4 research outputs found

    Named entity extraction and disambiguation for informal text: the missing link

    Get PDF
    Social media content represents a large portion of all textual content appearing\ud on the Internet. These streams of user generated content (UGC) provide an opportunity and challenge for media analysts to analyze huge amount of new data and use them to infer and reason with new information. An example of a main sector for social media analysis is the area of customer feedback through social media. With so many feedback channels, organizations can mix and match them to best suit corporate needs and customer preferences. Another beneficial sector is social security. Automatic monitoring and gathering of information posted in social media can be helpful to take actions to prevent violent and destructive behavior.\ud \ud A main challenge of natural language is its ambiguity and vagueness. To\ud automatically resolve ambiguity by computers, the grammatical structure of\ud sentences is used, for instance, which groups of words go together (phrases)\ud and which words are the subject or object of a verb. However, when we move\ud to informal language widely used in social media, the language becomes more\ud ambiguous and thus more challenging for automatic understanding.\ud \ud Information Extraction (IE) is the research field that enables the use of unstructured text in a structured way. Named Entity Extraction (NEE) is a sub task of IE that aims to locate phrases (mentions) in the text that represent names of entities such as persons, organizations or locations regardless of their type. Named Entity Disambiguation (NED) is the task of determining which correct person, place, event, etc. is referred to by a mention.\ud \ud The main goal of this thesis is to mimic the human way of recognition and\ud disambiguation of named entities especially for domains that lack formal sentence structure. The proposed methods open the doors for more sophisticated\ud applications based on users’ contributions on social media. We propose a robust\ud combined framework for NEE and NED in semi-formal and informal text. The achieved robustness has been proven to be valid across languages and domains\ud and to be independent of the selected extraction and disambiguation techniques. It is also shown to be robust against shortness in labeled training data and against the informality of the used language. We have discovered a reinforcement effect and exploited it a technique that improves extraction quality by feeding back disambiguation results. We present a method of handling\ud the uncertainty involved in extraction to improve the disambiguation results.\ud A generic approach for NED in tweets for any named entity (not entity oriented)\ud is presented. This approach overcomes the problem of limited coverage of KBs. Mentions are disambiguated by assigning them to either a Wikipedia article or a home page. We also introduce a method to enrich the limited entity context

    Handling uncertainty in information extraction

    No full text
    This position paper proposes an interactive approach for developing information extractors based on the ontology definition process with knowledge about possible (in)correctness of annotations. We discuss the problem of managing and manipulating probabilistic dependencies

    Detecting Hacked Twitter Accounts based on Behavioural Change

    No full text
    Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features associated with behavioural change such as changes in language, source, URLs, retweets, frequency and time. We experiment with a Twitter data set containing tweets of more than 100 Dutch users including 37 who were hacked. The model detects 99% of the malicious tweets which proves that behavioural changes can reveal a hack and that anomaly-based features perform better than regular features. Our approach can be used by social media systems such as Twitter to automatically detect a hack of an account only a short time after the fact allowing the legitimate owner of the account to be warned or protected, preventing reputational damage and annoyance
    corecore