scispace - formally typeset
Search or ask a question
Author

Leysia Palen

Bio: Leysia Palen is an academic researcher from University of Colorado Boulder. The author has contributed to research in topics: Social media & Computer-supported cooperative work. The author has an hindex of 57, co-authored 118 publications receiving 14431 citations. Previous affiliations of Leysia Palen include University of California & University of California, Irvine.


Papers
More filters
Proceedings ArticleDOI
10 Apr 2010
TL;DR: Analysis of microblog posts generated during two recent, concurrent emergency events in North America via Twitter, a popular microblogging service, aims to inform next steps for extracting useful, relevant information during emergencies using information extraction (IE) techniques.
Abstract: We analyze microblog posts generated during two recent, concurrent emergency events in North America via Twitter, a popular microblogging service. We focus on communications broadcast by people who were "on the ground" during the Oklahoma Grassfires of April 2009 and the Red River Floods that occurred in March and April 2009, and identify information that may contribute to enhancing situational awareness (SA). This work aims to inform next steps for extracting useful, relevant information during emergencies using information extraction (IE) techniques.

1,479 citations

Proceedings ArticleDOI
05 Apr 2003
TL;DR: A model of privacy as a dynamic, dialectic process is outlined, and three tensions that govern interpersonal privacy management in everyday life are discussed, and these are used to explore select technology case studies drawn from the research literature.
Abstract: Although privacy is broadly recognized as a dominant concern for the development of novel interactive technologies, our ability to reason analytically about privacy in real settings is limited. A lack of conceptual interpretive frameworks makes it difficult to unpack interrelated privacy issues in settings where information technology is also present. Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process. We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature. These suggest new ways for thinking about privacy in socio-technical environments as a practical matter.

994 citations

Journal ArticleDOI
TL;DR: The findings suggest that Twitter messages sent during these types of events contain more displays of information broadcasting and brokerage, and that general Twitter use seems to have evolved over time to offer more of an information-sharing purpose.
Abstract: This paper offers a descriptive account of Twitter (a microblogging service) across four high-profile, mass convergence events - two emergency and two national security. We statistically examine how Twitter is being used surrounding these events, and compare and contrast how that behaviour is different from more general Twitter use. Our findings suggest that Twitter messages sent during these types of events contain more displays of information broadcasting and brokerage, and we observe that general Twitter use seems to have evolved over time to offer more of an information-sharing purpose. We also provide preliminary evidence that Twitter users who join during and in apparent relation to a mass convergence or emergency event are more likely to become long-term adopters of the technology.

990 citations

Proceedings ArticleDOI
07 May 2011
TL;DR: This empirical study of "digital volunteers" in the aftermath of the Haiti earthquake describes their behaviors and mechanisms of self-organizing in the information space of a microblogging environment, where collaborators were newly found and distributed across continents.
Abstract: This empirical study of "digital volunteers" in the aftermath of the January 12, 2010 Haiti earthquake describes their behaviors and mechanisms of self-organizing in the information space of a microblogging environment, where collaborators were newly found and distributed across continents. The paper explores the motivations, resources, activities and products of digital volunteers. It describes how seemingly small features of the technical environment offered structure for self-organizing, while considering how the social-technical milieu enabled individual capacities and collective action. Using social theory about self-organizing, the research offers insight about features of coordination within a setting of massive interaction.

539 citations

Proceedings ArticleDOI
29 Apr 2007
TL;DR: Drawing on disaster social science, a critical aspect of post-impact disaster response that does not yet receive much information science research attention is considered, with a focus on persistent citizen communications as one form of interaction in this arena.
Abstract: Recent world-wide crisis events have drawn new attention to the role information communication technology (ICT) can play in warning and response activities. Drawing on disaster social science, we consider a critical aspect of post-impact disaster response that does not yet receive much information science research attention. Public participation is an emerging, large-scale arena for computer-mediated interaction that has implications for both informal and formal response. With a focus on persistent citizen communications as one form of interaction in this arena, we describe their spatial and temporal arrangements, and how the emerging information pathways that result serve different post-impact functions. However, command-and-control models do not easily adapt to the expanding data-generating and -seeking activities by the public. ICT in disaster contexts will give further rise to improvised activities and temporary organizations with which formal response organizations need to align.

530 citations


Cited by
More filters
Book
01 Jan 2003
TL;DR: In this paper, Sherry Turkle uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, virtual reality, and the on-line way of life.
Abstract: From the Publisher: A Question of Identity Life on the Screen is a fascinating and wide-ranging investigation of the impact of computers and networking on society, peoples' perceptions of themselves, and the individual's relationship to machines. Sherry Turkle, a Professor of the Sociology of Science at MIT and a licensed psychologist, uses Internet MUDs (multi-user domains, or in older gaming parlance multi-user dungeons) as a launching pad for explorations of software design, user interfaces, simulation, artificial intelligence, artificial life, agents, "bots," virtual reality, and "the on-line way of life." Turkle's discussion of postmodernism is particularly enlightening. She shows how postmodern concepts in art, architecture, and ethics are related to concrete topics much closer to home, for example AI research (Minsky's "Society of Mind") and even MUDs (exemplified by students with X-window terminals who are doing homework in one window and simultaneously playing out several different roles in the same MUD in other windows). Those of you who have (like me) been turned off by the shallow, pretentious, meaningless paintings and sculptures that litter our museums of modern art may have a different perspective after hearing what Turkle has to say. This is a psychoanalytical book, not a technical one. However, software developers and engineers will find it highly accessible because of the depth of the author's technical understanding and credibility. Unlike most other authors in this genre, Turkle does not constantly jar the technically-literate reader with blatant errors or bogus assertions about how things work. Although I personally don't have time or patience for MUDs,view most of AI as snake-oil, and abhor postmodern architecture, I thought the time spent reading this book was an extremely good investment.

4,965 citations

Journal ArticleDOI
26 Nov 2008-City
TL;DR: In this article, the authors provide a preliminary critical polemic against some of the more rhetorical aspects of smart cities, with a view to problematizing a range of elements that supposedly characterize this new urban form, as well as question some underlying assumptions/contradictions hidden within the concept.
Abstract: Debates about the future of urban development in many Western countries have been increasingly influenced by discussions of smart cities. Yet despite numerous examples of this ‘urban labelling’ phenomenon, we know surprisingly little about so‐called smart cities, particularly in terms of what the label ideologically reveals as well as hides. Due to its lack of definitional precision, not to mention an underlying self‐congratulatory tendency, the main thrust of this article is to provide a preliminary critical polemic against some of the more rhetorical aspects of smart cities. The primary focus is on the labelling process adopted by some designated smart cities, with a view to problematizing a range of elements that supposedly characterize this new urban form, as well as question some of the underlying assumptions/contradictions hidden within the concept. To aid this critique, the article explores to what extent labelled smart cities can be understood as a high‐tech variation of the ‘entrepreneurial city’...

2,331 citations

Journal ArticleDOI
TL;DR: In this article, it is argued that human action is built through the simultaneous deployment of a range of quite different kinds of semiotic resources, such as graphic fields of various types, without which the constitution of particular kinds of action being invoked through talk would be impossible.

2,196 citations

Proceedings ArticleDOI
28 Mar 2011
TL;DR: There are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.
Abstract: We analyze the information credibility of news propagated through Twitter, a popular microblogging service. Previous research has shown that most of the messages posted on Twitter are truthful, but the service is also used to spread misinformation and false rumors, often unintentionally.On this paper we focus on automatic methods for assessing the credibility of a given set of tweets. Specifically, we analyze microblog postings related to "trending" topics, and classify them as credible or not credible, based on features extracted from them. We use features from users' posting and re-posting ("re-tweeting") behavior, from the text of the posts, and from citations to external sources.We evaluate our methods using a significant number of human assessments about the credibility of items on a recent sample of Twitter postings. Our results shows that there are measurable differences in the way messages propagate, that can be used to classify them automatically as credible or not credible, with precision and recall in the range of 70% to 80%.

2,123 citations

Book
01 Jan 2015
TL;DR: Fawcett, M.K.Halliday, Sydney M. Lamb and Adam Makkai as discussed by the authors presented a systemic-functional interpretation of the nature and ontogenesis of dialogue.
Abstract: List of Figures List of Tables Foreword Introduction Robin P. Fawcett, M.A.K. Halliday, Sydney M. Lamb and Adam Makkai 1 Language as Code and Language as Behaviour: A Systemic-Functional Interpretation of the Nature and Ontogenesis of Dialogue M.A.K. Halliday 2 Metaphors of Information John Regan 3 How Universal is a Localist Hypothesis? A Linguistic Contribution to the Study of 'Semantic Styles' of Language Yoshihiko Ikegami 4 Some Speculations on Language Contact in a Wider Setting Jeffrey Ellis 5 Ways of Saying: Ways of Meaning Ruqaiya Hasan Index

2,087 citations