The Rise of Social Networking Changing the Web As We Know It

Total Page:16

File Type:pdf, Size:1020Kb

The Rise of Social Networking Changing the Web As We Know It AFP/POST TODAY AFP/POST The rise of social networking Changing the web as we know it Historically, it used to be enough to have an online transforming online user behaviour in terms of users’ presence on the Internet for the one-way broadcast- initial entry point, search, browsing and purchasing ing and dissemination of information. Today, social behaviour. Some experts suggest that social media networks such as Facebook and Twitter are driving will become the Internet’s new search function — new forms of social interaction, dialogue, exchange predicting that people will spend less time navigat- and collaboration. Social networking sites (referred ing the Internet independently and instead search for to more broadly as social media) enable users to information or make decisions based on “word-of- swap ideas, to post updates and comments, or mouth” recommendations from their friends, the so- to participate in activities and events, while shar- called “friend-casting”. In the process, social media ing their wider interests. From general chit-chat to are changing users’ expectations of privacy, accept- propagating breaking news, from scheduling a date able online behaviour and etiquette — fast. to following election results or coordinating disaster Morgan Stanley estimates that there were about response, from gentle humour to serious research, 830 million “unique” users of social networks world- social networks are now used for a host of different wide at the end of 2009. Based on a total Internet reasons by various user communities. user population of 1.7 billion at the end of 2009, Social networking services are not just bringing according to ITU’s World Telecommunication/ICT Internet users into fast-fl owing online conversations Development Report 2010, this suggests that around — social media are helping people to follow breaking half of all Internet users could currently be using social news, keep up with friends or colleagues, contrib- media applications. Current estimates of the number ute to online debates or learn from others. They are of social media users vary signifi cantly, partly due to ITU News 6 | 2010 July | August 2010 35 The rise of social networking diffi culties defi ning and categorizing sites and appli- VKontakte in the Russian Federation, and Cyworld cations as “social networks”, but also due to margins in the Republic of Korea. There are also numerous of error in estimating the number of “unique” users smaller social networks that appeal to specifi c inter- (since users of one social network are more likely to ests, such as ResearchGATE, which connects scien- use several other social networking services as well). tists and researchers, or to languages or nationalities Many social network users access these services (for example, the Polish Nasza-klasa.pl service with over their mobile phones. According to ITU’s re- 11 million users or Tuenti in Spain, with 4.5 million port Measuring the Information Society 2010, mo- users). bile broadband subscriptions reached an estimated Given that online content and traffi c volumes are 640 million at the end of 2009, driven by growing increasingly interlinked with the pipes over which demand for smartphones, new applications and so- they are carried, it is vital to understand the demands cial networking services, and are set to exceed 1 bil- that the evolution of social networks will make on lion this year. The market research fi rm eMarketer underlying information and communication technol- projects that just over 600 million people will use ogy (ICT) infrastructure. First and foremost, social their phones to tap into social networks by 2013, media are resulting in a huge explosion in demand compared with 140 million in 2009. Facebook passed for capacity in both fi xed and wireless infrastructure. the historic milestone of 500 million users on 21 July Real-time connectivity is required, to ensure that sta- 2010 — if Facebook were a country, it would be the tus updates can be accessed and distributed instantly third most populous nation in the world after China across networks. Geolocalization raises important and India. technical challenges in pinpointing, publishing and Figure 1 shows how many users are drawn to disseminating users’ location in space as well as time, some popular social networks in early 2010. Twitter as well as questions over personal security. enables its members to post or send short (140-char- acter) messages called “tweets”, whereby users can broadcast what they are doing or thinking to the world, to closed “list” groups or to other individual Twitterers. Its original question (“What are you do- ing?”) has been reinterpreted as: “What do you fi nd interesting or funny?”, “What do you think?” AFP/Photononstop or “Please help spread the word!” (or sometimes all three together). MySpace concentrates on music and entertainment, while LinkedIn targets career-minded professionals. Orkut, a service owned by Google, is used mainly in India and Brazil, while in China, Qzone is reportedly one of the largest social networking sites with over 380 million registered accounts now. Other community sites include Skyrock in France, 36 ITU News 6 | 2010 July | August 2010 The rise of social networking Figure 1 — Twenty most popular social networking websites (according to Wikipedia), May 2010 500 450 400 Facebook 350 300 Qzone 250 Habbo 200 MySpace 150 Windows.Live Twitter Orkut 100 Registered users in millions Registered Friendster hi5 50 Vkontakte Tagged Badoo LinkedIn 0 Flixster Netlog MyLife Classmates Odnoklassniki Bebo Flikr Source: Wikipedia List of Social Networks, at: http://en.wikipedia.org/wiki/List_of_social_networking_websites. Current as of May 2010. Note: Omits eBay, YouTube and Wikipedia itself and dating services. At the WSIS Forum in May 2010 in Geneva, co- Who are your friends? organized by ITU, the United Nations Educational, In the information economy, Pete Cashmore, edi- Scientifi c and Cultural Organization (UNESCO) tor of Mashable (a key information portal for social and the United Nations Conference on Trade and media services), suggests that your friends may be- Development (UNCTAD), a high-level debate on come content curators for your consumption, fi lter- “Social Networking” was held, which triggered lively ing information such as movies, books and television discussions on political and social implications of so- shows and making recommendations for your leisure cial networking for knowledge societies. The debate, time online. He cites Facebook’s Connect programme jointly by UNESCO and ITU, brought together repre- as one early example of this. Facebook’s most recent sentatives of government, legislators, policy-makers, changes to personalize the web will see emoticons industry, civil society and users to exchange views on and friends’ avatars popping up all over users’ brows- the opportunities and threats of these tools for the ing. The content of sites can be tailored to readers’ future (see pages 13–14). preferences, as defi ned by the preferences of their social networks. ITU News 6 | 2010 July | August 2010 37 AFP/DDP There will be a move from current personalized era of social context”, sites will start to recognize advertising (based on cookies and websites you have personal identities and social relationships to deliver browsed recently) to personalized web content, with customized online experiences. One simple example search results ranked according to your online profi le, of such a customized online experience is Facebook preferred language, profession or interests, as well as and LinkedIn’s ability to propose possible new friends the preferences of your online social networks — the and contacts. web you see may be shaped by the web your friends like. The risk? Far from being a leveller of content and Internet traffi c opening people’s eyes to the broader online world, The Internet transports roughly 10 billion giga- Internet users’ world-view may in fact be restricted bytes of data a month — a fi gure that some observ- and constrained by “fi lter bubbles” whereby they link ers expect to quadruple by 2012. The market and with similar communities of like-minded individuals advertising research company Nielsen estimates that sharing a similar outlook. Conversely, your activities the average time spent on social networks grew and preferences could in turn infl uence your friends’ from three hours in December 2008 to fi ve and a half surfi ng behaviour. Surfi ng online will no longer be a hours in December 2009, based on a survey of social question of browsing the same sites as everyone else media use in ten countries. Half of all mobile data use in a vast online library of resources — the sites you in the United Kingdom is accounted for by Facebook, see may be predetermined or preselected to suit your so social media look set to continue driving future tastes in advance. growth in traffi c, with video-streaming applications The future social web may see users driving in- (such as YouTube) expected to account for a large novation and development in new applications. proportion of that traffi c. According to Forrester, a technology and market Over the past seven years, Internet data traffi c research company, social networks could become has grown by a factor of 56, driven partly by people more powerful in building brands and relationships uploading more data. On average, people uploaded than corporate websites and customer relationship fi fteen times more data in 2009 than they did just management systems. In what Forrester calls “the three years previously. Cisco projects that global 38 ITU News 6 | 2010 July | August 2010 The rise of social networking mobile data traffi c will grow by sixty-six times from Facebook is estimated to account for as much as 2008 to 2013, with video forecast to account for 25 per cent of all web traffi c (taking into account around 64 per cent of all global mobile data traffi c posted video).
Recommended publications
  • CS229 Project Report: Automated Photo Tagging in Facebook
    CS229 Project Report: Automated photo tagging in Facebook Sebastian Schuon, Harry Robertson, Hao Zou schuon, harry.robertson, haozou @stanford.edu Abstract We examine the problem of automatically identifying and tagging users in photos on a social networking environment known as Facebook. The presented au- tomatic facial tagging system is split into three subsys- tems: obtaining image data from Facebook, detecting faces in the images and recognizing the faces to match faces to individuals. Firstly, image data is extracted from Facebook by interfacing with the Facebook API. Secondly, the Viola-Jones’ algorithm is used for locat- ing and detecting faces in the obtained images. Fur- thermore an attempt to filter false positives within the Figure 1: Schematic of the Facebook crawler face set is made using LLE and Isomap. Finally, facial recognition (using Fisherfaces and SVM) is performed on the resulting face set. This allows us to match faces 2 Collecting data from Facebook to people, and therefore tag users on images in Face- book. The proposed system accomplishes a recogni- To implement an automatic image tagging system, one tion accuracy of close to 40%, hence rendering such first has to acquire the image data. For the platform we systems feasible for real world usage. have chosen to work on, namely Facebook, this task used to be very sophisticated, if not impossible. But with the recent publication of an API to their platform, this has been greatly simplified. The API allows third party applications to integrate into their platform and 1 Introduction most importantly to access their databases (for details see figure 1 and [3]).
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • How to Find the Best Hashtags for Your Business Hashtags Are a Simple Way to Boost Your Traffic and Target Specific Online Communities
    CHECKLIST How to find the best hashtags for your business Hashtags are a simple way to boost your traffic and target specific online communities. This checklist will show you everything you need to know— from the best research tools to tactics for each social media network. What is a hashtag? A hashtag is keyword or phrase (without spaces) that contains the # symbol. Marketers tend to use hashtags to either join a conversation around a particular topic (such as #veganhealthchat) or create a branded community (such as Herschel’s #WellTravelled). HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 1 WAYS TO USE 3 HASHTAGS 1. Find a specific audience Need to reach lawyers interested in tech? Or music lovers chatting about their favorite stereo gear? Hashtags are a simple way to find and reach niche audiences. 2. Ride a trend From discovering soon-to-be viral videos to inspiring social movements, hashtags can quickly connect your brand to new customers. Use hashtags to discover trending cultural moments. 3. Track results It’s easy to monitor hashtags across multiple social channels. From live events to new brand campaigns, hashtags both boost engagement and simplify your reporting. HOW TO FIND THE BEST HASHTAGS FOR YOUR BUSINESS 2 HOW HASHTAGS WORK ON EACH SOCIAL NETWORK Twitter Hashtags are an essential way to categorize content on Twitter. Users will often follow and discover new brands via hashtags. Try to limit to two or three. Instagram Hashtags are used to build communities and help users find topics they care about. For example, the popular NYC designer Jessica Walsh hosts a weekly Q&A session tagged #jessicasamamondays.
    [Show full text]
  • Common Sites and Apps Used by Teens
    Common Sites and Apps Used by Teens SOCIAL NETWORKING: Facebook is the top social network on the web as it is used by more than 1 billion people each month. You can access this service using an app on a mobile device or internet service for a computer. People set up a profile and accept “friend requests.” There is a timeline to post events and share “status updates.” Certain groups can be set up as private or public. Users can be referenced in someone else’s text or picture (tagged). Teens are moving away from fb because many parents and grandparents are on the site. Officially, individuals should be 13 years of age to create an account but students in elementary schools report using this social networking site. Like Facebook, Twitter is a social network centered on microblogging with a 140-character text limit. An uploaded picture or text message is called a “Tweet.” The public can “follow” friends, celebrities, causes, businesses or tv shows. You can “tweet” live during a show by using # (hashtag). Students report concerning “subtweets,” which are comments intended for someone to see without mentioning their username, usually with a derogatory tone. Ask.fm is another popular pre-teen social networking website where users can ask other users questions. Users have to create an account to leave or receive comments. Ask.Fm is different than Facebook and Twitter because users can ask questions or leave comments anonymously. However, there is the option for users to not receive comments unless a sender identifies himself. This has been a popular venue for cyber-bullying.
    [Show full text]
  • What Is Gab? a Bastion of Free Speech Or an Alt-Right Echo Chamber?
    What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber? Savvas Zannettou Barry Bradlyn Emiliano De Cristofaro Cyprus University of Technology Princeton Center for Theoretical Science University College London [email protected] [email protected] [email protected] Haewoon Kwak Michael Sirivianos Gianluca Stringhini Qatar Computing Research Institute Cyprus University of Technology University College London & Hamad Bin Khalifa University [email protected] [email protected] [email protected] Jeremy Blackburn University of Alabama at Birmingham [email protected] ABSTRACT ACM Reference Format: Over the past few years, a number of new “fringe” communities, Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, like 4chan or certain subreddits, have gained traction on the Web Michael Sirivianos, Gianluca Stringhini, and Jeremy Blackburn. 2018. What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. In WWW at a rapid pace. However, more often than not, little is known about ’18 Companion: The 2018 Web Conference Companion, April 23–27, 2018, Lyon, how they evolve or what kind of activities they attract, despite France. ACM, New York, NY, USA, 8 pages. https://doi.org/10.1145/3184558. recent research has shown that they influence how false informa- 3191531 tion reaches mainstream communities. This motivates the need to monitor these communities and analyze their impact on the Web’s information ecosystem. 1 INTRODUCTION In August 2016, a new social network called Gab was created The Web’s information ecosystem is composed of multiple com- as an alternative to Twitter.
    [Show full text]
  • CDC Social Media Guidelines: Facebook Requirements and Best Practices
    Social Media Guidelines and Best Practices Facebook Purpose This document is designed to provide guidance to Centers for Disease Control and Prevention employees and contractors on the process for planning and development, as well as best practices for participating and engaging, on the social networking site Facebook. Background Facebook is a social networking service launched in February 2004. As of March 2012, Facebook has more than 901 million active users, who generate an average of 3.2 billion Likes and Comments per day. For additional information on Facebook, visit http://newsroom.fb.com/. The first CDC Facebook page, managed by the Office of the Associate Director for Communication Science (OADC), Division of News and Electronic Media (DNEM), Electronic Media Branch (EMB), was launched in May 2009 to share featured health and safety updates and to build an active and participatory community around the work of the agency. The agency has expanded its Facebook presence beyond the main CDC profile, and now supports multiple Facebook profiles connecting users with information on a range of CDC health and safety topics. Communications Strategy Facebook, as with other social media tools, is intended to be part of a larger integrated health communications strategy or campaign developed under the leadership of the Associate Director of Communication Science (ADCS) in the Health Communication Science Office (HCSO) of CDC’s National Centers, Institutes, and Offices (CIOs). Clearance and Approval 1. New Accounts: As per the CDC Enterprise Social Media policy (link not available outside CDC network): • All new Facebook accounts must be cleared by the program’s HCSO office.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Opportunities and Challenges for Standardization in Mobile Social Networks
    Opportunities and Challenges for Standardization in Mobile Social Networks Laurent-Walter Goix, Telecom Italia [email protected] Bryan Sullivan, AT&T [email protected] Abstract This paper describes the opportunities and challenges related to the standardization of interoperable “Mobile Social Networks”. Challenges addressed include the effect of social networks on resource usage, the need for social network federation, and the needs for a standards context. The concept of Mobile Federated Social Networks as defined in the OMA SNEW specification is introduced as an approach to some of these challenges. Further specific needs and opportunities in standards and developer support for mobile social apps are described, including potentially further work in support of regulatory requirements. Finally, we conclude that a common standard is needed for making mobile social networks interoperable, while addressing privacy concerns from users & institutions as well as the differentiations of service providers. 1 INTRODUCTION Online Social Networks (OSN) are dominated by Walled Gardens that have attracted users by offering new paradigms of communication / content exchange that better fit their modern lifestyle. Issues are emerging related to data ownership, privacy and identity management and some institutions such as the European Commission have started to provide measures for controlling this. The impressive access to OSN from ever smarter mobile devices, as well as the growth of mobile- specific SN services (e.g. WhatsApp) have further stimulated the mobile industry that is already starving for new attractive services (RCS 1). In this context OMA 2 as mobile industry forum has recently promoted the SNEW specifications that can leverage network services such as user identity and native interoperability of mobile networks (the approach promoted by “federated social networks”).
    [Show full text]
  • The Meet Group Teams with Digital Identity Company Yoti to Help Create Safer Communities Online
    The Meet Group teams with digital identity company Yoti to help create safer communities online NEW HOPE, Pa., July 24, 2019 - The Meet Group,Inc. (NASDAQ: MEET), a leading provider of ​ ​ ​ interactive live streaming solutions, and Yoti, a digital identity company, today announced that The ​ ​ Meet Group plans to trial Yoti’s innovative age verification and age estimation technologies designed to create safer communities online. The Meet Group, with more than 15 million monthly active users, helps people to find connection and community through its social networking and dating apps. As a company committed to the protection of its users, The Meet Group devotes approximately half of its workforce to safety and moderation, ​ and continuously reviews its safety procedures with the goal of meeting the highest standards of ​ online safety and security. The relationship allows Yoti to enhance The Meet Group’s strong existing safety measures, letting ​ ​ users verify their age with Yoti’s age estimation technology Yoti Age Scan, or the free Yoti app where ​ ​ a date of birth is verified to a government issued photo ID. Yoti’s technology can help moderators at The Meet Group ensure that minors do not create accounts. Geoff Cook CEO at The Meet Group commented, “A key part of helping people to create ​ ​ meaningful connections is to keep them safe online. We have already committed ourselves to one-tap report abuse capability, clear and frequent safety education, and proactive and transparent moderation, and now with Yoti’s age verification and estimation technologies, we look forward to being one of the few app operators in social or dating who can respond to reports of underage users quickly and accurately.
    [Show full text]
  • Some Mobile Apps Add Anonymity to Social Networking
    Log in / Create an account Search Subscribe Topics+ The Download Magazine Events More+ Connectivity Some Mobile Apps Add Anonymity to Social Networking Social-networking apps that eschew real names are gaining ground. by Rachel Metz February 6, 2014 On social networks like Facebook, Twitter, and LinkedIn, most people do not communicate freely, for fear of the repercussions. For just over a decade, Facebook has enforced the idea of an authentic online identity tied to each user of a social network. This might be fine for sharing news of a promotion or new baby with friends, but sometimes you’d probably like to post a status update that won’t go on your permanent record. This urge might explain why millions of people, many of them under the age of 25, are flocking to a free smartphone app called Whisper, which lets you share thoughts—a few lines of text set against a background image—without adding your real name. Secret, a newer free app for the iPhone that shares posts anonymously through your existing social networks, is based on the same idea. After years spent filling social networks like Facebook and Twitter with the minutiae of our lives, we’ve left permanent, heavily curated trails of personal data in our wake—over 1.2 billion of them on Facebook alone, judging by its user count. New apps allow us to continue being social without worrying about the repercussions of sharing the most personal confessions. “Facebook is more like the global social network; it’s like our communication layer to the world,” says Anthony Rotolo, an assistant professor at Syracuse University, who studies social networks.
    [Show full text]
  • 22.Format Hum-SOCIAL NETWORKING and LIBRARIES
    IMPACT: International Journal of Research in Humanities, Arts and Literature (IMPACT: IJRHAL) ISSN (P): 2347-4564; ISSN (E): 2321-8878 Vol. 5, Issue 10, Oct 2017, 165-170 © Impact Journals SOCIAL NETWORKING AND LIBRARIES SHEEL BHADRA YADAV, MOHIT GUPTA & APARNA DIXIT Research Scholar, Guest Faculty, Department of Library and Information science, Bundelkhand University, Jhansi, India ABSTRACT In this era of information technology, users are more progressive and like to use advances in information technology, for getting updated with world and also, to fulfil their academic and social need. This paper deals with the concepts of the social networking in libraries. Paper focuses on challenges of social networking among library professionals, the paper highlights purpose of social media, example of social networking sites. The study shows us that social networking sites are an integral part of our life. The paper also shows popularity of social networking sites among users through statistical Social Media. KEYWORDS : Library 2.0, Social Networking Sites, Web 2.0 INTRODUCTION Social networking plays an important and effective role for communication. There are many social networking sites such as MySpace, Friendster, Facebook, Digg, hi5, Haboo, LinkedIn, Netlog, YouTube, Wikipedia, Flickr, Pinterest, Twitter, Instagram, etc. are used for the purpose of communication. Social networking encompasses many software, which helps software users to interact and share their information. Social networking creates a platform, by which similar interest of users stand on single platform. In the end of 1990s, various social networking sites were developed with attractive features. Friendsters develop in 2002. Friendster had amazing features compared to to others of those days.
    [Show full text]
  • Visual Social Media and Big Data. Interpreting Instagram Images Posted on Twitter
    Visual Social Media and Big Data Interpreting Instagram Images Posted on Twitter Dhiraj Murthy, Alexander Gross, Marisa McGarry Abstract Social media such as Twitter and Instagram are fast, free, and multi- cast. These attributes make them particularly useful for crisis commu- nication. However, the speed and volume also make them challenging to study. Historically, journalists controlled what/how images repre- sented crises. Large volumes of social media can change the politics of representing disasters. However, methodologically, it is challenging to study visual social media data. Specifically, the process is usually labour-intensive, using human coding of images to discern themes and subjects. For this reason, Studies investigating social media during crises tend to examine text. In addition, application programming interfaces (APIs) for visual social media services such as Instagram and Snapchat are restrictive or even non-existent. Our work uses images posted by Instagram users on Twitter during Hurricane Sandy as a case study. This particular case is unique as it is perhaps the first US disaster where Instagram played a key role in how victims experi- enced Sandy. It is also the last major US disaster to take place before Instagram images were removed from Twitter feeds. Our sample con- sists of 11,964 Instagram images embedded into tweets during a two- week timeline surrounding Hurricane Sandy. We found that the pro- duction and consumption of selfies, food/drink, pets, and humorous macro images highlight possible changes in the politics of representing disasters – a potential turn from top-down understandings of disas- ters to bottom-up, citizen informed views.
    [Show full text]