34,908 research outputs found
Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams
Online social media are complementing and in some cases replacing
person-to-person social interaction and redefining the diffusion of
information. In particular, microblogs have become crucial grounds on which
public relations, marketing, and political battles are fought. We introduce an
extensible framework that will enable the real-time analysis of meme diffusion
in social media by mining, visualizing, mapping, classifying, and modeling
massive streams of public microblogging events. We describe a Web service that
leverages this framework to track political memes in Twitter and help detect
astroturfing, smear campaigns, and other misinformation in the context of U.S.
political elections. We present some cases of abusive behaviors uncovered by
our service. Finally, we discuss promising preliminary results on the detection
of suspicious memes via supervised learning based on features extracted from
the topology of the diffusion networks, sentiment analysis, and crowdsourced
annotations
Conversing or Diffusing Information? An Examination of Public Health Twitter Chats
This study examines the one-way information diffusion and two-way dialogic engagement present in public health Twitter chats. Network analysis assessed whether Twitter chats adhere to one of the key principles for online dialogic communication, the dialogic loop (Kent & Taylor, 1998) for four public health-related chats hosted by CDC Twitter accounts. The features of the most retweeted accounts and the most retweeted tweets also were examined. The results indicate that very little dialogic engagement took place. Moreover, the chats seemed to function as pseudoevents primarily used by organizations as opportunities for creating content. However, events such as #PublicHealthChat may serve as important opportunities for gaining attention for issues on social media. Implications for using social media in public interest communications are discussed
Topical, geospatial, and temporal diffusion of the 2015 North American Menopause Society position statement on nonhormonal management of vasomotor symptoms
OBJECTIVE:
We sought to depict the topical, geospatial, and temporal diffusion of the 2015 North American Menopause Society position statement on the nonhormonal management of menopause-associated vasomotor symptoms released on September 21, 2015, and its associated press release from September 23, 2015.
METHODS:
Three data sources were used: online news articles, National Public Radio, and Twitter. For topical diffusion, we compared keywords and their frequencies among the position statement, press release, and online news articles. We also created a network figure depicting relationships across key content categories or nodes. For geospatial diffusion within the United States, we compared locations of the 109 National Public Radio (NPR) stations covering the statement to 775 NPR stations not covering the statement. For temporal diffusion, we normalized and segmented Twitter data into periods before and after the press release (September 12, 2015 to September 22, 2015 vs September 23, 2015 to October 3, 2015) and conducted a burst analysis to identify changes in tweets from before to after.
RESULTS:
Topical information diffused across sources was similar with the exception of the more scientific terms "vasomotor symptoms" or "vms" versus the more colloquial term "hot flashes." Online news articles indicated media coverage of the statement was mainly concentrated in the United States. NPR station data showed similar proportions of stations airing the story across the four census regions (Northeast, Midwest, south, west; P = 0.649). Release of the statement coincided with bursts in the menopause conversation on Twitter.
CONCLUSIONS:
The findings of this study may be useful for directing the development and dissemination of future North American Menopause Society position statements and/or press releases
How did Ebola information spread on twitter : broadcasting or viral spreading?
BACKGROUND: Information and emotions towards public health issues could spread widely through online social networks. Although aggregate metrics on the volume of information diffusion are available, we know little about how information spreads on online social networks. Health information could be transmitted from one to many (i.e. broadcasting) or from a chain of individual to individual (i.e. viral spreading). The aim of this study is to examine the spreading pattern of Ebola information on Twitter and identify influential users regarding Ebola messages. METHODS: Our data was purchased from GNIP. We obtained all Ebola-related tweets posted globally from March 23, 2014 to May 31, 2015. We reconstructed Ebola-related retweeting paths based on Twitter content and the follower-followee relationships. Social network analysis was performed to investigate retweeting patterns. In addition to describing the diffusion structures, we classify users in the network into four categories (i.e., influential user, hidden influential user, disseminator, common user) based on following and retweeting patterns. RESULTS: On average, 91% of the retweets were directly retweeted from the initial message. Moreover, 47.5% of the retweeting paths of the original tweets had a depth of 1 (i.e., from the seed user to its immediate followers). These observations suggested that the broadcasting was more pervasive than viral spreading. We found that influential users and hidden influential users triggered more retweets than disseminators and common users. Disseminators and common users relied more on the viral model for spreading information beyond their immediate followers via influential and hidden influential users. CONCLUSIONS: Broadcasting was the dominant mechanism of information diffusion of a major health event on Twitter. It suggests that public health communicators can work beneficially with influential and hidden influential users to get the message across, because influential and hidden influential users can reach more people that are not following the public health Twitter accounts. Although both influential users and hidden influential users can trigger many retweets, recognizing and using the hidden influential users as the source of information could potentially be a cost-effective communication strategy for public health promotion. However, challenges remain due to uncertain credibility of these hidden influential users
DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES
This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user responses, referred to as Social Identity Protection Responses (SIPR), to avert the social identity threats. The quantitative value model describes the utility of the current social networking sites and SIPR to achieve the fundamental objectives for averting social identity threats in OSNs. The second research study examines the threats to the external identity of organizations i.e. Information Security Reputation (ISR) in the aftermath of a data breach. The threat analysis is undertaken by examining the discourses related to the data breach at Home Depot and JPMorgan Chase in the popular microblogging website, Twitter, to identify: 1) the dimensions of information security discussed in the Twitter postings; 2) the attribution of data breach responsibility and the related sentiments expressed in the Twitter postings; and 3) the subsequent diffusion of the tweets that threaten organizational reputation
The echo chamber effect on social media
Social media may limit the exposure to diverse perspectives and favor the formation of groups of like-minded users framing and reinforcing a shared narrative, that is, echo chambers. However, the interaction paradigms among users and feed algorithms greatly vary across social media platforms. This paper explores the key dif- ferences between the main social media platforms and how they are likely to influence information spreading and echo chambers’ formation. We perform a comparative analysis of more than 100 million pieces of content concerning several controversial topics (e.g., gun control, vaccination, abortion) from Gab, Facebook, Red- dit, and Twitter. We quantify echo chambers over social media by two main ingredients: 1) homophily in the interaction networks and 2) bias in the information diffusion toward like-minded peers. Our results show that the aggregation of users in homophilic clus- ters dominate online interactions on Facebook and Twitter. We conclude the paper by directly comparing news consumption on Facebook and Reddit, finding higher segregation on Facebook.Peer ReviewedPostprint (published version
Evolution of Online User Behavior During a Social Upheaval
Social media represent powerful tools of mass communication and information
diffusion. They played a pivotal role during recent social uprisings and
political mobilizations across the world. Here we present a study of the Gezi
Park movement in Turkey through the lens of Twitter. We analyze over 2.3
million tweets produced during the 25 days of protest occurred between May and
June 2013. We first characterize the spatio-temporal nature of the conversation
about the Gezi Park demonstrations, showing that similarity in trends of
discussion mirrors geographic cues. We then describe the characteristics of the
users involved in this conversation and what roles they played. We study how
roles and individual influence evolved during the period of the upheaval. This
analysis reveals that the conversation becomes more democratic as events
unfold, with a redistribution of influence over time in the user population. We
conclude by observing how the online and offline worlds are tightly
intertwined, showing that exogenous events, such as political speeches or
police actions, affect social media conversations and trigger changes in
individual behavior.Comment: Best Paper Award at ACM Web Science 201
Web-scale provenance reconstruction of implicit information diffusion on social media
Fast, massive, and viral data diffused on social media affects a large share of the online population, and thus, the (prospective) information diffusion mechanisms behind it are of great interest to researchers. The (retrospective) provenance of such data is equally important because it contributes to the understanding of the relevance and trustworthiness of the information. Furthermore, computing provenance in a timely way is crucial for particular use cases and practitioners, such as online journalists that promptly need to assess specific pieces of information. Social media currently provide insufficient mechanisms for provenance tracking, publication and generation, while state-of-the-art on social media research focuses mainly on explicit diffusion mechanisms (like retweets in Twitter or reshares in Facebook).The implicit diffusion mechanisms remain understudied due to the difficulties of being captured and properly understood. From a technical side, the state of the art for provenance reconstruction evaluates small datasets after the fact, sidestepping requirements for scale and speed of current social media data. In this paper, we investigate the mechanisms of implicit information diffusion by computing its fine-grained provenance. We prove that explicit mechanisms are insufficient to capture influence and our analysis unravels a significant part of implicit interactions and influence in social media. Our approach works incrementally and can be scaled up to cover a truly Web-scale scenario like major events. We can process datasets consisting of up to several millions of messages on a single machine at rates that cover bursty behaviour, without compromising result quality. By doing that, we provide to online journalists and social media users in general, fine grained provenance reconstruction which sheds lights on implicit interactions not captured by social media providers. These results are provided in an online fashion which also allows for fast relevance and trustworthiness assessment
- …