IDEAS home Printed from https://ideas.repec.org/a/spr/comaot/v18y2012i3d10.1007_s10588-012-9125-y.html
   My bibliography  Save this article

Data-to-model: a mixed initiative approach for rapid ethnographic assessment

Author

Listed:
  • Kathleen M. Carley

    (Carnegie Mellon University)

  • Michael W. Bigrigg

    (Carnegie Mellon University)

  • Boubacar Diallo

    (Carnegie Mellon University)

Abstract

Rapid ethnographic assessment is used when there is a need to quickly create a socio-cultural profile of a group or region. While there are many forms such an assessment can take, we view it as providing insight into who are the key actors, what are the key issues, sentiments, resources, activities and locations, how have these changed in recent times, and what roles do the various actors play. We propose a mixed initiative rapid ethnographic approach that supports socio-cultural assessment through a network analysis lens. We refer to this as the data-to-model (D2M) process. In D2M, semi-automated computer-based text-mining and machine learning techniques are used to extract networks linking people, groups, issues, sentiments, resources, activities and locations from vast quantities of texts. Human-in-the-loop procedures are then used to tune and correct the extracted data and refine the computational extraction. Computational post-processing is then used to refine the extracted data and augment it with other information, such as the latitude and longitude of particular cities. This methodology is described and key challenges illustrated using three distinct data sets. We find that the data-to-model approach provides a reusable, scalable, rapid approach for generating a rapid ethnographic assessment in which human effort and coding errors are reduced, and the resulting coding can be replicated.

Suggested Citation

  • Kathleen M. Carley & Michael W. Bigrigg & Boubacar Diallo, 2012. "Data-to-model: a mixed initiative approach for rapid ethnographic assessment," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 300-327, September.
  • Handle: RePEc:spr:comaot:v:18:y:2012:i:3:d:10.1007_s10588-012-9125-y
    DOI: 10.1007/s10588-012-9125-y
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10588-012-9125-y
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10588-012-9125-y?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bentley, Margaret E. & Pelto, Gretel H. & Straus, Walter L. & Schumann, Debra A. & Adegbola, Catherine & de la Pena, Emanuela & Oni, Gbolahan A. & Brown, Kenneth H. & Huffman, Sandra L., 1988. "Rapid ethnographic assessment: Applications in a diarrhea management program," Social Science & Medicine, Elsevier, vol. 27(1), pages 107-116, January.
    2. Jana Diesner & Kathleen M. Carley, 2008. "Conditional random fields for entity extraction and ontological text coding," Computational and Mathematical Organization Theory, Springer, vol. 14(3), pages 248-262, September.
    3. Kathleen M. Carley, 2006. "Destabilization of covert networks," Computational and Mathematical Organization Theory, Springer, vol. 12(1), pages 51-66, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Tracy Holt & Jeffrey C. Johnson & James D. Brinkley & Kathleen M. Carley & Janna Caspersen, 2012. "Structure of ethnic violence in Sudan: a semi-automated network analysis of online news (2003–2010)," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 340-355, September.
    2. Jelena Vićić & Erik Gartzke, 2024. "Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election," Journal of Peace Research, Peace Research Institute Oslo, vol. 61(1), pages 10-27, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. World Bank Group, 2012. "Understanding Access to Justice and Conflict Resolution at the Local Level in the Central African Republic," World Bank Publications - Reports 16097, The World Bank Group.
    2. Lindelauf, R. & Borm, P.E.M. & Hamers, H.J.M., 2009. "Understanding Terrorist Network Topologies and Their Resilience Against Disruption," Discussion Paper 2009-85, Tilburg University, Center for Economic Research.
    3. Brandy L. Aven, 2015. "The Paradox of Corrupt Networks: An Analysis of Organizational Crime at Enron," Organization Science, INFORMS, vol. 26(4), pages 980-996, August.
    4. Terrill L. Frantz & Kathleen M. Carley, 2017. "Reporting a network’s most-central actor with a confidence level," Computational and Mathematical Organization Theory, Springer, vol. 23(2), pages 301-312, June.
    5. Jürgen Pfeffer & Kathleen M. Carley, 2012. "Rapid modeling and analyzing networks extracted from pre-structured news articles," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 280-299, September.
    6. Pitchforth, Emma & Lilford, Richard J. & Kebede, Yigzaw & Asres, Getahun & Stanford, Charlotte & Frost, Jodie, 2010. "Assessing and understanding quality of care in a labour ward: A pilot study combining clinical and social science perspectives in Gondar, Ethiopia," Social Science & Medicine, Elsevier, vol. 71(10), pages 1739-1748, November.
    7. A. Fronzetti Colladon & E. Remondi, 2021. "Using social network analysis to prevent money laundering," Papers 2105.05793, arXiv.org.
    8. Morgan Burcher & Chad Whelan, 2015. "Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries," Global Crime, Taylor & Francis Journals, vol. 16(2), pages 104-122, April.
    9. Sara Jeza Alotaibi, 2022. "A New Internet of Things (IoT) Framework for Public Sectors," International Journal of Information Technology and Web Engineering (IJITWE), IGI Global, vol. 17(1), pages 1-15, January.
    10. Virginie Masson & Kelsey Wilkins, 2013. "The Small World of 9/11 and the Implications for Network Dismantlement Strategies," School of Economics and Public Policy Working Papers 2013-08, University of Adelaide, School of Economics and Public Policy.
    11. Alexandra-Maria Bocse, 0. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 0, pages 1-19.
    12. Jana Diesner & Kathleen M. Carley & Laurent Tambayong, 2012. "Extracting socio-cultural networks of the Sudan from open-source, large-scale text data," Computational and Mathematical Organization Theory, Springer, vol. 18(3), pages 328-339, September.
    13. Christopher E. Hutchins & Marge Benham-Hutchins, 2010. "Hiding in plain sight: criminal network analysis," Computational and Mathematical Organization Theory, Springer, vol. 16(1), pages 89-111, March.
    14. Manzi, Deborah & Calderoni, Francesco, 2024. "The resilience of drug trafficking organizations: Simulating the impact of police arresting key roles," Journal of Criminal Justice, Elsevier, vol. 91(C).
    15. Colvin, Christopher J. & Smith, Helen J. & Swartz, Alison & Ahs, Jill W. & de Heer, Jodie & Opiyo, Newton & Kim, Julia C. & Marraccini, Toni & George, Asha, 2013. "Understanding careseeking for child illness in sub-Saharan Africa: A systematic review and conceptual framework based on qualitative research of household recognition and response to child diarrhoea, ," Social Science & Medicine, Elsevier, vol. 86(C), pages 66-78.
    16. Alexandra-Maria Bocse, 2021. "Hybrid transnational advocacy networks in environmental protection: banning the use of cyanide in European gold mining," International Environmental Agreements: Politics, Law and Economics, Springer, vol. 21(2), pages 285-303, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:comaot:v:18:y:2012:i:3:d:10.1007_s10588-012-9125-y. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.