e-Xploration
Follow
Find
20.2K views | +24 today
 
Rescooped by luiy from The Long Poiesis
onto e-Xploration
Scoop.it!

Transition from the crisis 3,The Future of Internet: The Weave

Transition from the crisis 3,The Future of Internet: The Weave | e-Xploration | Scoop.it
EU Commissioner Neelie Kroes wrote on December 22: “We must invest in the growth sectors of the future now, to fight the crises. The Internet Sector in Europe grows with 12%/year and has the ...

Via Xaos
luiy's insight:

Living systems according to Parent (1996) are by definition “open self-organizing systems that have the special characteristics of life and interact with their environment. This takes place by means of information and material-energy exchanges. Living systems can be as simple as a single cell or as complex as a supranational organization such as the European Union. Regardless of their complexity, they each depend upon the same essential twenty subsystems (or processes) in order to survive and to continue the propagation of their species or types beyond a single generation”.[4]

Miller said that systems exist at 8 “nested” hierarchical levels: cell, organ, organism, group, organization, community, society, and supranational system. In more detail:


{{The eight levels of living systems are: cells: a basic building block of life organs: the principle components are cells, organized in simple, multi-cellular systems. organisms: there are three kinds of organisms: fungi, plants and animals. Each has distinctive cells, tissues and body plans and carries out life processes differently. groups: these contain two or more organisms and their relationships. organizations: these involve one of more groups with their own control systems for doing work. communities: they include both individual persons and groups, as well as groups which are formed and are responsible for governing or providing services to them. societies: these are loose associations of communities, with systematic relationships between and among them. supranational systems: organizations of societies with a supraordinate system of influence and control}}

more...
Xaos's curator insight, December 28, 2012 10:26 AM

Problem however is that not many people have a clue what Internet is or if they do   think about different things, like the World Wide Web of Apps & Cloud services. And they have a wide variety of views how “Internet” should be governed. Recently at the ITU world conference on international telecommunications (WCIT-12) in Dubai these different views came to a conflict where a number of member countries refused to sign the treaty. On the one side nation states expressed their sovereign right to regulate ( and if necessary block) internal and external Internet traffic; and on the other side countries who express the view that the Internet is by  design is a transnational structure with a “multi-stakeholder” organisation to run it and further develop it. I subscribe to this latter view and will explain in this blog why and how this can and will be done.

e-Xploration
antropologo.net, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Scooped by luiy
Scoop.it!

Oycib ::: Collective Intelligence. "Kaan". Network Visualisation.

Oycib ::: Collective Intelligence. "Kaan". Network Visualisation. | e-Xploration | Scoop.it
luiy's insight:

Beginning with the origins, Oycib means in Mayan language "the place of honey". In this projet, Oycib is an e-Research infrastructure for the Collective Intelligence Analysis.

 

With Oycib infrastructure we propose an analysis model, based in the digital practices and collaboration profiles for the development of Social Learning and the Context Awareness in the Collective Intelligence process.

 

The infrastructure design and the profiles proposed here, are based on historical studies about social organization glyphs in Mayan culture made by Montgomery (2002) and Calvin (2012).

 

Initially we worked with four collaboration profiles: the "Itzaat", the "Pitziil", the "Ayuxul" and the "Sajal" (profiles), but we can find others depending of the organization context. Thus, it's important to mention that each profile is found based on the e-Xploración model and they are the qualitative and quantitative interpretation of the collaborative practices. In this way, we propose methods based on Social Network Analysis for the learning and knowledge management.

 

Thus, the network in Oycib is called "Kaan" (sky or network in Mayan Lenguage). In the "Kaan" we present the visualization of the subjects and objects, such as persons, forums, blogs, files, groups and all the interactions among them. Additionally, each profile and their interactions is presented.

 

... you can interact with "Kaan" here.

 

http://viz.oycib.org/net_all_3/network/index.html

more...
No comment yet.
Scooped by luiy
Scoop.it!

#SemanadelEmprendedor - México 2014 - Gráficos de conversaciones y Ecosistema | #SNA #gephi

#SemanadelEmprendedor - México 2014 - Gráficos de conversaciones y Ecosistema | #SNA #gephi | e-Xploration | Scoop.it
luiy's insight:

En el contexto del evento #SemanadelEmprendedor 2014 en México desarrollamos y presentamos los siguiente gráficos:

 

- los actores principales que participarón en Twitter en el contexto del evento #SemanadelEmprendedor 2014

 

- los actores principales del Ecosistema Emprendedor 2014 en México.

more...
No comment yet.
Scooped by luiy
Scoop.it!

New #tool makes online #personaldata more transparent | #privacy

New #tool makes online #personaldata more transparent | #privacy | e-Xploration | Scoop.it
The web can be an opaque black box: it leverages our personal information without our knowledge or control. When, for instance, a user sees an ad about depression online, she may not realize that she is seeing it because she recently sent an email about being sad. Roxana Geambasu and Augustin Chaintreau, ...
luiy's insight:

The tool for revealing personal data use on the Web. It reveals which specific data inputs (such as emails) are used to target which outputs (such as ads). It is general and can track data use both within and across arbitrary Web services. The key idea behind XRay is to detect targeting through black-box input/output correlation. XRay populates a series of extra accounts with subsets of the inputs and then looks at the differences and commonalities between the outputs that they get in order to obtain correlation. This mechanism is effective at detecting certain types of data uses, though not all. For its details, please refer to our research paper, which will appear in August at USENIX Security 2014, a top systems security conference.


http://xray.cs.columbia.edu/

more...
No comment yet.
Scooped by luiy
Scoop.it!

How Yahoo Research Labs Studies Culture as a Formal Computational Concept | #SNA #DH

How Yahoo Research Labs Studies Culture as a Formal Computational Concept | #SNA #DH | e-Xploration | Scoop.it
The ultimate goal: a truly computational understanding of human society, say Yahoo’s computational anthropologists.
luiy's insight:

Today, Luca Maria Aiello at Yahoo Labs in Barcelona, Spain, and a couple of pals, change that. They tease apart the nature of the links that form on social networks and say these atoms fall into three different categories. They also show how to extract this information automatically and then characterize the relationships according to the combination of atoms that exist between individuals. Their ultimate goal: to turn anthropology into a full-blooded subdiscipline of computer science.

 

Aiello and co used two data sets from a pair of large social networks. The first consists of over 1 million messages sent between 500,000 pairs of users of the aNobii social network, which people use to talk about books they have read. The second is a set of 100,000 anonymized user pairs who commented on each other’s photos on Flickr, sending around 2 million messages in total.

 

The team analyzes these messages based on the type of information they convey, which they divide into three groups. The first type of information is related to social status; messages displaying appreciation or announcing the creation of the social tie such as a follow or like. For example, a user might say a photograph is “an excellent shot” or say they’ve followed somebody or acknowledged attention they’ve got by thanking them for visiting a site.

more...
Francisco Restivo's curator insight, Today, 6:51 AM

Alex Pentland would call this Social Physics.

Scooped by luiy
Scoop.it!

2014 #Ebola Outbreak: Worldwide Air Transportation and Relative Import #Risk | #dataviz

2014 #Ebola Outbreak: Worldwide Air Transportation and Relative Import #Risk | #dataviz | e-Xploration | Scoop.it

Click here to edit the title

luiy's insight:
The Nodes: Nodes in the network represent the largest 1227 airports in the worldwide air-transportation network (WAN) comprising approx. 95% of the entire global air traffic. The dataset used in our computational models contains more than 4000 airports, a total passenger flux of more than 3 billion passengers/year. Node size quantifies the capacity (size) of an airport. Colors correspond to geographical regions. Hover over a node for an additional info pop-up.
more...
No comment yet.
Scooped by luiy
Scoop.it!

The Question to Ask Before Hiring a Data Scientist | #datascience #basics

The Question to Ask Before Hiring a Data Scientist | #datascience #basics | e-Xploration | Scoop.it
Will your new hire produce analysis for humans or machines?
luiy's insight:

Is your data scientist producing analytics for machines or humans?

 

This distinction is important across organizations, industries, and job titles (our fellows are being placed at jobs with titles that range from Quant to Data Scientist to Analyst to Statistician). Unfortunately, most hiring managers conflate the types of talent and temperament necessary for these roles.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Israel, Gaza, #War & Data | #SNA #socialmedia

Israel, Gaza, #War & Data | #SNA #socialmedia | e-Xploration | Scoop.it
social networks and the art of personalizing propaganda
luiy's insight:

It’s hard to shake away the utterly depressing feeling that comes with news coverage these days. IDF and Hamas are at it again, a vicious cycle of violence, but this time it feels much more intense. While war rages on the ground in Gaza and across Israeli skies, there’s an all-out information war unraveling in social networked spaces.

 

Not only is there much more media produced, but it is coming at us at a faster pace, from many more sources. As we construct our online profiles based on what we already know, what we’re interested in, and what we’re recommended, social networks are perfectly designed to reinforce our existing beliefs. Personalized spaces, optimized for engagement, prioritize content that is likely to generate more traffic; the more we click, share, like, the higher engagement tracked on the service. Content that makes us uncomfortable, is filtered out.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Genera el #INAH información #geoespacial en materia #arqueológica | #mexico

Genera el #INAH información #geoespacial en materia #arqueológica | #mexico | e-Xploration | Scoop.it
Genera el INAH información geoespacial en materia arqueológica
luiy's insight:

La plataforma generada incluye una base de datos georreferenciada, así como información espacial digital en diversos formatos, por ejemplo, kmz, dxf y shp, susceptible de visualización y manipulación en aplicaciones como Google Earth, Auto CAD y sistemas de información geográfica.

Esta información sirve para producir cartografía referente a las 187 zonas arqueológicas abiertas al público en el país, su entorno natural y el contexto socioeconómico de las comunidades cercanas, servicios para la visita e inclusive el estado de conservación de las estructuras arquitectónicas distribuidas dentro de las mismas.

Jaime Cedeño resaltó la cartografía desarrollada en el Laboratorio de Geomática a partir de la captura de información que proporcionan los institutos nacionales de Estadística y Geografía, y de Ecología; las comisiones nacionales del Agua, y para el Conocimiento y Uso de la Biodiversidad, así como del Registro Público de Monumentos y Zonas Arqueológicos del INAH y la generada por la Dirección de Operación de Sitios.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Social Technologies for Developing #CollectiveIntelligence in Networked Society

Social Technologies for Developing #CollectiveIntelligence in Networked Society | e-Xploration | Scoop.it
luiy's insight:

The methodology will allow to identify and analyze conditions that lead communities to become more collective intelligent, but first following research questions needs to be answered: how to increase engagement of passive society into collective decision making process, how technologies could help to structure the information, purify the positions, reconcile different opinions and formulate the real society voice etc. To solve social challenges further research is planned in the field with the aim to show how existing social technology parameters might help platform developers to create new IT based applications fostering self-organization, collective decision making and learning etc.

more...
No comment yet.
Scooped by luiy
Scoop.it!

La "boîte à outils" du cartographe de l’information et des réseaux | #SNA #gephi #tools

La "boîte à outils" du cartographe de l’information et des réseaux | #SNA #gephi #tools | e-Xploration | Scoop.it
luiy's insight:

La "boîte à outils" du cartographe de l’information et des réseaux s’est sérieusement étoffée depuis quelques mois. De quoi équiper un peu plus encore une activité qui connaît quelques succès aujourd’hui, et dont on commence à comprendre le rôle essentiel pour les organisations et les territoires (en rappelant, comme à chaque fois, que le travail du cartographe d’informations commence là où finissent les données et finit là où commence l’interprétation des phénomènes). La nouveauté, cette fois-ci, est qu’il s’agit de deux "plateformes" en ligne et non plus seulement d’un plug-in ou d’une application isolée. Et, dans les deux cas, elles viennent enrichir les contextes d’utilisation de GEPHI (pour la 5e année en 2013 au Google Summer of Code, le fameux Gsoc). La preuve, si besoin était, que Gephi n’est pas une "application" mais un écosystème d’innovation permanente constituée d’une multitude d’acteurs.

more...
No comment yet.
Rescooped by luiy from Personal data and technology
Scoop.it!

Google Tests #PersonalData Market To Find Out How Much Your Personal Information Is Worth | #databrokers

Google Tests #PersonalData Market To Find Out How Much Your Personal Information Is Worth | #databrokers | e-Xploration | Scoop.it
If you could sell your location data every day, how much would you charge? A research team including Google has carried out an experiment to find out.

Via C.I.L. CONSULTING
luiy's insight:

The personal information that your smart phone can collect about you is increasingly detailed. Apps can record your location, your level of exercise, the phone calls that you make and receive, the photographs that you take and who you share them with and so on.

 

Various studies have shown that this data provides a detailed and comprehensive insight into an individual’s habits and lifestyle, information that advertisers and marketers dearly love to have.

Indeed, this information can surprisingly useful. The Google Now smartphone app uses information such as your location to provide details it thinks you might find useful, such as directions home or nearby restaurants.

 

But this service isn’t entirely altruistic. Google knows perfectly well that it can use this information to sell adverts and other services.

That raises an interesting question. If companies such as Google can create a business model based on the use of this kind of personal information, how much is this information worth? And how should we value it when it comes to deciding who should have access to it and who shouldn’t?

 

Ref: arxiv.org/abs/1407.0566 : Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data

more...
No comment yet.
Scooped by luiy
Scoop.it!

MIT Invents A Shapeshifting Display You Can Reach Through And Touch | #design #telepresence

The Tangible Media Group at MIT's Media Lab has unveiled a futuristic display made of atoms, not pixels.
luiy's insight:

At the MIT Media Lab, the Tangible Media Group believes the future of computing is tactile. Unveiled today, the inFORM is MIT's new scrying pool for imagining the interfaces of tomorrow. Almost like a table of living clay, the inFORM is a surface that three-dimensionally changes shape, allowing users to not only interact with digital content in meatspace, but even hold hands with a person hundreds of miles away. And that's only the beginning.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Researchers Find and Decode the #SpyTools Governments Use to Hijack Phones | #privacy #surveillance

Researchers Find and Decode the #SpyTools Governments Use to Hijack Phones | #privacy #surveillance | e-Xploration | Scoop.it

Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.

luiy's insight:

The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently of each other at Kaspersky Lab in Russia and the Citizen Lab at the University of Toronto’s Munk School of Global Affairs in Canada, who say the findings provide great insight into the trade craft behind Hacking Team’s tools.

 

The new components target Android, iOS, Windows Mobile, and BlackBerry users and are part of Hacking Team’s larger suite of tools used for targeting desktop computers and laptops. But the iOS and Android modules provide cops and spooks with a robust menu of features to give them complete dominion over targeted phones.

 

They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion.

 

“Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target—which is much more powerful than traditional cloak and dagger operations,” notes Kaspersky researcher Sergey Golovanov in a blog post about the findings.

more...
No comment yet.
Scooped by luiy
Scoop.it!

#Privacy, Anonymity, and #BigData in the Social Sciences | #dh #MOOC

#Privacy, Anonymity, and #BigData in the Social Sciences | #dh #MOOC | e-Xploration | Scoop.it
A recent article suggests that open science may be irreconcilable with anonymous data, requiring a reconsideration of how we protect privacy in educational data.
luiy's insight:

The short version: many people have called for making science more open and transparent by sharing data and posting data openly. This allows researchers to check each other's work and to aggregate smaller datasets into larger ones. One saying that I'm fond of is: "the best use of your dataset is something that someone else will come up with." The problem is that increasingly, all of this data is about us. In education, it's about our demographics, our learning behavior, and our performance. Across the social sciences, it's about our health, our beliefs, and our social connections. Sharing and merging data adds to the risk of disclosing those data. 

 

The article shares a case study of our efforts to strike a balance between anonymity and open science by de-identifying a dataset of learner data from HarvardX and releasing it to the public. In order to de-identify the data to a standard that we thought was reasonably resistant to reidentification efforts, we had to delete some records and blur some variables. If a learner's combination of identifying variables was too unique, we either deleted the record or scrubbed the data to make it look less unique. The result was suitable for release (in our view), but as we looked more closely at the released dataset, it wasn't suitable for science. We scrubbed the data to the point where it was problematically dissimilar from the original dataset. If you do research using our data, you can't be sure if your findings are legitimate or an artifact of de-identification. 

more...
No comment yet.
Scooped by luiy
Scoop.it!

Net Neutrality, #Algorithmic Filtering and #Ferguson | #censorship

Net Neutrality, #Algorithmic Filtering and #Ferguson | #censorship | e-Xploration | Scoop.it

Net Neutrality, Algorithmic Filtering and Ferguson

luiy's insight:

Twitter was also affected by algorithmic filtering. “Ferguson” did not trend in the US on Twitter but it did trend locally. [I’ve since learned from @gilgul that that it *briefly* trended but mostly trended at localities.] So, there were fewer chances for people not already following the news to see it on their “trending” bar. Why? Almost certainly because there was already national, simmering discussion for many days and Twitter’s trending algorithm (said to be based on a method called “term frequency inverse document frequency”) rewards spikes… So, as people in localities who had not been talking a lot about Ferguson started to mention it, it trended there though the national build-up in the last five days penalized Ferguson.


Algorithms have consequences.


Mass media, typically, does not do very well covering chronic problems of unprivileged populations, poor urban blacks bear the brunt of this, but they are not alone. Rural mostly white America, too, is almost always ignored except for the occasional “meth labs everywhere” story. But yesterday, many outlets were trying, except police didn’t let them. Chris Hayes says that police ordered satellite trucks off the area so that they could not go live from the area. Washington Post was only one outlet whose journalists were arrested — citizen journalists were targeted as well.


more...
No comment yet.
Scooped by luiy
Scoop.it!

#Naoyun – Visualize Live Twitter Activity | #SNA #gephi

#Naoyun – Visualize Live Twitter Activity | #SNA #gephi | e-Xploration | Scoop.it
luiy's insight:

The TwitterStreamer is the main class that manage the Twitter API . This class also load a class that extends TwitterGephiStreamer. Each time the Twitter Api get a new Status, the TwitterStreamer call the newStatus method from the TwitterGephiStreamer class.

On this method, there is the « Network Logic ». I called « Network Logic » all the processes and the rules to create a network from Twitter status.

 

For the moment, Naoyun have 3 network logic :

 

- TwittFullGrapher : Makes a complete graph by representing users, hashtags, tweet, media, links and their connection. The « Smart » version implemented in Naoyun won’t represent tracked hashtag to improve the visibility of the graph.


- TwitterUserNetwork : Represent only the relation between users.


- GeoTwitt : Just display Twitt with Geo localisation

more...
No comment yet.
Scooped by luiy
Scoop.it!

Le numérique réinvente la consommation culturelle | #DH #musées

Le numérique réinvente la consommation culturelle | #DH #musées | e-Xploration | Scoop.it
Musées en ligne, création artistique digitale, e-commerce de l'art... la multiplication des expériences numériques dans le monde de la culture recoupe des réalités fort diverses. Et la nébuleuse des initiatives rend la lecture de ce secteur naissant éminemment complexe. Comment repenser l'offre culturelle à l'heure de sa dématérialisation ? Comment répondre aux nouveaux besoins d'un « consommateur » d'art ultra-connecté ?
luiy's insight:

S'appuyant justement sur l'interaction visiteur et l'expérience immersive, le Centre Pompidou a lancé « Éduque le Troll », en 2012, son premier Alternate Reality Game (ARG). Ces jeux en réalité alternée aux fonctions pédagogiques et ludiques sont fort prisés des musées. Il en est de même pour les serious games, jeux intelligents interactifs développés par les châteaux de Versailles et de Fontainebleau. Le transmédia a également la faveur des lieux patrimoniaux.

more...
No comment yet.
Scooped by luiy
Scoop.it!

How Google and Twitter move the #market for #bitcoin | #economy #cyberculture

How Google and Twitter move the #market for #bitcoin | #economy #cyberculture | e-Xploration | Scoop.it
luiy's insight:

Anyone who has followed bitcoin over the last three years knows that its price is an ad nauseum repeat of price spikes followed by mini crashes. Some of them have been triggered by external stimuli, like MtGox being hacked in 2011 before it ultimately met its demise this past March. The cycle — more like a roller coaster — of bitcoin price movements is becoming an interesting research topic for academics. However, how much of the price fluctuation has to do with the hype around the cryptocurrency?

Researchers at ETH Zurich, a university in Switzerland, decided to study how social information online affected the price in their paper:

 

“The digital traces of bubbles: feedback cycles between socio economic signals in the bitcoin economy.” http://arxiv.org/abs/1408.1494

 

The researchers looked at Facebook shares, number of tweets, number of downloads of the blockchain client, users on the network and the number of searches on both Google and Wikipedia to try to find a correlation between the price and the online network.

more...
No comment yet.
Scooped by luiy
Scoop.it!

( #Fake ) friends with (Real) benefits?? | #sna #socialmedia

( #Fake ) friends with (Real) benefits?? | #sna #socialmedia | e-Xploration | Scoop.it
I paid $5 for 4,000 Twitter followers, and here’s what I found
luiy's insight:

The Experiment

 

At the start, I used Twitter’s API to get a list of my 2,600 existing Twitter followers. Then I set about figuring out where to buy more.

Google conveniently auto-completed my search for “buy twitter” with a number of useful suggestions, including: “buy twitter followers,” “buy twitter followers cheap” and “buy twitter followers reviews.” I was certainly not the only one searching for this.

more...
No comment yet.
Scooped by luiy
Scoop.it!

The one million tweet map #onemilliontweetmap

The one million tweet map #onemilliontweetmap | e-Xploration | Scoop.it
more...
Francisco Restivo's curator insight, August 7, 7:09 AM

What's happening, in real time. You'll be surprised with all you can discover.

Scooped by luiy
Scoop.it!

Which Countries Are Banning Phone Surveillance Statistics? | #privacy #surveillance

Which Countries Are Banning Phone Surveillance Statistics? | #privacy #surveillance | e-Xploration | Scoop.it
Vodafone lifts the lid on mobile monitoring in 27 countries
luiy's insight:

Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.

 

The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday. At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people.

 

The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer. Privacy campaigners said the revelations were a "nightmare scenario" that confirmed their worst fears on the extent of snooping.

 

In Albania, Egypt, Hungary, India, Malta, Qatar, Romania, South Africa and Turkey, it is unlawful to disclose any information related to wiretapping or interception of the content of phone calls and messages including whether such capabilities exist.

 

http://www.theguardian.com/business/2014/jun/06/vodafone-reveals-secret-wires-allowing-state-surveillance

 

http://www.aljazeera.com/news/europe/2014/06/vodafone-reveals-network-spying-states-201466134726119937.html

 

more...
No comment yet.
Scooped by luiy
Scoop.it!

Morph : Get structured #data out of the web | #crawlers #datascience

luiy's insight:

Morph A Heroku for Scrapers

 

Get structured data out of the web

 

- All code and collaboration through GitHub

- Write your scrapers in Ruby, Python, PHP or Perl

- Simple API to grab dataSchedule scrapers or run manually

- Process isolation via Docker

- Trivial to move scraper code and data from ScraperWiki Classic

more...
No comment yet.
Scooped by luiy
Scoop.it!

An (incomplete) checklist for making #geodata #visualizations in data journalism | #ddj #dataviz

An (incomplete) checklist for making #geodata #visualizations in data journalism | #ddj #dataviz | e-Xploration | Scoop.it
luiy's insight:

MAPPABLE CHEAT-SHEET

An (incomplete) checklist for making geodata visualizations in (data-driven) journalism.

 

ALWAYS ASK YOURSELF FIRST:

Is a map really the best way to visualize the data set?

 

DATA HANDLING

 

- Got all geographic elements right? (especially borders & place names)

 

- Check the correct position of geocoded and self drawn map elements (thus preventing mistakes from misused spatial reference systems)

 

- Have all outliers and duplicates been eliminated? Correctly dealt with incomplete data entries?

 

- Have data entries that are not necessary for the final visualization been removed?Have the values been normalized (e.g. by population data)? .........

more...
No comment yet.
Scooped by luiy
Scoop.it!

What Data #Journalists Need to Do Differently | #ddj #bigdata

What Data #Journalists Need to Do Differently | #ddj #bigdata | e-Xploration | Scoop.it
Relying too heavily on the same sources leaves important stories untold.
luiy's insight:

The role of the data journalist has increased dramatically over the last decade.The past few months have seen the launch of several high-profile “data journalism” or “explanatory journalism” websites in the U.S. and the UK – such as Nate Silver’s recently relaunched and somewhat controversialFiveThirtyEight; Trinity Mirror’s ampp3d, a mobile-first site that publishes snappy viral infographics;The Upshot from The New York Times, which aims to put news into context with data; and Vox, where former Washington Post blogger Ezra Klein leads a team that provides “crucial contextual information” around news. The debates (pro and con) around these projects have brought data journalism out of its niche in digital media conferences and trade publications into the limelight.

 

These new media outlets have been received with both praise and criticism. Guardian journalist James Ball, who has been closely associated with the use of data for journalism – from his work with Wikileaks to the “Offshore Leaks” investigations – recently offered an interesting analysis of these developments. He points out a number of limitations in many of these data journalism projects — from the lack of transparency about their data, to the perpetuation of gender inequality among media professionals (“still a lot of white guys”), to the conspicuous absence of one of journalism’s most essential functions: the breaking of news.

more...
No comment yet.
Scooped by luiy
Scoop.it!

The Impact Cycle – how to think of actionable insights | #datascience #methods

The Impact Cycle – how to think of actionable insights | #datascience #methods | e-Xploration | Scoop.it
luiy's insight:

I. Identify the question. In a non intrusive way, help your business partner identify the critical business question(s) he or she needs help in answering. Then set a clear expectation of the time and the work involved to get an answer.

 

M. Master the data.This is the analyst’s sweet spot—assemble, analyze, and synthesize all available information that will help in answering the critical business question. Create simple and clear visual presentations (charts, graphs, tables, interactive data environments, and so on) of that data that are easy to comprehend.

 

P. Provide the meaning. Articulate clear and concise interpretations of the data and visuals in the context of the critical business questions that were identified.

 

A. Actionable recommendations. Provide thoughtful business recommendations based on your interpretation of the data. Even if they are off-base, it’s easier to react to a suggestion that to generate one. Where possible, tie a rough dollar figure to any revenue improvements or cost savings associated with your recommendations.

 

C. Communicate insights. Focus on a multi-pronged communication strategy that will get your insights as far and as wide into the organization as possible. Maybe it’s in the form of an interactive tool others can use, a recorded WebEx of your insights, a lunch and learn, or even just a thoughtful executive memo that can be passed around.

 

T. Track outcomes. Set up a way to track the impact of your insights. Make sure there is future follow-up with your business partners on the outcome of any actions. What was done, what was the impact, and what are the new critical questions that need your help as a result?

more...
No comment yet.
Scooped by luiy
Scoop.it!

An Interactive #Map Showing Global #Cyberattacks In Real Time | #dataviz

An Interactive #Map Showing Global #Cyberattacks In Real Time | #dataviz | e-Xploration | Scoop.it

Security firm Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. A quick glance shows that the world is a pretty scary place.

luiy's insight:

The interactive map is a promotional tool created by Kaspersky Lab, but it's fascinating nonetheless. Threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as objects identified by vulnerability and intrusion detection sub-systems.

 

more...
No comment yet.