Jana Diesner, PhD Associate Professor, UIUC

Slides:



Advertisements
Similar presentations
Methodologies for Assessing Social and Economic Performance in JESSICA Operations Gianni Carbonaro EIB - JESSICA and Investment Funds JESSICA Networking.
Advertisements

DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
Software Quality Assurance Plan
Overview of IS Controls, Auditing, and Security Fall 2005.
Sensemaking and Ground Truth Ontology Development Chinua Umoja William M. Pottenger Jason Perry Christopher Janneck.
Supply Chain Management (SCM) Forecasting 3
Information Technology Audit
Assistive Technology Clinical Outcomes Research Management System (AT-CORMS) Tool Utilizing the International Classification of Functioning (ICF) Cognitive.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Research Heaven, West Virginia Verification and Validation of Adaptive Systems Online Failure Detection and Identification for IFCS through Statistical.
Science & Technology Centers Program Center for Science of Information Bryn Mawr Howard MIT Princeton Purdue Stanford Texas A&M UC Berkeley UC San Diego.
Exploring the dynamics of social networks Aleksandar Tomašević University of Novi Sad, Faculty of Philosophy, Department of Sociology
Scott Duvall, Brett South, Stéphane Meystre A Hands-on Introduction to Natural Language Processing in Healthcare Annotation as a Central Task for Development.
Recognizing Activities of Daily Living from Sensor Data Henry Kautz Department of Computer Science University of Rochester.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Edinburg March 2001CROSSMARC Kick-off meetingICDC ICDC background and know-how and expectations from CROSSMARC CROSSMARC Project IST Kick-off.
Welcome to Department of Computer and Systems Sciences – DSV.
Systems Analysis and Design in a Changing World, Fourth Edition
Common Core State Standards, Next Generation Science Standards and English Language Learners.
Facilitating UFE step-by-step: a process guide for evaluators Joaquín Navas & Ricardo Ramírez December, 2009 Module 1: Steps 1-3 of UFE checklist.
Copyright 2006 John Wiley & Sons, Inc. Chapter 1 - Introduction HCI: Designing Effective Organizational Systems Dov Te’eni Jane Carey Ping Zhang.
Why to care about research?
New Advanced Higher Subject Implementation Events Drama: Unit Assessment at Advanced Higher.
Chapter 1 - Introduction
1 Presentation Methodology Summary B. Golden. 2 Introduction Why use visualizations?  To facilitate user comprehension  To convey complexity and intricacy.
Argumentative Writing Grades College and Career Readiness Standards for Writing Text Types and Purposes arguments 1.Write arguments to support a.
December 3, 2014AISC-CODISCO 2014, revised Nov From Agent-based models to network analysis (and return): the policy-making perspective Magda Fontana.
Item 4 - Intrusion Detection and Prevention Yuh-Jye Lee Dept. of Computer Science and Information Engineering National Taiwan University of Science and.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
New Advanced Higher Subject Implementation Events English: Unit Assessment at Advanced Higher.
Auditing Concepts.
You Can’t Afford to be Late!
NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS)
Strategic Information Systems Planning
Data Analysis, Interpretation and Presentation
facilitating the Net-enabled Ecosystem
DATA COLLECTION METHODS IN NURSING RESEARCH
Chapter 7 Occupational Science: The Study of Occupation
Chapter 1 - Introduction
Right-sized Evaluation
WP2 INERTIA Distributed Multi-Agent Based Framework
Data analysis, interpretation
Introduction to Statistics
Magda Fontana Pietro Terna
REACH Mission & Objectives
On Using Semantic Complex Event Processing for Dynamic Demand Response
Data analysis, interpretation and presentation
Population Information Integration, Analysis and Modeling
America’s First National Critical Infrastructure Exercise
The Extensible Tool-chain for Evaluation of Architectural Models
Data analysis, interpretation and presentation
Stop Data Wrangling, Start Transforming Data to Intelligence
Information Technology (IT)
California’s Rural Intercity Bus System: 2018 Update
Alignment of COBIT to Botswana IT Audit Methodology
Data Warehousing and Data Mining
Design and Implementation
An Improved Neural Network Algorithm for Classifying the Transmission Line Faults Slavko Vasilic Dr Mladen Kezunovic Texas A&M University.
SwafS Ethics and Research Integrity
Data analysis, interpretation and presentation
Department of Electrical Engineering
Data-Driven Decision-Making
SwafS Ethics and Research Integrity
Microsoft Data Insights Summit
Improving Disaster Response by Reducing Negative Environmental Impacts : Sri Lanka Case Study ProAct Network/CARE International Shelter Centre Meeting.
And now the Framework WP4.
UML Design for an Automated Registration System
Learning to Detect Human-Object Interactions with Knowledge
Professor Des Doran DEVELOPING YOUR CASE STUDIES.
Data Analysis, Interpretation, and Presentation
Presentation transcript:

Jana Diesner, PhD Associate Professor, UIUC Reliable Extraction of Emergency Response Networks from Text Data and Benchmarking with National Emergency Response Guidelines

Research Objective Premise: Emergency response is a complex, large-scale, socio-technical system, which we model as a dynamic network with actors, events, and resources. Goal: Apply, advance, and evaluate methods from natural language processing (NLP) and social network analysis (SNA) to unstructured text data from different, commonly used sources of information about emergencies to identify and evaluate multi-modal networks involved in Humanitarian Assistance and Disaster Relief (HADR) efforts. Contribution: Demonstrate the applicability and usefulness of methodologies from Human-Centered Data Science and Social Computing in HADR contexts.

Research question 1

Research question 1 How can we extract reliable multi-mode networks from text data in a scalable way? Use ground truth benchmark data to generate to detect nodes and edges based on statistical, lexical, semantic, and syntactic features of text data. Compare to commonly used, off the shelf implementations. Significance: Comprehensive assessment of network construction from texts, systematic identification of sensitivity of graphs to NLP methods, detection of best practices for constructing reliable networks from text data. Improves rigor and scalability of semantic computing across disciplines and application areas.

Research question 2 How can we label links the extracted semantic networks in a way that is meaningful for HADR and scalable? Leverage text summarization technique(s) from our prior CIRI project. Adaptation of previously developed methods for text-based link labeling Explore sub-event detection techniques. Significance: Results in a classification schema for links (interactions between agents) in HADR-related networks built from text data. Enables automated and meaningful link labeling, which supports further inference tasks.

Research question 3 How do the extracted interactions networks compare to prescribed networks? What can we learn from differences between extracted versus prescribed networks? Ground truth/ normative networks: generated based on national emergency response guidelines, especially the National Response Framework (NRF) outlined by U.S. Department of Homeland Security. Empirical response networks: extracted from text data. Assessment: Compare normative to empirical networks to identify congruence, and opportunities (false positives) and needs (false negatives) for policy change. Significance: Investigate real-world emergencies from an organizational behavior perspective to advance our understanding of organizational processes, flaws, and possible points of failure. Develops and applies a methodology for comparing policy based on incidence management plans to evidence for action, which may assist in assessing emergency management policy.

Summary Establish ground truth – National response framework, other policies, guidelines, etc. i.e., “SOP for disaster response.” Gather data from historical disaster response – “how it actually unfolded” Compare the two Identify areas where guidelines could be improved Make recommendations