

More information

Building a Better Business Process

Building a Better Business Process Building a Better Business Process How Splunk Software is Used to Provide Real-time Visibility Into Sales and Marketing Data CUSTOMER profile Splunk customer profiles are a collection of innovative, in-depth

More information

Supplier Invoice Inefficiency: The truth behind the AP process and how automation can fix it

Supplier Invoice Inefficiency: The truth behind the AP process and how automation can fix it Supplier Invoice Inefficiency: The truth behind the AP process and how automation can fix it 01 Picture this: Scenario 1: Your supplier emails their invoice directly to your online invoice system. It s

More information

Machine Data Analytics with Sumo Logic

Machine Data Analytics with Sumo Logic Machine Data Analytics with Sumo Logic A Sumo Logic White Paper Introduction Today, organizations generate more data in ten minutes than they did during the entire year in 2003. This exponential growth

More information

Barcodes and the Small Business Manufacturer

Barcodes and the Small Business Manufacturer Barcodes and the Small Business Manufacturer The small manufacturer that hasn t yet instituted the use of barcodes in their operations can usually cite one of two reasons. One, they just don t see what

More information

Improving Business Insight

Improving Business Insight Improving Business Insight A GUIDE FOR SMALL AND MID-SIZED BUSINESSES Why Does Understanding Business Data Matter for Your Company? You know your business better than anyone else, and making decisions

More information

A guide to explain it all By: Patrick Cauley - IT Babble.com. Version 3.1

A guide to explain it all By: Patrick Cauley - IT Babble.com. Version 3.1 A guide to explain it all By: Patrick Cauley - IT Babble.com Version 3.1 Table of Contents What is Edmodo? 1 Getting Started for Teachers 2 Student Sign up 4 The Basics of Posting 6 Working with Assignments

More information

Seven Things You Must Know Before Hiring a Real Estate Agent

Seven Things You Must Know Before Hiring a Real Estate Agent Seven Things You Must Know Before Hiring a Real Estate Agent 1 Introduction Selling a home can be one of the most stressful situations of your life. Whether you re upsizing, downsizing, moving across the

More information

SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT!

SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! SPECIAL REPORT: 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! 4 BIG REASONS YOU CAN T AFFORD TO IGNORE BUSINESS CREDIT! Provided compliments of: FIRSTUSA DATA SERVICES, LLC 877-857-5045 SUPPORT@FIRSTUSADATA.COM

More information

Scale-Free Extreme Programming

Scale-Free Extreme Programming Scale-Free Extreme Programming Kent Beck, Three Rivers Institute A question that has vexed Extreme Programming from its inception is, How does it scale? Sometimes the scaling question is asked out of legitimate

More information

THE BENEFITS AND RISKS OF CLOUD PLATFORMS

THE BENEFITS AND RISKS OF CLOUD PLATFORMS THE BENEFITS AND RISKS OF CLOUD PLATFORMS A GUIDE FOR BUSINESS LEADERS DAVID CHAPPELL JANUARY 2011 SPONSORED BY MICROSOFT CORPORATION Cloud platforms are a fundamental part of the move to cloud computing.

More information

Five key trends are reshaping customer- experience management:

Five key trends are reshaping customer- experience management: Top Five Contact Center Trends for 2013 By Irwin Lazar VP and Service Director, Nemertes Research Executive Summary Five key trends are reshaping customer- experience management: ± Increasing adoption

More information

Selecting an Email Service Provider

Selecting an Email Service Provider Why Outsourcing the Process is Your Best Bet RED PILL EMAIL Authored by: Ken Magill Why Outsourcing the Process is Your Best Bet So you ve decided it s time to hire an email service provider or select

More information

An Introduction to Design Thinking PROCESS GUIDE

An Introduction to Design Thinking PROCESS GUIDE An Introduction to Design Thinking PROCESS GUIDE Empathize To create meaningful innovations, you need to know your users and care about their lives. WHAT is the Empathize mode Empathy is the centerpiece

More information

How to Turn Your Network into a Strategic Business Asset with Purview EBOOK

How to Turn Your Network into a Strategic Business Asset with Purview EBOOK How to Turn Your Network into a Strategic Business Asset with Purview EBOOK EBOOK TABLE OF CONTENTS Chapter 1: What is Purview and How Can It Be Used? 2 Chapter 2: Using Purview for Business Analytics

More information

{ { Calculating Your Social Media Marketing Return on Investment. A How-To Guide for New Social Media Marketers. Peter Ghali - Senior Product Manager

{ { Calculating Your Social Media Marketing Return on Investment. A How-To Guide for New Social Media Marketers. Peter Ghali - Senior Product Manager { { Calculating Your Social Media Marketing Return on Investment A How-To Guide for New Social Media Marketers Peter Ghali - Senior Product Manager This guide provides practical advice for developing a

More information

The Business Case for ECA

The Business Case for ECA ! AccessData Group The Business Case for ECA White Paper TABLE OF CONTENTS Introduction... 1 What is ECA?... 1 ECA as a Process... 2 ECA as a Software Process... 2 AccessData ECA... 3 What Does This Mean

More information

4 Ways To Increase Your Rankings in Google & Improve Your Online Exposure

4 Ways To Increase Your Rankings in Google & Improve Your Online Exposure 4 Ways To Increase Your Rankings in Google & Improve Your Online Exposure Written by Bobby Holland all rights reserved Copyright: Bipper Media -------------------------------------------------------------------

More information

The Financial Services Industry

The Financial Services Industry The Financial Services Industry AN INTRODUCTION TO SOCIAL MEDIA The Challenge The Financial Services industry is one of the most established and complex around. Many of its key processes and systems have

More information

Analytics For Everyone - Even You

Analytics For Everyone - Even You White Paper Analytics For Everyone - Even You Abstract Analytics have matured considerably in recent years, to the point that business intelligence tools are now widely accessible outside the boardroom

More information

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by:

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: Big Data is the ability to collect information from diverse sources

More information

Speaker Monique Sherrett

Speaker Monique Sherrett Speaker Monique Sherrett Monique Sherrett has a passion for all things digital, in particular using analytics to measure and improve marketing communications. She began her career as the web marketing

More information

The key to success: Enterprise social collaboration fuels innovative sales & operations planning

The key to success: Enterprise social collaboration fuels innovative sales & operations planning Manufacturing The key to success: Enterprise social collaboration fuels innovative sales & operations planning As the sales and operations planning leader, you have a few principal responsibilities: setting

More information

The Public Sector Guide to Social Media Strategy and Policy

The Public Sector Guide to Social Media Strategy and Policy The Public Sector Guide to Social Media Strategy and Policy Use social media with confidence. This guide contains practical steps that will help public sector agencies, organizations and departments develop

More information

Email Marketing Best Practices - Top 10 tips

Email Marketing Best Practices - Top 10 tips Email Marketing Best Practices - Top 10 tips Contents 1. Make a good first impression... 2 2. Above the fold... 3 3. Keep it short and to the point.... 3 4. Send what your customer wants not what you want

More information

One View Of Customer Data & Marketing Data

One View Of Customer Data & Marketing Data One View Of Customer Data & Marketing Data Ian Kenealy, Head of Customer Data & Analytics, RSA spoke to the CX Network and shared his thoughts on all things customer, data and analytics! Can you briefly

More information

BIG DATA IN THE FINANCIAL WORLD

BIG DATA IN THE FINANCIAL WORLD BIG DATA IN THE FINANCIAL WORLD Predictive and real-time analytics are essential to big data operation in the financial world Big Data Republic and Dell teamed up to survey financial organizations regarding

More information

analytics+insights for life science Descriptive to Prescriptive Accelerating Business Insights with Data Analytics a lifescale leadership brief

analytics+insights for life science Descriptive to Prescriptive Accelerating Business Insights with Data Analytics a lifescale leadership brief analytics+insights for life science Descriptive to Prescriptive Accelerating Business Insights with Data Analytics a lifescale leadership brief The potential of data analytics can be confusing for many

More information

Where do you start with your big data and analytics initiative?

Where do you start with your big data and analytics initiative? Where do you start with your big data and analytics initiative? Prof Joe Peppard European School of Management and Technology, Berlin O ne of the questions that we often encounter in our work with executives

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

Introduction to Open Atrium s workflow

Introduction to Open Atrium s workflow Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling

More information

HydroDesktop Overview

HydroDesktop Overview HydroDesktop Overview 1. Initial Objectives HydroDesktop (formerly referred to as HIS Desktop) is a new component of the HIS project intended to address the problem of how to obtain, organize and manage

More information

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise 2 Executive Summary The growth of Software- as-

More information

SPEED AND EASE Spreadsheets. Workflow Apps. SECURITY Spreadsheets. Workflow Apps

SPEED AND EASE Spreadsheets. Workflow Apps. SECURITY Spreadsheets. Workflow Apps are often billed as simple, easy-to-use solutions, so many organizations leverage them as a tool for tracking and managing their data and processes. Unfortunately, spreadsheets have some limitations that

More information

Social Media Monitoring in Fifteen Minutes

Social Media Monitoring in Fifteen Minutes Social Media Monitoring in Fifteen Minutes By Murray Newlands Murray Newlands 1 Table of Contents Social Media monitoring Guides your Business Introduction: Social Media Monitoring How Social Media monitoring

More information

Testing, What is it Good For? Absolutely Everything!

Testing, What is it Good For? Absolutely Everything! Testing, What is it Good For? Absolutely Everything! An overview of software testing and why it s an essential step in building a good product Beth Schechner Elementool The content of this ebook is provided

More information

Tips, Tricks and Best Practices

Tips, Tricks and Best Practices Social Media Tips, Tricks and Best Practices Georgia Statewide Afterschool Network Atlanta, Ga. 30303 404.521.0355 www.afterschoolga.org Table of Contents Section 1 - Understanding Social Media & The Big

More information

Making confident decisions with the full spectrum of analysis capabilities

Making confident decisions with the full spectrum of analysis capabilities IBM Software Business Analytics Analysis Making confident decisions with the full spectrum of analysis capabilities Making confident decisions with the full spectrum of analysis capabilities Contents 2

More information

5 Point Social Media Action Plan.

5 Point Social Media Action Plan. 5 Point Social Media Action Plan. Workshop delivered by Ian Gibbins, IG Media Marketing Ltd (ian@igmediamarketing.com, tel: 01733 241537) On behalf of the Chambers Communications Sector Introduction: There

More information

TIPSHEET IMPROVING RESPONSE SCALES

TIPSHEET IMPROVING RESPONSE SCALES TIPSHEET IMPROVING RESPONSE SCALES As important as it is to have good question wording in a survey, it is equally important to have well constructed and reliable question response options. Researchers

More information

How To Measure Quality

How To Measure Quality Introduction Metrics for Software Testing: Managing with Facts Part 4: Product Metrics In the previous article in this series, we moved from a discussion of process metrics to a discussion of how metrics

More information

Workshop Discussion Notes: Data Supply Chains

Workshop Discussion Notes: Data Supply Chains Workshop Discussion Notes: Data Supply Chains The Social, Cultural & Ethical Dimensions of Big Data March 17, 2014 - New York, NY http://www.datasociety.net/initiatives/2014-0317/ This document was produced

More information

Hybrid: The Next Generation Cloud Interviews Among CIOs of the Fortune 1000 and Inc. 5000

Hybrid: The Next Generation Cloud Interviews Among CIOs of the Fortune 1000 and Inc. 5000 Hybrid: The Next Generation Cloud Interviews Among CIOs of the Fortune 1000 and Inc. 5000 IT Solutions Survey Wakefield Research 2 EXECUTIVE SUMMARY: Hybrid The Next Generation Cloud M ost Chief Information

More information

Massachusetts Institute of Technology Sloan School of Management System Dynamics II: Applications of System Dynamics. Professor Jim Hines

Massachusetts Institute of Technology Sloan School of Management System Dynamics II: Applications of System Dynamics. Professor Jim Hines Massachusetts Institute of Technology Sloan School of Management System Dynamics II: Applications of System Dynamics Professor Jim Hines Guidelines for kickoff meeting and first breakout Group presentation:

More information

Predictive Coding Defensibility

Predictive Coding Defensibility Predictive Coding Defensibility Who should read this paper The Veritas ediscovery Platform facilitates a quality control workflow that incorporates statistically sound sampling practices developed in conjunction

More information

Qlik s Associative Model

Qlik s Associative Model White Paper Qlik s Associative Model See the Whole Story that Lives Within Your Data August, 2015 qlik.com Table of Contents Introduction 3 Qlik s associative model 3 Query-based visualization tools only

More information

GROW YOUR ANALYTICS MATURITY

GROW YOUR ANALYTICS MATURITY GROW YOUR ANALYTICS MATURITY Gain and Sustain a Competitive Edge FROM DATA TO ACTION YOU VE HEARD THE BIG DATA BUZZ. WE RE SWIMMING IN MORE DATA THAN EVER. But it s not about the amount of data, the different

More information