I think there's several aspects that we should try to separate out:<br><br>* one is the aspect that NLP and IR tools are used, and will be used,<br> for practical purposes. By individuals, companies, and governments.<br>
This is also one of the reasons why computational linguists enjoy a<br> bit more funding than, say, classical Greek historians.<br> I also think there's a merit to organize a workshop specifically for<br> *real world applications* of IR/NLP techniques instead of the pre-<br>
fabricated toy problems that CL usually works on. (Hint: They're<br> "toy" problems because the developer can hide behind Dijkstra's<br> wall and pretend that all that counts is evaluation figures on his<br>
testing data, without questioning the representativity of the testing<br> data, the method of evaluation, or the sensibility of the task as a<br> whole. That doesn't mean the problems can be challenging and<br> difficult, just that there is an additional step to make if you want<br>
to apply these standardized problems to anything in the real world,<br> and typically you would choose different tradeoffs for recall, computing<br> time, and necessary human intervention than if you do CL research).<br>
* The second point is whether these techniques are needed. They are.<br> I think the workshop organizers put some thought into the list of<br> applications that they presented in the CfP.<br> As an additional application, consider the prevention and also the<br>
aftermath of genocides (which still happen in our nice cozy world,<br> possibly ignored by the media at large).<br>From: <a href="http://daily.swarthmore.edu/2005/2/17/un-advisor-on-genocide-commends-swat-students-illustrates-challenges-of-international-action/">http://daily.swarthmore.edu/2005/2/17/un-advisor-on-genocide-commends-swat-students-illustrates-challenges-of-international-action/</a><br>
<blockquote style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;" class="gmail_quote">In finding information about potential and ongoing genocide he said he
had to both sort through the diverse, voluminous system of information
retrieval the UN currently has and find information outside the system
in order to alert the international community to unknown genocidal
situations. To maintain the trust of the UN and his power to influence
action, Mendez stressed the fact that he had to closely examine the
veracity of information and also give reasonable, creative suggestions
that are both within the limits of what the Security Council will agree
to enact and which will not make the situation worse.<br></blockquote>With journalism increasingly being replaced by cute kittens and drivel-mongering due to the decreasing number of people willing to pay for a newspaper when they<br>
can just switch on the TV or their internets, retrieval of information, but also methods<br>that helps judge its credibility ("I read it on the internet"), will be essential in maintaining the ability of people to have a critical, informed perspective on the world.<br>
* Now to the last point: I think that the "Mining ... for Security" is very poorly chosen.<br> It immediately brings up the reading of Security as 'anything that my friendly funding agency needs to do to save the day', or possibly, anything that another agency in a non-democratic regime (who will also buy our system) needs to do.<br>
It is a shame that security, as the security and well-being of citizens, is no longer the preferred reading for constructions in this kind, but that's how it is.<br>And if you, as a workshop organizer, think it's sufficiently ambiguous that you need to add a disclaimer that it's not for discussion of nilly-willy ethical issues: well,<br>
maybe you can *also* see that your workshop title is poorly chosen if you think<br>it brings on thoughts about ethical issues. If you wrote<br>"Mining user-generated content for real-world purposes", no one would think about<br>
poorly-legitimated three letter agencies and opressive regimes in need of censorship and detection of dissidents.<br>To everyone else: if you think that your research cannot be used for practical purposes (good or bad), re-read points one and two.<br>
<br>Just my two cents, and sorry for the long post.<br><br>Best wishes,<br>Yannick Versley<br><br><div class="gmail_quote"><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
I think you missed the point. To quote:<br>
<div class="im"><br>
" Submissions that focus on legal questions stemming from<br>
snooping, spying, privacy infringement or violation, etc., will not<br>
be considered relevant to the Theme of the Workshop, and the<br>
Committee will not be able to review them."<br>
<br>
</div>That is the outrageous statement that lead to the distress. It is<br>
a matter of fact that the technologies being reviewed here are<br>
being used for "snooping, spying, privacy infringement or violation,<br>
etc." In case you haven't been reading the newspapers, there<br>
was a recent election in Iran, wherein an earlier version of this<br>
kind of technology was used to suppress news and to find and<br>
jail dissidents, some of whom were apparently beaten to death.<br>
<br>
These technologies can be, and are being used in anti-democratic,<br>
anti-persona-freedom kinds of ways. Researchers such as you,<br>
who seem to be unaware of this, should become aware.<br></blockquote></div><br>