20,469 research outputs found

    Poetic Witness in a Networked Age

    Full text link
    When online videos mobilize protestors to occupy public spaces, and those protestors incorporate hashtags in their chants and markered placards, deliberative democratic theory must no longer dismiss technology and peoples historically excluded from the arena of politics. Specifically, political models must account for the role of repetition in paving the way for unheard and unseen messages and people to appear in the political arena. Drawing on Judith Butler’s theory of the Performative and Hannah Arendt’s Space of Appearance, this paper assesses that critical and generative role of iteration. Repeating unheeded acts performs the capacity for those acts to be entered into discourse. The World Wide Web evidently augments such performativity with features such as accessibility, potential for ‘viral’ proliferation, and an endurance unlike non-networked acts. This paper eventually grapples with the hazards and risks of networked repetition (e.g. desensitization, trivialization, etc.) in order to propose a poetics of repetition to mitigate those dangers. Such poetics ultimately distinguishes the witness from the spectator

    Tweet, but Verify: Epistemic Study of Information Verification on Twitter

    Get PDF
    While Twitter provides an unprecedented opportunity to learn about breaking news and current events as they happen, it often produces skepticism among users as not all the information is accurate but also hoaxes are sometimes spread. While avoiding the diffusion of hoaxes is a major concern during fast-paced events such as natural disasters, the study of how users trust and verify information from tweets in these contexts has received little attention so far. We survey users on credibility perceptions regarding witness pictures posted on Twitter related to Hurricane Sandy. By examining credibility perceptions on features suggested for information verification in the field of Epistemology, we evaluate their accuracy in determining whether pictures were real or fake compared to professional evaluations performed by experts. Our study unveils insight about tweet presentation, as well as features that users should look at when assessing the veracity of tweets in the context of fast-paced events. Some of our main findings include that while author details not readily available on Twitter feeds should be emphasized in order to facilitate verification of tweets, showing multiple tweets corroborating a fact misleads users to trusting what actually is a hoax. We contrast some of the behavioral patterns found on tweets with literature in Psychology research.Comment: Pre-print of paper accepted to Social Network Analysis and Mining (Springer

    A Semi-automatic Method for Efficient Detection of Stories on Social Media

    Get PDF
    Twitter has become one of the main sources of news for many people. As real-world events and emergencies unfold, Twitter is abuzz with hundreds of thousands of stories about the events. Some of these stories are harmless, while others could potentially be life-saving or sources of malicious rumors. Thus, it is critically important to be able to efficiently track stories that spread on Twitter during these events. In this paper, we present a novel semi-automatic tool that enables users to efficiently identify and track stories about real-world events on Twitter. We ran a user study with 25 participants, demonstrating that compared to more conventional methods, our tool can increase the speed and the accuracy with which users can track stories about real-world events.Comment: ICWSM'16, May 17-20, Cologne, Germany. In Proceedings of the 10th International AAAI Conference on Weblogs and Social Media (ICWSM 2016). Cologne, German

    Icts, Social Media, & the Future of Human Rights

    Get PDF
    As communication increasingly shifts to digital platforms, information derived from online open sources is starting to become critical in creating an evidentiary basis for international crimes. While journalists have led the development of many newly emerging open source investigation methodologies, courts have heightened the requirements for verifying and preserving a chain of custody—information linking all of the individuals who possessed the content and indicating the duration of their custody—creating a need for standards that are just now beginning to be identified, articulated, and accepted by the international legal community. In this article, we discuss the impact of internet-based open source investigations on international criminal legal processes, as well as challenges related to their use. We also offer best practices for lawyers, activists, and other individuals seeking to admit open source information—including content derived from social media—into courts

    Making the FTC ☺: An Approach to Material Connections Disclosures in the Emoji Age

    Get PDF
    In examining the rise of influencer marketing and emoji’s concurrent surge in popularity, it naturally follows that emoji should be incorporated into the FTC’s required disclosures for sponsored posts across social media platforms. While current disclosure methods the FTC recommends are easily jumbled or lost in other text, using emoji to disclose material connections would streamline disclosure requirements, leveraging an already-popular method of communication to better reach consumers. This Note proposes that the FTC adopts an emoji as a preferred method of disclosure for influencer marketing on social media. Part I discusses the rise of influencer marketing, the FTC and its history of regulating sponsored content, and the current state of regulation. Part II explores the proliferation of emoji as a method of communication, and the role of the Unicode Consortium in regulating the adoption of new emoji. Part III makes the case for incorporating emoji as a method of disclosure to bridge compliance gaps, and offers additional recommendations to increase compliance with existing regulations
    • …
    corecore