Computational Personality Analysis (Record no. 56160)

000 -LEADER
fixed length control field 03318nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-319-42460-6
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111852.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160830s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319424606
-- 978-3-319-42460-6
082 04 - CLASSIFICATION NUMBER
Call Number 004
100 1# - AUTHOR NAME
Author Neuman, Yair.
245 10 - TITLE STATEMENT
Title Computational Personality Analysis
Sub Title Introduction, Practical Applications and Novel Directions /
300 ## - PHYSICAL DESCRIPTION
Number of Pages IX, 120 p. 12 illus., 5 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Acknowledgments -- Introduction: From The Princess Bride to computational personality -- Personality in a nutshell: Understanding who we are -- Computational personality analysis: When the machine meets the psychologist -- Distributional semantics and personality: How to find a perpetrator in a haystack -- Themes of personality: Profiling a political leader -- Going beyond words: How the Sisters of Mercy may identify psychopaths -- Hidden textual themes: Into Shakespeare's mind -- The complexity of personality: From Snowden to Superman -- Attractors of personality: A murderer, a terrorist and some angry Jews -- Taking complexity a step forward: The reversibility of the pedophile's mind -- Discussion -- Appendix -- Author index -- Subject index.
520 ## - SUMMARY, ETC.
Summary, etc The emergence of intelligent technologies, sophisticated natural language processing methodologies and huge textual repositories, invites a new approach for the challenge of automatically identifying personality dimensions through the analysis of textual data. This short book aims to (1) introduce the challenge of computational personality analysis, (2) present a unique approach to personality analysis and (3) illustrate this approach through case studies and worked-out examples. This book is of special relevance to psychologists, especially those interested in the new insights offered by new computational and data-intensive tools, and to computational social scientists interested in human personality and language processing.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-42460-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational linguistics.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- System safety.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Personality.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Social psychology.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Appl. in Social and Behavioral Sciences.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Personality and Social Psychology.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Linguistics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Criminology and Criminal Justice, general.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
912 ## -
-- ZDB-2-SCS

No items available.