<?xml version="1.0"?>
<News hasArchived="true" page="13" pageCount="15" pageSize="10" timestamp="Tue, 28 Apr 2026 07:16:13 -0400" url="https://dev.my.umbc.edu/groups/ebiquity/posts.xml?page=13&amp;tag=semantic-web">
  <NewsItem contentIssues="false" id="2399" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2399">
  <Title>SWSA seeks ISWC 2012 bids, 11th Int. Semantic Web Conf.</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>The Semantic Web Science Association (<a href="http://www.iswsa.org/" rel="nofollow external" class="bo">SWSA</a>) is seeking statements of interest from organizations or consortia interested in hosting the 11th International Semantic Web Conference, ISWC 2012.  The conference series moves regularly between the Americas, Europe, and the Asia/Pacific region and we expect that the 2012 edition will be held in the US in late October or early November 2012.</p>
    <p>Organizations wishing to host ISWC 2012 should contact SWSA President Professor James Hendler (<a href="mailto:swsa-president@aifb.uni-karlsruhe.de" rel="nofollow external" class="bo">swsa-president@aifb.uni-karlsruhe.de</a>) who will work with the SWSA members who are co-ordinating the bidding process for ISWC 2012.</p>
    <p>The process comprises two stages.  During the first stage, statements of interest are solicited through an <a href="http://www.iswsa.org/callforbids.html." rel="nofollow external" class="bo">open call</a>.  Once the first phase is complete, SWSA will shortlist a number of applications, who will be invited to submit a full proposal, using a standard <a href="http://www.iswsa.org/SWSA-ISWC-Conf-App-Form.pdf" rel="nofollow external" class="bo">form</a> and <a href="http://www.iswsa.org/SWSA-ISWC-2010-Budget-Template-v1.0.xls." rel="nofollow external" class="bo">budget template</a>. More information about the ISWC Conference Series and the bidding process for hosting a conference in the series can be found in the <a href="http://www.iswsa.org/SWSA-ISWC-Conference-Guide.pdf" rel="nofollow external" class="bo">ISWC Conference Guide</a>.</p>
    <p>The important dates for applying to host a Conference in 2012 are:</p>
    <ul>
    <li>September 30, 2010: Deadline for receiving statements of interest</li>
    <li>November 15, 2010: Notifications to shortlisted bids are sent out</li>
    <li>January 15, 2011: Formal applications received from shortlisted bids</li>
    <li>March 1, 2011: SWSA decides on location for the 2012 Conference</li>
    </ul></div>
]]>
  </Body>
  <Summary>The Semantic Web Science Association (SWSA) is seeking statements of interest from organizations or consortia interested in hosting the 11th International Semantic Web Conference, ISWC 2012.  The...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/09/06/swsa-seeks-iswc-2012-bids-11th-int-semantic-web-conf/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2399/guest@my.umbc.edu/321df25453c2fec43f240b46a7402ed9/api/pixel</TrackingUrl>
  <Tag>conference</Tag>
  <Tag>iswc</Tag>
  <Tag>semantic-web</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 06 Sep 2010 18:33:29 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="2321" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2321">
  <Title>Is Twitters plan to log all clicks a privacy loss?</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>Twitter’s planned shortening of <strong>all</strong> links via its <a href="http://t.co/" rel="nofollow external" class="bo">t.co</a> service is about to happen. The initial motivation was security, according to <a href="http://support.twitter.com/entries/109623" rel="nofollow external" class="bo">Twitter</a>:</p>
    <blockquote><p> “Twitter’s link service at <a href="http://t.co">http://t.co</a> is used to better protect users from malicious sites that engage in spreading malware, phishing attacks, and other harmful activity. A link converted by Twitter’s link service is checked against a list of potentially dangerous sites. When there’s a match, users can be warned before they continue.”  </p></blockquote>
    <p>Declan McCullagh <a href="http://news.cnet.com/8301-31921_3-20015397-281.html" rel="nofollow external" class="bo">reports</a> that Twitter announced in an email message that when someone click “on these links from Twitter.com or a Twitter application, Twitter will log that click.”  Such information is extremely valuable.  Give Twitter’s tens of millions of active users, just knowing how often certain URLs are clicked by people indicates what entities and topics are of interest at the moment.</p>
    <blockquote><p> “Our link service will also be used to measure information like how many times a link has been clicked. Eventually, this information will become an important quality signal for our Resonance algorithm—the way we determine if a Tweet is relevant and interesting.”  </p></blockquote>
    <p>Associating the clicks with a user, IP address, location or device can yield even more information — like what <strong>you</strong> are interested in right now.  Moreover, Twitter now has a way to associate arbitrary <a href="http://dev.twitter.com/pages/annotations_overview" rel="nofollow external" class="bo">annotation metadata</a> with each tweet.  Analyzing all of this data can identify, for example, communities of users with common interests and the influential members within them.</p>
    <p>Note that Twitter has not said it will do this or even that it will record and keep any user-identifiable information along with the clicks.  They might just log the aggregate number of clicks in a window of time.  But going the next step and capturing the additional information would be, in my mind, irresistible, even if there was no immediate plan to use it.</p>
    <p>Search engines like Google already link clicks to users and IP addresses and use the information to improve their ranking algorithms and probably in many other ways.  But what is troubling is the seemingly inexorable erosion of our online privacy.  There will be no way to opt out of having your link wrapped by the t.co service and no announced way to opt out of having your clicks logged.</p></div>
]]>
  </Body>
  <Summary>Twitter’s planned shortening of all links via its t.co service is about to happen. The initial motivation was security, according to Twitter:     “Twitter’s link service at http://t.co is used to...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/09/02/is-twitters-plan-to-log-all-clicks-a-privacy-loss/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2321/guest@my.umbc.edu/fb07299988135d1f4411e99bf5bea882/api/pixel</TrackingUrl>
  <Tag>privacy</Tag>
  <Tag>semantic-web</Tag>
  <Tag>social-media</Tag>
  <Tag>twitter</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 02 Sep 2010 09:12:39 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="2240" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2240">
    <Title>Yahoo! using Bing search engine in US and Canada</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><a href="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/web-development.png" rel="nofollow external" class="bo"><img src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/web-development.png" alt="Google, Bing, Yahoo!" width="75" height="" style="max-width: 100%; height: auto;"></a>Microsoft’s Bing team <a href="http://www.bing.com/community/blogs/search/archive/2010/08/24/exciting-news-from-bing-and-yahoo.aspx" rel="nofollow external" class="bo">announced</a> on their blog that that the Bing search engine is “powering Yahoo!’s search results” in the US and Canada for English queries.  Yahoo also has a post on their <a href="http://www.ysearchblog.com/2010/08/24/yahoo-transitions-organic-search-back-end-to-microsoft-platform/" rel="nofollow external" class="bo">Yahoo! Search Blog</a>.</p>
          <p>The San Jose Mercury News <a href="http://www.mercurynews.com/business/ci_15882247" rel="nofollow external" class="bo">reports</a>:</p>
          <blockquote><p> “Tuesday, nearly 13 months after Yahoo and Microsoft announced plans to collaborate on Internet search in hopes of challenging Google’s market dominance, the two companies announced that the results of all Yahoo English language searches made in the United States and Canada are coming from Microsoft’s Bing search engine. The two companies are still racing to complete the transition of paid search, the text advertising links that run beside and above the standard search results, before the make-or-break holiday period — a much more difficult task.”  </p></blockquote>
          <p>Combining the traffic from Microsoft and Yahoo will give the Bing a more significant share of the Web search market.  That should help them by providing both companies with a larger stream of search related data that can be exploited to improve search relevance, ad placement and trend spotting.  It will also help to foster competition with Google focused on developing better search technology.</p>
          <p>Hopefully, Bing will be able to benefit from the good work done at Yahoo! on adding more semantics to Web search.</p></div>
      ]]>
    </Body>
    <Summary>Microsoft’s Bing team announced on their blog that that the Bing search engine is “powering Yahoo!’s search results” in the US and Canada for English queries.  Yahoo also has a post on their...</Summary>
    <Website>http://ebiquity.umbc.edu/blogger/2010/08/24/yahoo-using-bing-search-engine-in-us-and-canada/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2240/guest@my.umbc.edu/0a6da34fcd8a9a64947e2ace43ad26ce/api/pixel</TrackingUrl>
    <Tag>bing</Tag>
    <Tag>google</Tag>
    <Tag>microsoft</Tag>
    <Tag>search</Tag>
    <Tag>semantic-web</Tag>
    <Tag>social-media</Tag>
    <Tag>yahoo</Tag>
    <Group token="ebiquity">Ebiquity Research Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
    <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
    <Sponsor>ebiquity research group</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 25 Aug 2010 00:08:44 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="2176" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2176">
  <Title>Probability-based processor might speed AI applications</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><a href="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/prob_B_x220.gif" rel="nofollow external" class="bo"><img src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/prob_B_x220.gif" alt="Lyric Semiconductor LEC chip" width="88" height="83" style="max-width: 100%; height: auto;"></a><a href="http://en.wikipedia.org/wiki/Analog_computer" rel="nofollow external" class="bo">Analog computers</a> were a hot idea — in the 1950s!  But I find this intriguing because I’ve come around to the position that a lot of our human “intelligence” is the result of acquiring and using probabilistic models.  So supporting this in hardware might be a big win, especially for low-cost, low-power devices.  It will also support lots of other common tasks in social computing, image processing and language technology.</p>
    <p>Technology review has a short article, <a href="http://www.technologyreview.com/computing/26055/" rel="nofollow external" class="bo">A New Kind of Microchip</a>, on computer chip being developed by <a href="http://www.public.lyricsemiconductor.com/" rel="nofollow external" class="bo">Lyric Semiconductor</a> that process signals representing probabilities rather than  digital bits.</p>
    <blockquote><p>
    “A computer chip that performs calculations using probabilities, instead of binary logic, could accelerate everything from online banking systems to the flash memory in smart phones and other gadgets. … And because that kind of math is at the core of many products, there are many potential applications. “To take one example, Amazon’s recommendations to you are based on probability,” says Vigoda. “Any time you buy [from] them, the fraud check on your credit card is also probability [based], and when they e-mail your confirmation, it passes through a spam filter that also uses probability.”</p>
    <p>All those examples involve comparing different data to find the most likely fit. Implementing the math needed to do this is simpler with a chip that works with probabilities, says Vigoda, allowing smaller chips to do the same job at a faster rate. A processor that dramatically speeds up such probability-based calculations could find all kinds of uses.”
    </p></blockquote>
    <p>Lyric’s chip is called LEC and is 30 times smaller in size than current digital error correction technology according to <a href="http://www.wired.com/gadgetlab/tag/ben-vigoda/" rel="nofollow external" class="bo">Wired</a>.  Although small it yields “a Pentium’s worth of computation,” according to Lyric CEO Vigoda.  His 2003 dissertation at MIT was on a related topic, <a href="http://phm.cba.mit.edu/theses/03.07.vigoda.pdf" rel="nofollow external" class="bo">Analog Logic: Continuous-Time Analog Circuits for Statistical Signal Processing</a>.</p></div>
]]>
  </Body>
  <Summary>Analog computers were a hot idea — in the 1950s!  But I find this intriguing because I’ve come around to the position that a lot of our human “intelligence” is the result of acquiring and using...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/08/18/probability-based-processor-might-speed-ai-applications/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2176/guest@my.umbc.edu/42f0b31990dcd282ad2629e2e6258a8a/api/pixel</TrackingUrl>
  <Tag>general</Tag>
  <Tag>semantic-web</Tag>
  <Tag>social-media</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>3</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 18 Aug 2010 12:39:13 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="2148" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2148">
  <Title>An ontology of social media data for better privacy policies</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>Privacy continues to be an important topic surrounding social media systems.  A big part of the problem is that virtually all of us have a difficult time thinking about what information about us is exposed and to whom and for how long.  As UMBC colleague <a href="http://userpages.umbc.edu/~zeynep/" rel="nofollow external" class="bo">Zeynep Tufekci</a> points out, our intuitions in such matters come from experiences in the physical world, a place whose physics differs considerably from the cyber world.</p>
    <p><a href="http://en.wikipedia.org/wiki/Bruce_Schneier" rel="nofollow external" class="bo">Bruce Schneier</a> offered a taxonomy of social networking data in a <a href="http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2010.118" rel="nofollow external" class="bo">short article</a> in the July/August issue of the IEEE Security &amp; Privacy.  A version of the article, <a href="http://www.schneier.com/essay-322.html" rel="nofollow external" class="bo">A Taxonomy of Social Networking Data</a>, is available on his site.</p>
    <blockquote><p>
    “Below is my taxonomy of social networking data, which I first presented at the Internet Governance Forum meeting last November, and again — revised — at an <a href="http://www.oecd.org/document/62/0,3343,en_2649_33703_44949886_1_1_1_1,00.html" rel="nofollow external" class="bo">OECD workshop on the role of Internet intermediaries</a> in June.</p>
    <ul>
    <li><strong>Service data</strong> is the data you give to a social networking site in order to use it. Such data might include your legal name, your age, and your credit-card number.</li>
    <li><strong>Disclosed data</strong> is what you post on your own pages: blog entries, photographs, messages, comments, and so on.</li>
    <li><strong>Entrusted data</strong> is what you post on other people’s pages. It’s basically the same stuff as disclosed data, but the difference is that you don’t have control over the data once you post it — another user does.</li>
    <li><strong>Incidental data</strong> is what other people post about you: a paragraph about you that someone else writes, a picture of you that someone else takes and posts. Again, it’s basically the same stuff as disclosed data, but the difference is that you don’t have control over it, and you didn’t create it in the first place.</li>
    <li><strong>Behavioral data</strong> is data the site collects about your habits by recording what you do and who you do it with. It might include games you play, topics you write about, news articles you access (and what that says about your political leanings), and so on.</li>
    <li><strong>Derived data</strong> is data about you that is derived from all the other data. For example, if 80 percent of your friends self-identify as gay, you’re likely gay yourself.”</li>
    </ul>
    </blockquote>
    <p>I think most of us understand the first two categories and can easily choose or specify a privacy policy to control access to information in them.  The rest however, are more difficult to think about and can lead to a lot of confusion when people are setting up their privacy preferences.</p>
    <p>As an example, I saw some nice work at the <a href="http://www.policy-workshop.org/program.html" rel="nofollow external" class="bo">2010 IEEE International Symposium on Policies for Distributed Systems and Networks</a> on “Collaborative Privacy Policy Authoring in a Social Networking Context” by Ryan Wishart et al. from Imperial college that addressed the problem of <em>incidental data</em> in Facebook.  For example, if I post a picture and tag others in it, each of the tagged people can contribute additional policy constraints that can narrow access to it.</p>
    <p><a href="http://en.wikipedia.org/wiki/Lorrie_Cranor" rel="nofollow external" class="bo">Lorrie Cranor</a> gave an invited talk at the workshop on <a href="http://www.policy-workshop.org/program.html#ip1_det" rel="nofollow external" class="bo">Building a Better Privacy Policy</a> and made the point that even <a href="http://en.wikipedia.org/wiki/P3P" rel="nofollow external" class="bo">P3P privacy policies</a> are difficult for people to comprehend.</p>
    <p>Having a simple ontology for social media data could help us move forward toward better privacy controls for online social media systems.  I like Schneier’s broad categories and wonder what a more complete treatment defined using <a href="http://en.wikipedia.org/wiki/Semantic_Web" rel="nofollow external" class="bo">Semantic Web</a> languages might be like.</p></div>
]]>
  </Body>
  <Summary>Privacy continues to be an important topic surrounding social media systems.  A big part of the problem is that virtually all of us have a difficult time thinking about what information about us...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/08/15/an-ontology-of-social-media-data-for-better-privacy-policies/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2148/guest@my.umbc.edu/8fe0adddf063b0e95a53aab26993bcc8/api/pixel</TrackingUrl>
  <Tag>policy</Tag>
  <Tag>privacy</Tag>
  <Tag>security</Tag>
  <Tag>semantic-web</Tag>
  <Tag>social-media</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 15 Aug 2010 14:25:05 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="2118" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2118">
  <Title>Papers with more references are cited more often</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p><a href="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/Citations_graph.jpg" rel="nofollow external" class="bo"><img src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/Citations_graph.jpg" alt="" width="130" height="138" style="max-width: 100%; height: auto;"></a>The number of citations a paper receives is generally thought to be a good and relatively objective measure of its significance and impact.</p>
    <p>Researchers naturally are interested in knowing how to attract more citations to their papers. Publishing the results of good work helps of course, but everyone knows there are many other factors.  Nature news <a href="http://www.nature.com/news/2010/100813/full/news.2010.406.html" rel="nofollow external" class="bo">reports</a> on research by <a href="http://webster.socialpsychology.org/" rel="nofollow external" class="bo">Gregory Webster</a> that analyzed the 53,894 articles and review articles published in Science between 1901 and 2000.</p>
    <p>The advice the study supports is “cite and you shall be cited”.</p>
    <blockquote><p>
    A long reference list at the end of a research paper may be the key to ensuring that it is well cited, according to an analysis of 100 years’ worth of papers published in the journal Science.<br>
         The research suggests that scientists who reference the work of their peers are more likely to find their own work referenced in turn, and the effect is on the rise, with a single extra reference in an article now producing, on average, a whole additional citation for the referencing paper.<br>
         ’There is a ridiculously strong relationship between the number of citations a paper receives and its number of references,” Gregory Webster, the psychologist at the University of Florida in Gainesville who conducted the research, told Nature. “If you want to get more cited, the answer could be to cite more people.’<br>
    …<br>
    A plot of the number of references listed in each article against the number of citations it eventually received reveal that almost half of the variation in citation rates among the Science papers can be attributed to the number of references that they include. And — contrary to what people might predict — the relationship is not driven by review articles, which could be expected, on average, to be heavier on references and to garner more citations than standard papers.
    </p></blockquote></div>
]]>
  </Body>
  <Summary>The number of citations a paper receives is generally thought to be a good and relatively objective measure of its significance and impact.   Researchers naturally are interested in knowing how to...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/08/15/papers-with-more-references-are-cited-more-often/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2118/guest@my.umbc.edu/d006e09a92106011f74a56fce5f40b87/api/pixel</TrackingUrl>
  <Tag>semantic-web</Tag>
  <Tag>social-media</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 15 Aug 2010 01:45:15 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="2090" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/2090">
    <Title>Swoogle has five faces</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><img src="http://ebiquity.umbc.edu/blogger/wp-content/uploads/2010/08/tn0_4c64543c4c1e8.jpg" alt="" width="100" height="100" style="max-width: 100%; height: auto;"> <a href="http://www.modnationonline.com/modnation-racers-tracks-karts-mods/Mods/Swoogle-5562/details" rel="nofollow external" class="bo">Seen</a> on the Web: “<a href="http://swoogle.umbc.edu/" rel="nofollow external" class="bo">Swoogle</a> is an alien from outer space send out to spy on the modnation circuit. He got five faces so he can watch them from all angles without turning his head. However only his front shows many emotions. His right face is always angry, his left face is always in awe for some reason.”</p></div>
      ]]>
    </Body>
    <Summary>Seen on the Web: “Swoogle is an alien from outer space send out to spy on the modnation circuit. He got five faces so he can watch them from all angles without turning his head. However only his...</Summary>
    <Website>http://ebiquity.umbc.edu/blogger/2010/08/13/swoogle-has-five-faces/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/2090/guest@my.umbc.edu/c4cd58ac46329a38cf5bc57bdbef36a4/api/pixel</TrackingUrl>
    <Tag>semantic-web</Tag>
    <Tag>swoogle</Tag>
    <Group token="ebiquity">Ebiquity Research Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
    <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
    <Sponsor>ebiquity research group</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 13 Aug 2010 10:05:54 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="1992" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/1992">
    <Title>Semantic Web Seen as a Distruptive Technology</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p><a href="http://washingtontechnology.com/Home.aspx" rel="nofollow external" class="bo">Washington Technology</a>, which describes itself as “the online authority for government contractors and partners”), has an article by Carlos A. Soto on <a href="http://washingtontechnology.com/Articles/2010/08/02/Cover-5-disruptive-technologies.aspx?Page=1&amp;p=1" rel="nofollow external" class="bo">5 technologies that will change the market</a>.  They are:</p>
          <ol>
          <li>Mobile</li>
          <li>Search and the Semantic Web</li>
          <li>Search and the Semantic Web</li>
          <li>Virtualization and cloud computing</li>
          <li>Virtualization and cloud computing</li>
          </ol>
          <p>These are reasonable choices, thought I’ve have not done the double counting and added “machine learning applied to the massive amounts of Web data now available” and “social computing”.</p>
          <p>But it’s gratifying to see the Semantic Web in the list.  Here’s some of what he he has to say about <a href="http://washingtontechnology.com/Articles/2010/08/02/Cover-5-disruptive-technologies.aspx?Page=3" rel="nofollow external" class="bo">search and the Semantic Web</a>.</p>
          <blockquote><p>
          The relationship between search technology and the Semantic Web is a perfect illustration of how a small sustaining technology, such as a basic search feature on an operating system, will eventually be eaten up by a larger disruptive technology, such as the Semantic Web. The Semantic Web has the potential of acting like a red giant star by expanding at exponential rates, swallowing whole planets of existing technology in the process.</p>
          <p>The technology started as a simple group of secure, trusted, linked data stores. Now Semantic Web technologies enable people to create data stores on the Web and then build vocabularies or write rules for handling the data. Because all the data by definition is trusted, security is often less of a problem. </p>
          <p>The task of turning the World Wide Web into a giant dynamic database is causing a shift among traditional search engines because products such as Apture, by Apture Inc. of San Francisco, Calif., let content publishers include pop-up definitions, images or data whenever a user scrolls over a word on a Web site. The ability to categorize content in this manner could have significant implications not only for Web searches but also for corporate intranets and your desktop PC. </p>
          <p>These types of products will continue to expand, initially in the publishing industry and then to most industries on the Web in the next two to three years. </p>
          <p>For example, human resources sites could use them to pop up a picture and a résumé blip when a recruiter drags a mouse over an applicant’s name. Medical and financial sites such as the National Institutes of Health could use it to break down jargon and help with site exploration.<br>
          …<br>
          Government sites around the world, such as Zaragoza, Spain, and medical facilities, such as the Cleveland Medical Clinic, are using the vocabulary features of the Semantic Web to create search engines that reach across complex jargon and tech silos to offer a high degree of automation, full integration with external systems and various terminologies, in addition to the ability to accurately answer users’ queries.<br>
          …”
          </p></blockquote>
          <p>(h/t <a href="http://twitter.com/FrankVanHarmele" rel="nofollow external" class="bo">@FrankVanHarmele</a>)</p></div>
      ]]>
    </Body>
    <Summary>Washington Technology, which describes itself as “the online authority for government contractors and partners”), has an article by Carlos A. Soto on 5 technologies that will change the market....</Summary>
    <Website>http://ebiquity.umbc.edu/blogger/2010/08/01/semantic-web-seen-as-a-distruptive-technology/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/1992/guest@my.umbc.edu/133a84ebdee2856f1de6b654209f6f4a/api/pixel</TrackingUrl>
    <Tag>semantic-web</Tag>
    <Group token="ebiquity">Ebiquity Research Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
    <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
    <Sponsor>ebiquity research group</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 01 Aug 2010 17:45:32 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="1989" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/1989">
    <Title>What Is Up With Clearspring and Malware?</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><p>Google Chrome has been showing me a malware warning page today as I try to visit normally trusted and benign sites.  I got this one just now as I tried to got to <a href="http://planetrdf.com/" rel="nofollow external" class="bo">Planet RDF</a>.</p>
          <blockquote><p>
          <strong>Warning: Visiting this site may harm your computer!</strong></p>
          <p>The website at planetrdf.com contains elements from the site bin.clearspring.com, which appears to host malware – software that can hurt your computer or otherwise operate without your consent. Just visiting a site that contains malware can infect your computer.</p>
          <p>For detailed information about the problems with these elements, visit the Google <a href="http://safebrowsing.clients.google.com/safebrowsing/diagnostic?site=http://bin.clearspring.com/crossdomain.xml&amp;client=googlechrome&amp;hl=en-US" rel="nofollow external" class="bo">Safe Browsing diagnostic page for bin.clearspring.com</a>.</p>
          <p><a href="http://www.google.com/support/websearch/bin/answer.py?answer=45449&amp;topic=360&amp;sa=X&amp;oi=malwarewarninglink&amp;resnum=1&amp;ct=help&amp;hl=en-US" rel="nofollow external" class="bo">Learn more about how to protect yourself from harmful software online</a>.</p>
          <p>[ ] I understand that visiting this site may harm my computer. <a href="http:planetrdf.com/" rel="nofollow external" class="bo">PROCEED</a>
          </p></blockquote>
          <p>Clearspring claims it’s a <a href="http://www.clearspring.com/blog/2010/07/31/technical-problems-this-morning/" rel="nofollow external" class="bo">technical problem</a>, although they admit they were using a service that was compromised with files redirecting users to a certain malware domain.  I’m a bit fuzzy on what clearspring does and where they are being used on the Planet RDF site.  I don’t see it in the page source, for example.</p>
          <p><strong>update:</strong> Maybe the problem stems from <a href="http://en.wikipedia.org/wiki/Local_Shared_Object" rel="nofollow external" class="bo">flash cookies</a> in blog content being syndicated by Planet RDF that have flash objects mediated by clearspring.</p></div>
      ]]>
    </Body>
    <Summary>Google Chrome has been showing me a malware warning page today as I try to visit normally trusted and benign sites.  I got this one just now as I tried to got to Planet RDF.     Warning: Visiting...</Summary>
    <Website>http://ebiquity.umbc.edu/blogger/2010/07/31/what-is-up-with-clearspring-and-malware/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/1989/guest@my.umbc.edu/36356198c479b01bf807350a0138de3f/api/pixel</TrackingUrl>
    <Tag>semantic-web</Tag>
    <Group token="ebiquity">Ebiquity Research Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
    <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
    <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
    <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
    <Sponsor>ebiquity research group</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 31 Jul 2010 20:05:46 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="1990" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ebiquity/posts/1990">
  <Title>W3C EmotionML Provides Markup for Emotions</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><p>The W3C has published a second working draft of <a href="http://www.w3.org/TR/2010/WD-emotionml-20100729/" rel="nofollow external" class="bo">EmotionML</a>, or the <em>emotion markup language</em>, Here’s how it’s described.</p>
    <blockquote><p>
    As the web is becoming ubiquitous, interactive, and multimodal, technology needs to deal increasingly with human factors, including emotions. The present draft specification of Emotion Markup Language 1.0 aims to strike a balance between practical applicability and scientific well-foundedness. The language is conceived as a “plug-in” language suitable for use in three different areas: (1) manual annotation of data; (2) automatic recognition of emotion-related states from user behavior; and (3) generation of emotion-related system behavior.
    </p></blockquote>
    <p>Unfortunately EmotionML is not built on RDF.  If it were, I would have marked up this post in RDFa using it!</p>
    <p>The working draft identifies concrete examples where EmotionML might be useful including as a markup or representation for systems that do opinion mining, sentiment analysis, affect monitoring, and emotion recognition.  A list of 39 individual use cases for EmotionML are given in an <a href="http://www.w3.org/2005/Incubator/emotion/XGR-emotion/#AppendixUseCases" rel="nofollow external" class="bo">appendix</a>.</p>
    <p>EmotionML markup explicitly refers to one or more separate vocabularies used for representing emotion-related states. However, the group has defined some default vocabularies that can be used.  An example is the <a href="http://en.wikipedia.org/wiki/Paul_Ekman" rel="nofollow external" class="bo">Ekman “big six”</a> basic emotions (anger, disgust, fear, happiness, sadness, and surprised).  Another is the a set of appraisal terms defined by Ortony et al. (desirability, praiseworthiness, appealingness,, desirability-for-other, deservingness, liking, likelihood, effort, realization, strength-of-identification, expectation-of-deviation and familiarity)</p>
    <p>Here’s an example from the working draft where a static image is annotated with several emotion categories with different intensities.</p>
    <blockquote>
    <pre>&lt;emotionml xmlns="<a href="http://www.w3.org/2009/10/emotionml">http://www.w3.org/2009/10/emotionml</a>"&#x000A;               xmlns:meta="<a href="http://www.example.com/metadata">http://www.example.com/metadata</a>"&#x000A;               category-set="<a href="http://www.example.com/custom/">http://www.example.com/custom/</a>&#x000A;                    hall-matsumoto-emotions.xml"&gt;&#x000A;       &lt;info&gt;&#x000A;          &lt;meta:media-type&gt;image&lt;/meta:media-type&gt;&#x000A;          &lt;meta:media-id&gt;disgust&lt;/meta:media-id&gt;&#x000A;          &lt;meta:media-set&gt;JACFEE-database&lt;/meta:media-set&gt;&#x000A;          &lt;meta:doc&gt;Example adapted from (Hall and Matsumoto 2004) &#x000A;    &#x000A;    <a href="http://www.davidmatsumoto.info/Articles/">http://www.davidmatsumoto.info/Articles/</a>&#x000A;    &#x000A;              2004_hall_and_matsumoto.pdf&#x000A;          &lt;/meta:doc&gt;&#x000A;       &lt;/info&gt;&#x000A;    &#x000A;       &lt;emotion&gt;&#x000A;           &lt;category name="Disgust"/&gt;&#x000A;           &lt;intensity value="0.82"/&gt;&#x000A;       &lt;/emotion&gt;&#x000A;       &lt;emotion&gt;&#x000A;           &lt;category name="Contempt"/&gt;&#x000A;           &lt;intensity value="0.35"/&gt;&#x000A;       &lt;/emotion&gt;&#x000A;       &lt;emotion&gt;&#x000A;           &lt;category name="Anger"/&gt;&#x000A;           &lt;intensity value="0.12"/&gt;&#x000A;       &lt;/emotion&gt;&#x000A;       &lt;emotion&gt;&#x000A;           &lt;category name="Surprise"/&gt;&#x000A;           &lt;intensity value="0.53"/&gt;&#x000A;       &lt;/emotion&gt;&#x000A;    &lt;/emotionml&gt;&#x000A;    </pre>
    </blockquote>
    <p>rdfs:seeAlso the short <a href="http://www.infoq.com/news/2010/07/EmotionML" rel="nofollow external" class="bo">article</a> by InqoQ on the EmotionML working draft.</p></div>
]]>
  </Body>
  <Summary>The W3C has published a second working draft of EmotionML, or the emotion markup language, Here’s how it’s described.     As the web is becoming ubiquitous, interactive, and multimodal, technology...</Summary>
  <Website>http://ebiquity.umbc.edu/blogger/2010/07/31/w3c-emotionml-provides-markup-for-emotions/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/1990/guest@my.umbc.edu/b88e7ea436480ce9e706ddb2a57b27c8/api/pixel</TrackingUrl>
  <Tag>kr</Tag>
  <Tag>semantic-web</Tag>
  <Tag>social-media</Tag>
  <Tag>web</Tag>
  <Group token="ebiquity">Ebiquity Research Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/ebiquity</GroupUrl>
  <AvatarUrl>https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/original.gif?1282159680</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xlarge.png?1282159680</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/large.png?1282159680</AvatarUrl>
  <AvatarUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/medium.png?1282159680</AvatarUrl>
  <AvatarUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/small.png?1282159680</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xsmall.png?1282159680</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/003/36ac8e558ac7690b6f44e2cb5ef93322/xxsmall.png?1282159680</AvatarUrl>
  <Sponsor>ebiquity research group</Sponsor>
  <PawCount>5</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 31 Jul 2010 11:54:37 -0400</PostedAt>
</NewsItem>
</News>
