Update README.md
Browse files
README.md
CHANGED
@@ -31,20 +31,20 @@ This model was created by [`Identrics`](https://identrics.ai/), in the scope of
|
|
31 |
|
32 |
The propaganda techniques we want to identify are classified in 5 categories:
|
33 |
|
34 |
-
1. Self-Identification Techniques
|
35 |
These techniques exploit the audience's feelings of association (or desire to be associated) with a larger group. They suggest that the audience should feel united, motivated, or threatened by the same factors that unite, motivate, or threaten that group.
|
36 |
|
37 |
|
38 |
-
2. Defamation Techniques
|
39 |
These techniques represent direct or indirect attacks against an entity's reputation and worth.
|
40 |
|
41 |
-
3. Legitimisation Techniques
|
42 |
These techniques attempt to prove and legitimise the propagandist's statements by using arguments that cannot be falsified because they are based on moral values or personal experiences.
|
43 |
|
44 |
-
4. Logical Fallacies
|
45 |
These techniques appeal to the audience's reason and masquerade as objective and factual arguments, but in reality, they exploit distractions and flawed logic.
|
46 |
|
47 |
-
5. Rhetorical Devices
|
48 |
These techniques seek to influence the audience and control the conversation by using linguistic methods.
|
49 |
|
50 |
|
@@ -52,7 +52,7 @@ These techniques seek to influence the audience and control the conversation by
|
|
52 |
|
53 |
## Uses
|
54 |
|
55 |
-
To be used as a multilabel classifier to identify if
|
56 |
|
57 |
### Example
|
58 |
|
|
|
31 |
|
32 |
The propaganda techniques we want to identify are classified in 5 categories:
|
33 |
|
34 |
+
1. Self-Identification Techniques:
|
35 |
These techniques exploit the audience's feelings of association (or desire to be associated) with a larger group. They suggest that the audience should feel united, motivated, or threatened by the same factors that unite, motivate, or threaten that group.
|
36 |
|
37 |
|
38 |
+
2. Defamation Techniques:
|
39 |
These techniques represent direct or indirect attacks against an entity's reputation and worth.
|
40 |
|
41 |
+
3. Legitimisation Techniques:
|
42 |
These techniques attempt to prove and legitimise the propagandist's statements by using arguments that cannot be falsified because they are based on moral values or personal experiences.
|
43 |
|
44 |
+
4. Logical Fallacies:
|
45 |
These techniques appeal to the audience's reason and masquerade as objective and factual arguments, but in reality, they exploit distractions and flawed logic.
|
46 |
|
47 |
+
5. Rhetorical Devices:
|
48 |
These techniques seek to influence the audience and control the conversation by using linguistic methods.
|
49 |
|
50 |
|
|
|
52 |
|
53 |
## Uses
|
54 |
|
55 |
+
To be used as a multilabel classifier to identify if the sample text contains one or more of the five propaganda techniques mentioned above.
|
56 |
|
57 |
### Example
|
58 |
|