Twitter Dataset Sample Clauses

Twitter Dataset. As shown in Figure 3.1, twelve days’ tweets (in total 1,160,591 tweets) are scraped via the Twitter API using keyword search. Figure 3.1: Number of Covid-19-related tweets collected by keyword search, posted from March 1st to March 12th, 2020, without any language filtering. To ensure the dataset covers as many coronavirus-related posts as pos- sible, we manually read many tweets discussing the pandemic and collect relevant words that frequently show up in tweets under this topic. As a result, multiple keywords are included in the keyword search process: coronavirus, koronavirus, corona, wuhancoronavirus, wuhanvirus, kungflu, epidemic, covid- 19, covid19, corona virus, covid, chinavirus, and pandemic. Many prior studies rely on hashtag extraction to collect tweets containing the token of interest [12]. To explain the difference between hashtag extraction and keyword extraction, we would first need to understand the function of hashtags in Twitter. The hashtag symbol “#” is put before words or phrases to help Twitter users indicate the relevant topics of their tweets. Additionally, when people are interested in certain subject, they can simply tap on the hashtagged word or phrase to see all other tweets that have used the same hashtag. Here is an example of event detection using hashtag search: Xxxxxxxxx notices that people will use the hashtag “#oscars2010” to discuss related matters, because it’s an annual event and the use of hashtags indicates that the event is not only attractive to the public but more importantly, rela- tively rare [12]. However, since hashtags are usually used to highlight sudden heated topics, as the epidemic escalates in the U.S., people are less likely to use hashtags when discussing Covid-19-related subjects. In this context, hashtag extraction method increases the risk of undersized sampling. There- fore, to avoid any bias caused by the normalization of the pandemic, this study employs keyword search rather than hashtag extraction. In addition, some chosen keywords are in their misspelled form (e.g., koronavirus) or conveying racist connotations (e.g., kungflu and chinavirus). Although these words rarely appear in mainstream news reports, they are frequently used by social media especially in the early stage of coronavirus pandemic. The use of these racist words has become even more prevalent after President Xxxxx blames China for not restricting international flights and eventu- ally infecting the whole world, inciting the ethn...
AutoNDA by SimpleDocs
Twitter Dataset. From September 25th, 2016 to November 8th, 2016 about 135.5 million tweets were collected for this project.1 This was achieved by developing a client which took advantage of Twitter’s streaming application programming interface (API).2 The client watched for any public status update posted during this 1The client crashed three times during the course of collection, thus any tweets collected on those days were excluded from this project. time period which included any one of the following words: hillary, clinton, hillaryclinton, donald, trump, realdonaldtrump, election, and debate. It is true that these 8 words do not encompass every permutation of how those on Twitter might reference the two presidential candidates. Yet, for the purposes of this research it was important to anthologize the least skewed portrait of the online conversations about Clinton and Xxxxx. Therefore, the decision was made to only collect the formal names (i.e. their first and last names) that are used to reference either candidate. Because of how usernames are used on Twitter, as described supra, both candidates usernames were also included in collection. Additionally, the terms election and debate were also chosen as signal words for an important tweet to capture by the streaming client. The client only kept a status with either of these words when it appeared in conjunction with one of the other signal words, she, or he. The purpose of this is to capture tweets indirectly referencing either candidate. After the client compiled each new status into the corpus, it was classified as referencing Clinton or referencing Xxxxx. For the experiments using this data to be reliable indicators of the electorate’s attitude, this step was crucial. Because of this, criteria for inclusion into the subset of either candidates tweets was rigorously constructed. Damerau-Levenshtein distance was used to perform approximate string matching between a pre-determined set of terms for each canidate to determine if the tweet exclusively references one of the candidates. Through experimentation, an edit distance of 2 was chosen as the cutoff for matches. The resulting subset discussing Clinton included 35.7 million tweets and the subset discussing Xxxxx included 51.9 million tweets.

Related to Twitter Dataset

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Third Party Websites The Service may contain or reference links to websites operated by third parties ("Third Party Websites"). These links are provided as a convenience only. Such Third Party Websites are not under our control. We are not responsible for the content of any Third Party Website or any link contained in a Third Party Website. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to Third Party Websites, and the inclusion of any link in the Service, Debit Rewards Offers or any other services provided in connection with them is not and does not imply an affiliation, sponsorship, endorsement, approval, investigation, verification or monitoring by us of any information contained in any Third Party Website. In no event will we be responsible for the information contained in such Third Party Website or for your use of or inability to use such website. Access to any Third Party Website is at your own risk, and you acknowledge and understand that linked Third Party Websites may contain terms and privacy policies that are different from ours. We are not responsible for such provisions, and expressly disclaim any liability for them.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!