Classifying Social Identities Based on Twitter Profile Descriptions

Total Page:16

File Type:pdf, Size:1020Kb

Classifying Social Identities Based on Twitter Profile Descriptions #WhoAmI in 160 Characters? Classifying Social Identities Based on Twitter Profile Descriptions Anna Priante Djoerd Hiemstra Tijs van den Broek Public Administation Database Group NIKOS University of Twente University of Twente University of Twente [email protected] [email protected] [email protected] Aaqib Saeed Michel Ehrenhard Ariana Need Computer Science NIKOS Public Administation University of Twente University of Twente University of Twente [email protected] [email protected] [email protected] Abstract self-concept derived from social roles or member- ships to social groups (Stryker, 1980; Tajfel, 1981; We combine social theory and NLP methods Turner et al., 1987; Stryker et al., 2000). The use of to classify English-speaking Twitter users’ on- language is strongly associated with an individual’s line social identity in profile descriptions. We social identity (Bucholtz and Hall, 2005; Nguyen et conduct two text classification experiments. In al., 2014; Tamburrini et al., 2015). On Twitter, pro- Experiment 1 we use a 5-category online so- cial identity classification based on identity file descriptions and tweets are online expressions of and self-categorization theories. While we are people’s identities. Therefore, social media provide able to automatically classify two identity cat- an enormous amount of data for social scientists in- egories (Relational and Occupational), auto- terested in studying how identities are expressed on- matic classification of the other three identities line via language. (Political, Ethnic/religious and Stigmatized) is challenging. In Experiment 2 we test a merger We identify two main research opportunities on of such identities based on theoretical argu- online identity. First, online identity research is of- ments. We find that by combining these iden- ten confined to relatively small datasets. Social sci- tities we can improve the predictive perfor- entists rarely exploit computational methods to mea- mance of the classifiers in the experiment. Our sure identity over social media. Such methods may study shows how social theory can be used to offer tools to enrich online identity research. For guide NLP methods, and how such methods example, Natural Language Processing (NLP) and provide input to revisit traditional social the- ory that is strongly consolidated in offline set- Machine Learning (ML) methods assist to quickly tings. classify and infer vast amounts of data. Various studies investigate how to predict individual charac- teristics from language use on Twitter, such as age 1 Introduction and gender (Rao et al., 2010; Burger et al., 2011; Non-profit organizations increasingly use social me- Al Zamal et al., 2012; Van Durme, 2012; Ciot et dia, such as Twitter, to mobilize people and organize al., 2013; Nguyen et al., 2013; Nguyen et al., 2014; cause-related collective action, such as health advo- Preotiuc-Pietro et al., 2015), personality and emo- cacy campaigns. tions (Preotiuc-Pietro et al., 2015; Volkova et al., Studies in social psychology (Postmes and Brun- 2015; Volkova and Bachrach, 2015), political orien- sting, 2002; Van Zomeren et al., 2008; Park and tation and ethnicity (Rao et al., 2010; Pennacchiotti Yang, 2012; Alberici and Milesi, 2013; Chan, 2014; and Popescu, 2011; Al Zamal et al., 2012; Cohen Thomas et al., 2015) demonstrate that social identity and Ruths, 2013; Volkova et al., 2014), profession motivates people to participate in collective action, and interests (Al Zamal et al., 2012; Li et al., 2014). which is the joint pursuit of a common goal or inter- Second, only a few studies combine social the- est (Olson, 1971). Social identity is an individual’s ory and NLP methods to study online identity in 55 Proceedings of 2016 EMNLP Workshop on Natural Language Processing and Computational Social Science, pages 55–65, Austin, TX, November 5, 2016. c 2016 Association for Computational Linguistics relation to collective action. One recent example 2 Theoretical Framework: a 5-category uses the Social Identity Model of Collective Action Online Social Identity Classification (Van Zomeren et al., 2008) to study health cam- Grounded in Social Theory paigns organized on Twitter (Nguyen et al., 2015). The authors automatically identify participants’ mo- We define social identity as an individual’s self- tivations to take action online by analyzing profile definition based on social roles played in society or descriptions and tweets. memberships of social groups. This definition com- In this line, our study contributes to scale-up re- bines two main theories in social psychology: iden- search on online identity. We explore automatic tity theory (Stryker, 1980; Stryker et al., 2000) and text classification of online identities based on a 5- social identity, or self-categorization, theory (Tajfel, category social identity classification built on theo- 1981; Turner et al., 1987), which respectively focus ries of identity. We analyze 2633 English-speaking on social roles and memberships of social groups. Twitter users’ 160-characters profile description to We combine these two theories as together they pro- classify their social identities. We only focus on pro- vide a more complete definition of identity (Stets file descriptions as they represent the most immedi- and Burke, 2000). The likelihood of participating ate, essential expression of an individual’s identity. in collective action does increase when individuals We conduct two classification experiments: Ex- both identify themselves with a social group and are periment 1 is based on the original 5-category social committed to the role(s) they play in the group (Stets identity classification, whereas Experiment 2 tests a and Burke, 2000). merger of three categories for which automatic clas- We create a 5-category online social identity clas- sification does not work in Experiment 1. We show sification that is based on previous studies of off- that by combining these identities we can improve line settings (Deaux et al., 1995; Ashforth et al., the predictive performance of the classifiers in the 2008; Ashforth et al., 2016). We apply such classi- experiment. fication to Twitter users’ profile descriptions as they Our study makes two main contributions. First, represent the most immediate, essential expression we combine social theory on identity and NLP meth- of an individual’s identity (Jensen and Bang, 2013). ods to classify English-speaking Twitter users’ on- While tweets mostly feature statements and conver- line social identities. We show how social theory can sations, the profile description provides a dedicated, be used to guide NLP methods, and how such meth- even limited (160 characters), space where users can ods provide input to revisit traditional social theory write about the self-definitions they want to commu- that is strongly consolidated in offline settings. nicate on Twitter. Second, we evaluate different classification algo- The five social identity categories of our classifi- rithms in the task of automatically classifying on- cation are: line social identities. We show that computers can (1) Relational identity: self-definition based on perform a reliable automatic classification for most (reciprocal or unreciprocal) relationships that an in- social identity categories. In this way, we provide dividual has with other people, and on social roles social scientists with new tools (i.e., social identity played by the individual in society. Examples on classifiers) for scaling-up online identity research to Twitter are “I am the father of an amazing baby massive datasets derived from social media. girl!”, “Happily married to @John”, “Crazy Justin The rest of the paper is structured as follows. Bieber fan”, “Manchester United team is my fam- First, we illustrate the theoretical framework and the ily”. online social identity classification which guides the (2) Occupational identity: self-definition based text classification experiments (Section 2). Second, on occupation, profession and career, individual vo- we explain the data collection (Section 3) and meth- cations, avocations, interests and hobbies. Examples ods (Section 4). Third, we report the results of the on Twitter are “Manager Communication expert”, two experiments (Section 5 and 6). Finally, we dis- “I am a Gamer, YouTuber”, “Big fan of pizza!”, cuss our findings and provide recommendations for “Writing about my passions: love cooking traveling future research (Section 7). reading”. 56 (3) Political identity: self-definition based on po- ness campaign1, which aims at changing the image litical affiliations, parties and groups, as well as be- of men’s health (i.e., prostate and testicular cancer, ing a member of social movements or taking part in mental health and physical inactivity); and (2) En- collective action. Examples on Twitter are “Fem- glish random tweets posted in February and March inist Activist”, “I am Democrat”, “I’m a coun- 2015 obtained via the Twitter Streaming API. We cil candidate in local elections for []”, “mobro in select the tweets from the UK, US and Australia, #movember”, “#BlackLivesMatter”. which are the three largest countries with native En- (4) Ethnic/Religious identity: self-definition glish speakers. For this selection, we use a country based on membership of ethnic or religious groups. classifier, which has been found to be fairly accurate Examples on Twitter are “God first”, “Will also in predicting tweets’ geolocation for these countries tweet about #atheism”, “Native Washingtonian”, (Van der Veen et al., 2015). As on Twitter only 2% “Scottish no Australian no-both?”. of tweets are geo-located, we decide to use this clas- (5) Stigmatized identity: self-definition based on sifier to get the data for our text classification. membership of a stigmatized group, which is con- From these two data sources, we obtain two Twit- sidered different from what the society defines as ter user populations: Movember participants and normal according to social and cultural norms (Goff- random generic users. We sample from these two man, 1959). Examples on Twitter are “People call groups to have a similar number of profiles in our me an affectionate idiot”, “I know people call me a dataset.
Recommended publications
  • Why Do Academics Use Academic Social Networking Sites?
    International Review of Research in Open and Distributed Learning Volume 18, Number 1 February – 2017 Why Do Academics Use Academic Social Networking Sites? Hagit Meishar-Tal1 and Efrat Pieterse2 1Holon institute of Technology (HIT), 2Western Galilee College Abstract Academic social-networking sites (ASNS) such as Academia.edu and ResearchGate are becoming very popular among academics. These sites allow uploading academic articles, abstracts, and links to published articles; track demand for published articles, and engage in professional interaction. This study investigates the nature of the use and the perceived utility of the sites for academics. The study employs the Uses and Gratifications theory to analyze the use of ASNS. A questionnaire was sent to all faculty members at three academic institutions. The findings indicate that researchers use ASNS mainly for consumption of information, slightly less for sharing of information, and very scantily for interaction with others. As for the gratifications that motivate users to visit ASNS, four main ones were found: self-promotion and ego-bolstering, acquisition of professional knowledge, belonging to a peer community, and interaction with peers. Keywords: academic social-networking sites, users' motivation, Academia.edu, ResearchGate, uses and gratifications Introduction In the past few years, the Internet has seen the advent of academic social-networking sites (ASNS) such as Academia.edu and ResearchGate. These sites allow users to upload academic articles, abstracts, and links to published articles; track demand for their published articles; and engage in professional interaction, discussions, and exchanges of questions and answers with other users. The sites, used by millions (Van Noorden, 2014), constitute a major addition to scientific media.
    [Show full text]
  • Helping Young People Manage Their Online Identity
    Helping young people manage their online identity 5 Things you can do to support children Start with a positive 1 conversation • Discuss what they enjoy and why (apps / Favourite vloggers/ website / social networks). • Talk about how and who they share their lives with online – make sure to touch on what they would and wouldn't share. • Have a chat about what their online identity means to them and how they feel it reflects who they really are. • Discuss the issues they may face such as pressure to conform or encountering negativity and provide guidance and advice. Get them to think critically about 2 online and offline influences • Encourage them to think about the intentions behind what people share and be sure to check sources of information if they seem too good to be true. • Make sure they have a varied digital diet to ensure they are exposed to a range of ideas that will give them a balanced view of the world. Encourage them to review 3 their data and privacy • To ensure they stay in control of the information they share online, get them to regularly check who they are friends with online and what data they are showing on the platforms they use. • Doing a regular Google search on their name can be a simple way to manage what content is visible to everyone or remove content that may be incorrect or harmful to their reputation. Highlight the importance of being 4 #FreeToBe online • Discuss safe ways for them to stay authentic to who they are online. This could be only sharing certain content with people who offer positive encouragement and avoiding and reporting toxic environments online.
    [Show full text]
  • Building Your Professional Online Presence Where to Start Now What?
    General Job Search Strategies Building Your Professional Online Presence Social media sites such as Facebook, Twitter, LinkedIn, Pinterest, and blogs can be a great resource for networking and establishing an online identity. By creating and maintaining professional profiles, you can connect with potential employers, highlight your skills and experiences, and build a professional brand that makes you stand out. Where to Start • Decide which version of your name to use. How Should I Use These Sites? Being consistent (full vs. nickname) will create a clear identity and make it easier for potential employers to identify you. Facebook (www.facebook.com) • Choose an appropriate photo. • Join groups. Join network, industry, and alumni groups Dress in professional attire and choose a high-quality to connect with others. Want to stay connected to your image. Pick a photo with a high pixel count. When the image is classmates and discover potential career opportunities? Search scaled down, it will result in fewer artifacts. This is the first picture for “The Ohio State University Class of 2016.” people will see of you. What do you want them to think? • Edit your info. Craft your About section so that it is an accurate • Define yourself. representation of your professional brand and reflects what Write a profile headline that is clear, concise, and memorable. Think opportunities you are searching for. of it as a personal slogan – you want people to remember it! • Share. Post content that is interesting and relates to fields that • Highlight your skills. are important to you. Just saw a TED (ted.com) talk about how great leaders inspire action? Share it and begin a discussion Share your work! Post writing samples, link users to your with your peers.
    [Show full text]
  • Swipe Right: an Exploration of Self-Presentation and Impression Management on Tinder
    Swipe Right: An exploration of self-presentation and impression management on Tinder Abstract: The emergence of Location-Based-Real-Time-Dating (LBRTD) apps such as Tinder, has introduced a new way for users to get to know potential partners nearby. The design of the app represents a departure from "oldschool" dating sites as it leaves plenty of space for pictures, but only minimal room for self-description. This might change the way individuals decide to portray themselves as their real, ideal or ought-to self. Based on empirical data collected in the Netherlands, we try to assess how Tinder users present themselves, exploring at the same time the impact of their personality and their motives of use. Keywords: online identity; social networks; online relationships; self-presentation; impression management 1. Introduction Back in 1994, around the time when Match.com was registered as the first dating website, online match-making seemed an exotic opportunity, more likely to belong in a Hollywood movie (such as You've Got M@il, from 1998) than in the daily experiences of the average citizen. A lot has changed since then. A 2013 study from Pew Research has found that an estimated 5 percent of married or committed couples in the US met their significant other online (Lenhart & Duggan, 2014). Even more strikingly, 11 percent of the online adult American population claims to have used a dating site at least once in their lifetime (Lenhart & Duggan, 2014). While less data is available for the rest of the world, the market for online dating has seen a similar trend of dramatic growth in countries such as India (Joshi & Kumar, 2012) and the UK (Kee & Yazdanifard, 2015).
    [Show full text]
  • Coversheet for Thesis in Sussex Research Online
    A University of Sussex DPhil thesis Available online via Sussex Research Online: http://eprints.sussex.ac.uk/ This thesis is protected by copyright which belongs to the author. This thesis cannot be reproduced or quoted extensively from without first obtaining permission in writing from the Author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the Author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Please visit Sussex Research Online for more information and further details An Evaluation of Identity in Online Social Networking: Distinguishing Fact from Fiction _______________________________________________________________ Roya Feizy Software Systems Group School of Informatics University of Sussex Submitted to the School of Informatics for the degree of Doctor of Philosophy at University of Sussex, Nov 2010 Thesis Committee: Supervisors . Dr Ian Wakeman School of Informatics University of Sussex Dr Dan Chalmers School of Informatics University of Sussex Thesis Reader . Dr Natalia Beloff University of Sussex Thesis Reader . Dr Eamonn O‟Neill University of Bath ii | P a g e Declaration I hereby declare that this thesis has not been and will not be, submitted in whole or in part to another University for the award of any other degree. Parts of this thesis have previously appeared in the following publications: „Are Your Friends Who They Say They Are?‟, ACM Crossroads 16, 2, 19-23, Dec 2009. „Transformation of Online Representation through Time‟, International Conference on Advances in Social Network Analysis and Mining, Athens, Jul 2009.
    [Show full text]
  • The Influence of Social Networking Sites on Teen Identity
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 6-1-2009 The Digitally Born Identity: The Influence of Social Networking Sites on Teen Identity Alexis Lynn University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the Mass Communication Commons, and the Social Media Commons Recommended Citation Lynn, Alexis, "The Digitally Born Identity: The Influence of Social Networking Sites on eenT Identity" (2009). Electronic Theses and Dissertations. 387. https://digitalcommons.du.edu/etd/387 This Thesis is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. THE DIGITALLY-BORN IDENTITY: THE INFLUENCE OF SOCIAL NETWORKING SITES ON TEEN IDENTITY A Thesis Presented to the Faculty of Social Sciences University of Denver In Partial Fulfillment of the Requirements for the Degree Master of Arts By Alexis Lynn June 2009 Adviser: Derigan Silver, PhD Author: Alexis Lynn Title: The Digitally-Born Identity: The Influence of Social Networking Sites on Teen Identity Adviser: Derigan Silver, PhD Degree Date: June 2009 Abstract Based on in-depth interviews, this thesis examines how teens use Social Networking Sites (SNSs) to negotiate their identities. The thesis concludes that SNSs, such as MySpace and Facebook, facilitate a social connectivity that influences how teens portray themselves online. The process of constructing a self-presentation, receiving input from peers, and then modifying one’s self-presentation in response is not new, but the speed at which it occurs and the very public way it is displayed on an SNS constitutes a change in how teens understand the ways in which they make and constantly remake their identities.
    [Show full text]
  • Virtual Subjectivity on Social Networking Sites: Transforming the Politics of Self- Surveillance By
    ! Virtual Subjectivity on Social Networking Sites: Transforming the Politics of Self- Surveillance by Naomi Koit B.A., Queen’s University, 2011 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS in the Department of Political Science Naomi Koit, 2014 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. ! ii! ! Supervisory Committee Virtual Subjectivity on Social Networking Sites: Transforming the Politics of Self- Surveillance by Naomi Koit B.A., Queen’s University, 2011 Supervisory Committee Dr. R.B.J. Walker (Department of Political Science) Supervisor Dr. Arthur Kroker (Department of Political Science) Departmental Member ! iii! ! Abstract Supervisory Committee Dr. R.B.J. Walker (Department of Political Science) Supervisor Dr. Arthur Kroker (Department of Political Science) Departmental Member Social networking sites (SNSs) are designed to cure loneliness and fill a void left by the lack of face-to-face communication in this digital age. Given the rapid growth rate and extensive popularity of social networking sites, my research aims to investigate the validity of widespread claims indicating that members of the millennial generation who have grown up on SNSs are increasingly narcissistic and self-obsessed because of their involvement on these sites. To address these claims, I turn to key insights borrowed from computer sciences and social psychology, inspired by the exemplary work of Sherry Turkle and ideas from Michel Foucault. I find that the digital subject is caught in a vicious circle of narcissistic attachment and panic insecurity, driven to constant self- surveillance and examination in a digital form of the modern panopticon where cybercitizens can be left feeling alienated and alone despite continuous connection to others online.
    [Show full text]
  • Managing Online Identity and Diverse Social Networks on Facebook
    1 Webology, Volume 10, Number 2, December, 2013 Home Table of Contents Titles & Subject Index Authors Index Managing online identity and diverse social networks on Facebook Kirsty Young PhD, Senior Lecturer, Faculty of Arts and Social Sciences, University of Technology, Sydney, Eton Road, Lindfield NSW 2070 Australia. E-mail: kirsty.young (at) uts.edu.au Received July 15, 2013; Accepted October 25, 2013 Abstract This paper reports research that examined use of Facebook to (consciously or unconsciously) create an online identity. An online survey (N=752) was conducted during Phase 1 of the research. Results of Phase 1 informed Phase 2 where 18 active Facebook users (aged 21-57) engaged in interviews and verbal protocols. The qualitative component is reported here to give voice to active Facebook users and provide insights into the decisions that underpin their use of the Facebook site. The tools used by participants to create an online identity (or make judgments about others) are explored and include status updates, posting photographs and joining groups/pages. Data revealed adult users successfully manage their online identity and provide effective models for adolescents, particularly in relation to the management of diverse social networks where social, family and professional lives merge online. Keywords Online social networking; Facebook; Identity construction; Impression management; Diverse social networks Introduction As at June 2013 the Facebook Newsroom reports 1.15 billion monthly active users and an average of 699 million daily active users, making the Facebook site a valuable authentic context through which we can investigate human behaviour. The goal of this research was to ascertain the ways in which adults use Facebook tools to present themselves online and to identify the consequences of these actions.
    [Show full text]
  • Your Online Identity Worksheet
    Your online identity Worksheet Margaret (Peg) Burnette Erin Kerby Carli Webinar – November 2019 Associate Professor and Medical & Associate Professor and Veterinary Biomedicine Librarian Medicine Librarian [email protected] [email protected] Google yourself • What did you find? • What can you fix? • What do you need to address in order to mitigate negative impact? Make a plan • Keep your personas up to date • Standardize your name & affiliation • Be consistent across tools (name, title, keywords, high quality professional photo) • Share publications, presentations or other output if possible o Provide links if you can’t upload original content o Check your copyright agreements with the publisher before uploading articles • Be familiar with privacy and confidentiality policies • Be guided by where you are and where you want to go Guiding Questions for writing a personal statement (3 or 4 sentences about who you are and what you are passionate about) • What did you study? • What was your first job? • What skills have you gained in your work that have led you to the next step in your journey? • What are your “superpowers”? What are you great at? • Did you pivot or change your path? Why? • What skills from your prior roles are you applying to your current (or desired) position? • How do you want your career to progress? Support your users • Creating guide or toolkit for curating one’s professional identity • Plan seminars or hands-on workshops on identity tools and other online presence topics • Include types of tools or resources and best
    [Show full text]
  • A New Approach for Finding Cloned Profiles in Online Social Networks
    Int. J. of Network Security, Vol. 6, April 2014 A New Approach for Finding Cloned Profiles in Online Social Networks Fatemeh Salehi Rizi1, Mohammad Reza Khayyambashi2, and Morteza Yousefi Kharaji3 1 Sheikh Bahaei University /Department of Computer and Information Technology, Isfahan, Iran Email: [email protected] 2 Isfahan University / Department of Computer Science, Isfahan, Iran Email: [email protected] 3 Mazandaran University of Science and Technology / Department of Computer Science, Mazandaran, Iran Email: [email protected] Abstract—Today, Online Social Networks (OSNs) are the most popular platforms on the Internet, on which millions of users register to share personal information with their friends. Leakage of personal information is a significant concern for social network users. Besides information propagation, some new attacks on OSNs such as Identity Clone attack (ICA) have been identified. ICA attempts to create a fake online identity of a victim to fool their friends in order to reap their private information which is not shared in public profiles. There are some identity validation services that perform users’ identity validation, but they are passive services and they only protect users who are informed on privacy concerns and online identity issues. This paper starts with an explanation of two types of profile cloning attacks in OSNs. Afterwards, a new approach for detecting clone identities is proposed by defining profile similarity and strength of relationship measures. According to similar attributes and strength of relationship among users which are computed in detection steps, it will be decided which profile is clone and which one is genuine by a predetermined threshold.
    [Show full text]
  • Online Professional Networking
    My Reemployment My Plan 6. Online Professional Networking Face-to-face networking is essential, but you can’t afford to ignore online networking, which has exploded in the last decade. More companies are using social media to recruit. Why? Some companies have found that there are many benefits to online networking and recruiting via social media. Most of us are familiar with social media sites like Facebook, Twitter, and Instagram, which can be used for professional networking or, more often, to keep up with friends, people in the news, and personal interests. For professionals, however, the giant in the room is LinkedIn. It operates one of the world’s largest professional networks. LinkedIn, like all social media sites, begins with your profile. Since your profile can be seen by anyone on LinkedIn, it’s a great chance to present your goals, experience, and qualifications to any of the members who may be looking. Take time to make sure it looks professional, features a good current headshot, and contains only information relevant to your professional life. (Use other sites for personal interactions - like Facebook for posting funny cat videos, or Match.com for finding a date.) Refer to LinkedIn for additional help with your profile. After you make yourself as attractive as possible to potential companies and recruiters, do you then just sit back and wait to be discovered? No! Grow your network. People in your LinkedIn network are called “connections.” Send a personalized invitation to connect to everyone you know on the site. Spend a few minutes every day trying to expand your network as you meet new people.
    [Show full text]
  • Your Online Identity As a Researcher
    Your Online Identity Promoting, Engaging, Discovering Michael Ladisch Pacific Libraries Outline Raise visibility through: • Scholarly Social Networks • ResearchGate; Academia.edu • General Social Networks • Twitter, Facebook • Google Scholar Citations • Blogging • Research Blogging • ORCID • Scholarly Commons Social Media for Research Why should I use social media for my research? • Global connectedness • Boosting exposure • Receiving real time feedback • Creating and sharing content • Discovering new research • Increasing societal impact • Everybody’s doing it Social Media for Research Some suggestions: In Internet slang, troll (/ˈtroʊl/, /ˈtrɒl/) is a person who sows discord on the Internet by starting arguments or upsetting people,[1] by posting • Maintain your profiles inflammatory,[2] extraneous, or off- topic messages in an online community • Be consistent (such as a forum, chat room, or blog), either accidentally[3][4] or with the deliberate intent of provoking readers • Use your full name into an emotional response[5]or of otherwise disrupting normal on-topic discussion. • Cross-link your different profiles (Source: Wikipedia) • Don’t be a “Troll” • Always be polite • Add copyright statement for your work and respect other’s • Don’t overshare Social Media for Research Before signing up: • Be aware that your profile is public • Read the small print • Business transfers - Who owns the data? • Waiving your rights? • Government requests? • Right to leave? Social Networks for Research “I have read and agree to the Terms” is the biggest lie on the web. http://tosdr.org Scholarly Social Networks General Social Networks http://ie.linkedin.com/ http://www.academia.edu/ http://twitter.com/ https://www.researchgate.net/ https://www.facebook.com/ http://www.ssrn.com/ https://plus.google.com/ Social Networks for Research Source: Van Noorden 2014, ‘Scientists and the Social Network’, Nature, vol.
    [Show full text]