Computational Social Science Capstone Project
About this Course
CONGRATULATIONS! Not only did you accomplish to finish our intellectual tour de force, but, by now, you also already have all required skills to execute a comprehensive multi-method workflow of computational social science. We will put these skills to work in this final integrative lab, where we are bringing it all together. We scrape data from a social media site (drawing on the skills obtained in the 1st course of this specialization). We then analyze the collected data by visualizing the resulting networks (building on the skills obtained in the 3rd course). We analyze some key aspects of it in depth, using machine learning powered natural language processing (putting to work the insights obtained during the 2nd course). Finally, we use a computer simulation model to explore possible generative mechanism and scrutinize aspects that we did not find in our empirical reality, but that help us to improve this aspect of society (drawing on the skills obtained during the 4th course of this specialization). The result is the first glimpse at a new way of doing social science in a digital age: computational social science. Congratulations! Having done all of this yourself, you can consider yourself a fledgling computational social scientist!Created by: University of California, Davis
Related Online Courses
This is a self-paced lab that takes place in the Google Cloud console. This lab shows how to use Cloud Data Fusion to explore data lineage - the data\'s origins and its movement over time.Created... more
Are you interested in end-to-end project management? Want to deliver the best solutions to our customers while collaborating with teams from all over the world? You will never stop learning in this... more
Understanding how to eat healthy can be daunting, especially when presented with unfamiliar science. Learn and apply everyday nutrition concepts to your lifestyle to get the most out of what you... more
This specialization is intended for Cybersecurity and Application Security Specialists, IT Security Managers, System Administrators, Software Developers, and Penetration Testers.\\n\\nThis... more
By the end of this project, you will be fluent in identifying and creating Empathy Maps based on persona for new products and services and in deriving opportunities from your analysis, thus... more