20,469 research outputs found
Poetic Witness in a Networked Age
When online videos mobilize protestors to occupy public spaces, and those protestors incorporate hashtags in their chants and markered placards, deliberative democratic theory must no longer dismiss technology and peoples historically excluded from the arena of politics. Specifically, political models must account for the role of repetition in paving the way for unheard and unseen messages and people to appear in the political arena. Drawing on Judith Butler’s theory of the Performative and Hannah Arendt’s Space of Appearance, this paper assesses that critical and generative role of iteration. Repeating unheeded acts performs the capacity for those acts to be entered into discourse. The World Wide Web evidently augments such performativity with features such as accessibility, potential for ‘viral’ proliferation, and an endurance unlike non-networked acts. This paper eventually grapples with the hazards and risks of networked repetition (e.g. desensitization, trivialization, etc.) in order to propose a poetics of repetition to mitigate those dangers. Such poetics ultimately distinguishes the witness from the spectator
Tweet, but Verify: Epistemic Study of Information Verification on Twitter
While Twitter provides an unprecedented opportunity to learn about breaking
news and current events as they happen, it often produces skepticism among
users as not all the information is accurate but also hoaxes are sometimes
spread. While avoiding the diffusion of hoaxes is a major concern during
fast-paced events such as natural disasters, the study of how users trust and
verify information from tweets in these contexts has received little attention
so far. We survey users on credibility perceptions regarding witness pictures
posted on Twitter related to Hurricane Sandy. By examining credibility
perceptions on features suggested for information verification in the field of
Epistemology, we evaluate their accuracy in determining whether pictures were
real or fake compared to professional evaluations performed by experts. Our
study unveils insight about tweet presentation, as well as features that users
should look at when assessing the veracity of tweets in the context of
fast-paced events. Some of our main findings include that while author details
not readily available on Twitter feeds should be emphasized in order to
facilitate verification of tweets, showing multiple tweets corroborating a fact
misleads users to trusting what actually is a hoax. We contrast some of the
behavioral patterns found on tweets with literature in Psychology research.Comment: Pre-print of paper accepted to Social Network Analysis and Mining
(Springer
A Semi-automatic Method for Efficient Detection of Stories on Social Media
Twitter has become one of the main sources of news for many people. As
real-world events and emergencies unfold, Twitter is abuzz with hundreds of
thousands of stories about the events. Some of these stories are harmless,
while others could potentially be life-saving or sources of malicious rumors.
Thus, it is critically important to be able to efficiently track stories that
spread on Twitter during these events. In this paper, we present a novel
semi-automatic tool that enables users to efficiently identify and track
stories about real-world events on Twitter. We ran a user study with 25
participants, demonstrating that compared to more conventional methods, our
tool can increase the speed and the accuracy with which users can track stories
about real-world events.Comment: ICWSM'16, May 17-20, Cologne, Germany. In Proceedings of the 10th
International AAAI Conference on Weblogs and Social Media (ICWSM 2016).
Cologne, German
Recommended from our members
Verifying baselines for crisis event information classification on Twitter
Social media are rich information sources during and in the aftermath of crisis events such as earthquakes and terrorist attacks. Despite myriad challenges, with the right tools, significant insight can be gained which can assist emergency responders and related applications. However, most extant approaches are incomparable, using bespoke definitions, models, datasets and even evaluation metrics. Furthermore, it is rare that code, trained models, or exhaustive parametrisation details are made openly available. Thus, even confirmation of self-reported performance is problematic; authoritatively determining the state of the art (SOTA) is essentially impossible. Consequently, to begin addressing such endemic ambiguity, this paper seeks to make 3 contributions: 1) the replication and results confirmation of a leading (and generalisable) technique; 2) testing straightforward modifications of the technique likely to improve performance; and 3) the extension of the technique to a novel and complimentary type of crisis-relevant information to demonstrate it’s generalisability
Icts, Social Media, & the Future of Human Rights
As communication increasingly shifts to digital platforms, information derived from online open sources is starting to become critical in creating an evidentiary basis for international crimes. While journalists have led the development of many newly emerging open source investigation methodologies, courts have heightened the requirements for verifying and preserving a chain of custody—information linking all of the individuals who possessed the content and indicating the duration of their custody—creating a need for standards that are just now beginning to be identified, articulated, and accepted by the international legal community. In this article, we discuss the impact of internet-based open source investigations on international criminal legal processes, as well as challenges related to their use. We also offer best practices for lawyers, activists, and other individuals seeking to admit open source information—including content derived from social media—into courts
Making the FTC ☺: An Approach to Material Connections Disclosures in the Emoji Age
In examining the rise of influencer marketing and emoji’s concurrent surge in popularity, it naturally follows that emoji should be incorporated into the FTC’s required disclosures for sponsored posts across social media platforms. While current disclosure methods the FTC recommends are easily jumbled or lost in other text, using emoji to disclose material connections would streamline disclosure requirements, leveraging an already-popular method of communication to better reach consumers. This Note proposes that the FTC adopts an emoji as a preferred method of disclosure for influencer marketing on social media. Part I discusses the rise of influencer marketing, the FTC and its history of regulating sponsored content, and the current state of regulation. Part II explores the proliferation of emoji as a method of communication, and the role of the Unicode Consortium in regulating the adoption of new emoji. Part III makes the case for incorporating emoji as a method of disclosure to bridge compliance gaps, and offers additional recommendations to increase compliance with existing regulations
- …