Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Kind of a Story Do Readers Want? Big Data Knows

What Kind of a Story Do Readers Want? Big Data Knows

Sometimes it can be tricky to identify what will be popular in the years to come, but that doesn’t stop big data from trying. Cultural anomalies are particularly difficult to predict, but an algorithm is attempting to predict which modern novel will become the next big bestseller. Jodie Archer, author of an upcoming book titled The Bestseller Code: Anatomy of the Blockbuster Novel, takes a critical look at what makes something popular amongst consumers--particularly in regard to literature.

A computer algorithm, affectionately referred to as the “bestseller-ometer,” examines a huge amount of literature for qualities that make bestselling fiction. According to The Atlantic, the algorithm is capable of identifying a bestseller upwards of 80 percent of the time. This success rate is achieved by going off a list of novels from the past 30 years and identifying New York Times best sellers. This is one of the ways in which data-driven initiatives are attempting to better understand the way that the human brain identifies concepts, and it could change the way that publishers identify potential best sellers.

Like most good ideas, this concept was borne from a question that needed to be answered: “Why do we all read the same book?” It’s a valid question to ask, as people find different traits valuable in literature. The same folks who like to read literary fiction may find a guilty pleasure in young adult novellas. A book could be slaughtered by critics, but be wildly popular amongst the masses, as we’ve seen with several novels based on vampires.

Archer, along with English professor Matthew L. Jockers, built the algorithm with the intention of discovering what makes readers flock to a particular story. The Bestseller Code documents the process through teaching an algorithm to closely analyze the text within the content for certain key factors that create popular fiction. This generally involves semantics, like themes, allusions, word choice, and other literary topics. Among the most popular traits found within bestsellers are:

  • Authoritative voice
  • Colloquial (everyday) language
  • Action-oriented characters
  • Cohesion
  • Intimacy

Another major theme that was touched upon was the idea of the zeitgeist, which can be defined as time-sensitive ideals and beliefs. In other words, what’s contemporary and popular amongst the public plays a major role in how successful any novel is. Thus, it becomes difficult to predict how bestsellers will be selected in the future, as it’s difficult to guess where society will stand in the future. Plus, it would make sense for a human--with its ability to understand and interpret emotion--to be the one to decide whether or not a book is worth labeling as a bestseller. After all, the computer isn’t necessarily the one reading the book, but rather it’s hundreds of thousands of people around the world who will be doing so.

Whether or not big data manages to identify a masterpiece recipe for the next bestseller hasn’t been mentioned, and thus it’s important to realize that the entire concept of trying to identify human behavior with big data could be irrelevant. After all, humans can be difficult to predict, as they often function in ways beyond any and all reason or logic. Thus, it’s important to remember that while technology has provided great ways to improve operations and hone in on a consumer base, it’s still crucial to remember that people are people.

What are your thoughts on big data? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 26 May 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices IT Support Communication User Tips VoIP Business Management Virtualization Server Network Smartphone Data Quick Tips Email Holiday Apps Disaster Recovery Alert Save Money Remote Computing Going Green Operating System Social Media Business Continuity Upgrade Mobile Device Management Office Saving Money Android Chrome Small Business Social Facebook Application Mobility WiFi Best Practice Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Big Data Managed Service Provider Microsoft Office Law Enforcement Analytics History Gmail Search Office Tips Browser Password Current Events Government Saving Time Information Technology Lithium-ion battery Spam Printer Bandwidth Unified Threat Management Hacking Tablet BYOD Passwords Remote Monitoring Tech Support intranet Net Neutrality Firewall iPhone Money Streaming Media Data Management Collaboration Laptop Education User Error Computers communications Disaster Hard Drives Maintenance Telephone Systems Wireless Fraud Humor Avoiding Downtime Phone System Router Apple Recovery Work/Life Balance Network Security Automation Gadgets Encryption Smartphones Users USB Printer Server Update Fax Server Marketing IT Consultant Administration Office 365 Budget Data Loss Content Filtering Transportation Shortcut Wearable Technology Business Intelligence Point of Sale PowerPoint Proactive IT Internet Exlporer Biometrics Cost Management Social Engineering Telephony Retail Customer Service Online Currency Personal Information BDR Entertainment Virtual Reality Google Drive Mobile Office DDoS Managed IT Services Benefits IT Solutions Cybercrime VPN Wi-Fi Risk Management Flexibility Private Cloud Managing Stress Wireless Technology Outlook App Scalability Chromecast Data Theft Customer Relationship Management Experience SharePoint User Vendor Management Excel How To Administrator CloudSync Music Reputation Teamwork Computing Best Available Access Compliance Programming Presentation Books Meetings Prodcuctivity Science Hosted Solution Online Backup Black Market Inbound Marketing Electronic Medical Records End of Support Emails Running Cable Audit Phishing HaaS Instant Messaging Robot Twitter Networking OneNote Display Safety Advertising Battery Data storage Human Resources OneDrive Near Field Communication Emergency PDF Bring Your Own Device Uninterrupted Power Supply Paperless Office Automobile Workplace Computer Accessories Cleaning Text Messaging Internet of Things Miscelllaneous Bloatware RAM Worker Commute Applications IT consulting Website Mouse Ebay Save Time Artificial Intelligence Distributed Denial of Service Sports HIPAA Video Games CPU Touchpad Travel Branding Amazon Blogging Network Congestion Hacker Regulations eWaste Legal ISP Slow Operating Sysytem Smart Phones WIndows 7 3D Printing Storage Keyboard Television Files Two-factor Authentication Politics Bluetooth Windows 8 Hiring/Firing Cameras Trending

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code