Björn Roß

ORCID: 0000-0003-2717-3705
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Hate Speech and Cyberbullying Detection
  • Social Media and Politics
  • Misinformation and Its Impacts
  • Complex Network Analysis Techniques
  • Opinion Dynamics and Social Influence
  • Digital Marketing and Social Media
  • Topic Modeling
  • Spam and Phishing Detection
  • Sentiment Analysis and Opinion Mining
  • Natural Language Processing Techniques
  • Big Data and Business Intelligence
  • Media Influence and Politics
  • Advanced Malware Detection Techniques
  • Digital Transformation in Industry
  • Knowledge Management and Sharing
  • Public Relations and Crisis Communication
  • Computational and Text Analysis Methods
  • Wikis in Education and Collaboration
  • Team Dynamics and Performance
  • AI in Service Interactions
  • Media Studies and Communication
  • Research Data Management Practices
  • Data Quality and Management
  • Cybercrime and Law Enforcement Studies
  • Impact of Technology on Adolescents

University of Edinburgh
2020-2025

University of Duisburg-Essen
2017-2023

Tokyo Institute of Technology
2023

Administration for Community Living
2023

IT University of Copenhagen
2023

American Jewish Committee
2023

Network Technologies (United States)
2020

Bell (Canada)
2002

Since an ever-increasing part of the population makes use social media in their day-to-day lives, data is being analysed many different disciplines. The analytics process involves four distinct steps, discovery, collection, preparation, and analysis. While there a great deal literature on challenges difficulties involving specific analysis methods, hardly exists research stages preparation. To address this gap, we conducted extended structured through which identified addressed solutions...

10.1016/j.ijinfomgt.2017.12.002 article EN cc-by International Journal of Information Management 2017-12-22

Some users of social media are spreading racist, sexist, and otherwise hateful content. For the purpose training a hate speech detection system, reliability annotations is crucial, but there no universally agreed-upon definition. We collected potentially messages asked two groups internet to determine whether they were or not, should be banned not rate their degree offensiveness. One was shown definition prior completing survey. aimed assess can annotated reliably, extent which existing...

10.48550/arxiv.1701.08118 preprint EN cc-by arXiv (Cornell University) 2017-01-01

In this article, we introduce and discuss the pervasive issue of bias in large language models that are currently at core mainstream approaches to Natural Language Processing (NLP). We first data selection bias, is, caused by choice texts make up a training corpus. Then, survey different types social evidenced text generated trained on such corpora, ranging from gender age, sexual orientation ethnicity, religion culture. conclude with directions focused measuring, reducing, tackling...

10.1145/3597307 article EN Journal of Data and Information Quality 2023-05-16

So-called 'social bots' have garnered a lot of attention lately. Previous research showed that they attempted to influence political events such as the Brexit referendum and US presidential elections. It remains, however, somewhat unclear what exactly can be understood by term bot'. This paper addresses need better understand intentions bots on social media develop shared understanding how 'social' differ from other types bots. We thus describe systematic review publications researched bot...

10.48550/arxiv.1710.04044 preprint EN other-oa arXiv (Cornell University) 2017-01-01

Abstract Organizations introduce virtual assistants (VAs) to support employees with work-related tasks. VAs can increase the success of teamwork and thus become an integral part daily work life. However, effect on teams remains unclear. While social identity theory describes identification team members continued existence a group identity, concept extended self refers incorporation possessions into one’s sense self. This raises question which approach applies as teammates. The article...

10.1007/s12599-020-00672-x article EN cc-by Business & Information Systems Engineering 2020-12-01

Widespread mis- and disinformation during the COVID-19 social media "infodemic" challenge effective response of Emergency Management Agencies (EMAs). Conversational Agents (CAs) have potential to amplify distribute trustworthy information from EMAs general public in times uncertainty. However, structure responsibilities such are different comparison traditional commercial organizations. Consequently, Information Systems (IS) design approaches for CAs not directly transferable this type...

10.1016/j.ijinfomgt.2021.102469 article EN cc-by International Journal of Information Management 2022-01-13

Abstract When attempting to solve a problem, humans call upon cognitive resources. These resources are limited, and the degree of their utilisation is described as load. While number parameters be taken into account processed by modern-day knowledge workers increases, do not. Research shows that too high load can increase stress failure rates decrease work satisfaction performance employees. It thus in interest organisations reduce employees keep it at moderate level. One way achieve this...

10.1007/s10257-020-00471-7 article EN cc-by Information Systems and e-Business Management 2020-06-01

Modern computational text classification methods have brought social scientists tantalizingly close to the goal of unlocking vast insights buried in data—from centuries historical documents streams media posts. Yet three barriers still stand way: tedious labor manual annotation, technical complexity that keeps these tools out reach for many researchers, and, perhaps most critically, challenge bridging gap between sophisticated algorithms and deep theoretical understanding already developed...

10.1177/00491241251326819 article EN Sociological Methods & Research 2025-04-18

During a crisis, authorities need to effectively disseminate information. We address the problem of deciding how crisis-related information should be published on Facebook reach as many people possible. examine three recent terrorist attacks in Berlin, London and Stockholm. Our specific focus lies with official pages by municipalities emergency service agencies. collected posts about events, along number shares, likes emotional reactions them. In regression analysis, several variables were...

10.24251/hicss.2018.319 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2018-01-01

As false information may spread rapidly on social media, a profound understanding of how it can be debunked is required. This study offers empirical insights into the development rumors after they are debunked, various user groups who involved in process, and their network structures. crisis situations highly sensitive to rumors, Twitter posts from during 2017 G20 summit examined. Tweets regarding five that were this event manually coded following categories: rumor, debunking message,...

10.1177/2053951720980127 article EN cc-by-nc-nd Big Data & Society 2020-07-01

Computational social science uses computational and statistical methods in order to evaluate interaction. The public availability of data sets is thus a necessary precondition for reliable replicable research. These allow researchers benchmark the they develop, test generalizability their findings, build confidence results. When media are concerned, sharing often restricted legal or privacy reasons, which makes comparison replicability research results infeasible. Social analytics research,...

10.1177/08944393211012268 article EN cc-by Social Science Computer Review 2021-05-21

Automated sentiment analysis can help efficiently detect trends in patients' moods, consumer preferences, political attitudes and more. Unfortunately, like many natural language processing techniques, show bias against marginalised groups. We illustrate this point by showing how six popular tools respond to sentences about queer identities, expanding on existing work gender, ethnicity disability. find evidence of several including the two models from Google Amazon that seem have been subject...

10.1177/08944393231152946 article EN cc-by Social Science Computer Review 2023-02-02

Research data management (RDM) is an important prerequisite for a substantial and sustainable contribution to knowledge. There pressing need examine why researchers hesitate store, annotate, share manage their research data. To model underlying psychological factors influencing researchers' refusal conduct RDM, the social exchange theory extended with elements from prospect theory. Thus, it allows insights into decision-making, illustrates role of cost benefit evaluations under uncertainty....

10.1016/j.ijinfomgt.2020.102174 article EN cc-by International Journal of Information Management 2020-06-28
Coming Soon ...