Acronyms and Emoticons on a Popular Web Forum: Does Gender Makes a Difference? a Corpus-Based Study of Reddit Marie Flesch
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Collection and Analysis of a Longitudinal Twitter Sentiment Dataset
The emojification of sentiment on social media: Collection and analysis of a longitudinal Twitter sentiment dataset Wenjie Yin, Rabab Alkhalifa, Arkaitz Zubiaga Queen Mary University of London, UK {w.yin,r.a.a.alkhalifa,a.zubiaga}@qmul.ac.uk Abstract Social media, as a means for computer-mediated communication, has been extensively used to study the sentiment expressed by users around events or topics. There is however a gap in the longitudinal study of how sentiment evolved in social media over the years. To fill this gap, we develop TM-Senti, a new large-scale, distantly su- pervised Twitter sentiment dataset with over 184 million tweets and covering a time period of over seven years. We describe and assess our methodology to put together a large-scale, emoticon- and emoji-based labelled sentiment analysis dataset, along with an analysis of the re- sulting dataset. Our analysis highlights interesting temporal changes, among others in the increasing use of emojis over emoticons. We pub- licly release the dataset for further research in tasks including sentiment analysis and text classification of tweets. The dataset can be fully rehy- drated including tweet metadata and without missing tweets thanks to the archive of tweets publicly available on the Internet Archive, which the dataset is based on. 1 Introduction Social media research (Ngai, Tao, & Moon, 2015) and sentiment analysis (Poria, Hazarika, Majumder, & Mihalcea, 2020) have gained popularity in the last decade, both separately and jointly. Sentiment analysis of social media content is a fertile research area in a wide variety of fields including natural language processing (Wilson, Wiebe, & Hoffmann, 2005), computa- tional social science (Vydiswaran et al., 2018), information science (Zimbra, Ghiassi, & Lee, 2016) and beyond. -
Pepe the Frog
PEPE THE FROG: A Case Study of the Internet Meme and its Potential Subversive Power to Challenge Cultural Hegemonies by BEN PETTIS A THESIS Presented to the School of Journalism and Communication and the Robert D. Clark Honors College in partial fulfillment of the requirements for the degree of Bachelor of Arts Spring 2018 An Abstract of the Thesis of Ben Pettis for the degree of Bachelor of Arts in the School of Journalism and Communication to be taken Spring 2018 Title: Pepe the Frog: A Case Study of the Internet Meme and Its Potential Subversive Power to Challenge Cultural Hegemonies Approved: _______________________________________ Dr. Peter Alilunas This thesis examines Internet memes, a unique medium that has the capability to easily and seamlessly transfer ideologies between groups. It argues that these media can potentially enable subcultures to challenge, and possibly overthrow, hegemonic power structures that maintain the dominance of a mainstream culture. I trace the meme from its creation by Matt Furie in 2005 to its appearance in the 2016 US Presidential Election and examine how its meaning has changed throughout its history. I define the difference between a meme instance and the meme as a whole, and conclude that the meaning of the overall meme is formed by the sum of its numerous meme instances. This structure is unique to the medium of Internet memes and is what enables subcultures to use them to easily transfer ideologies in order to challenge the hegemony of dominant cultures. Dick Hebdige provides a model by which a dominant culture can reclaim the images and symbols used by a subculture through the process of commodification. -
Extracting Inter-Community Conflicts in Reddit
Extracting Inter-community Conflicts in Reddit Srayan Datta Eytan Adar University of Michigan University of Michigan [email protected] [email protected] Abstract Anti-social behaviors in social media can happen both at user and community levels. While a great deal of attention is on the individual as an ‘aggressor,’ the banning of entire Reddit subcommunities (i.e., subreddits) demonstrates that this is a multi-layer concern. Existing research on inter-community conflict has largely focused on specific subcommunities or ideological opponents. However, antago- nistic behaviors may be more pervasive and integrate into the broader network. In this work, we study the landscape of conflicts among subreddits by deriving higher-level (community) behaviors from the way individuals are sanctioned and rewarded. By constructing a conflict network, we characterize different patterns in subreddit-to-subreddit conflicts as well as communities of ‘co-targeted’ sub- reddits. By analyzing the dynamics of these interactions, we also observe that the conflict focus shifts over time. keywords: Inter-group conflict, Reddit, social network analysis, conflict network 1 Introduction Anti-social behavior in social media is not solely an individual process. Communities can, and do, antagonize other groups with anti-social behaviors. Similarly, both individuals and communities can be sanctioned in reaction to this behavior. On Reddit, for example, individuals can be banned or otherwise be sanctioned (e.g., have their posts down-voted). Likewise, entire subreddits can also be sanctioned when multiple individuals use the community as a platform for generating conflict, in violation of general Reddit norms. Critically, the form of anti-social behavior at the community level can be quite varied. -
Address Munging: the Practice of Disguising, Or Munging, an E-Mail Address to Prevent It Being Automatically Collected and Used
Address Munging: the practice of disguising, or munging, an e-mail address to prevent it being automatically collected and used as a target for people and organizations that send unsolicited bulk e-mail address. Adware: or advertising-supported software is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software. Adware is software designed to force pre-chosen ads to display on your system. Some adware is designed to be malicious and will pop up ads with such speed and frequency that they seem to be taking over everything, slowing down your system and tying up all of your system resources. When adware is coupled with spyware, it can be a frustrating ride, to say the least. Backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A back door is a point of entry that circumvents normal security and can be used by a cracker to access a network or computer system. Usually back doors are created by system developers as shortcuts to speed access through security during the development stage and then are overlooked and never properly removed during final implementation. -
Deciphering L33tspeak
Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ............................................................................................................................... -
Memeing to Learning: Exploring Meaning-Making in a Language-Learning Chat Group 69
OPEN ACCESS Technology in Language Teaching & Learning ISSN 2652-1687 https://journals.castledown-publishers.com/tltl/ Technology in Language Teaching & Learning, 1 (2), 68-90 (2019) https://doi.org/10.29140/tltl.v1n2.191 Memeing to Learning: Exploring Meaning- Making in a Language-Learning Chat Group YITING HAN a a University of Arizona, USA Email: [email protected] Abstract Meaning-making in a new era increasingly defined by digital communication is a complicated ensemble of both verbal and non-verbal modes. Following this trend of conveying information multimodally, digital memes have become a new and viral way to communicate and make meaning. Memeing, as a multimodal and social practice, may hold potential for language learners. This study explores the impact of memes on second language learning, examining how memes support meaning- making and language learning during intercultural encounters in an online chat group. Using a case study design, this article focuses on three Chinese L2 learners varying in language proficiency, learning motivation, and memeing engagement. The naturally-occurring memeing data (from 2016 to 2018) of a university-level student-run Chinese-English intercultural chat group was collected and analyzed together with individual interviews. The findings show that meaning-making and language learning were empowered by memeing in the intercultural chat group through remixing linguacultural messages, constructing identities, and developing social connections. This study concludes with meme-related pedagogical activities and a discussion of future research. Keywords: second language learning, memes, identity, multimodality, language play, digital literacies. Introduction With the emergence of networking technologies and globalization, the contexts, means and needs of foreign language learning have been greatly transformed (Kern, 2014). -
Extracting Inter-Community Conflicts in Reddit
Proceedings of the Thirteenth International AAAI Conference on Web and Social Media (ICWSM 2019) Extracting Inter-Community Conflicts in Reddit Srayan Datta Eytan Adar University of Michigan University of Michigan [email protected] [email protected] Abstract sult is an entire embedded network of subreddit-to-subreddit conflicts inside of the Reddit ecosystem. Research has found Anti-social behaviors in social media can happen both at user specific instances of these conflicts. Our goal is to inferen- and community levels. While a great deal of attention is on the individual as an ‘aggressor,’ the banning of entire Red- tially identify the structure and dynamics of this community- dit subcommunities (i.e., subreddits) demonstrates that this is to-community conflict network at scale. a multi-layer concern. Existing research on inter-community To achieve this, we address a number of challenges. First conflict has largely focused on specific subcommunities or among them is the lack of explicit group membership. Group ideological opponents. However, antagonistic behaviors may ‘membership’ in Reddit, and systems like it, can be vague. be more pervasive and integrate into the broader network. In While subscriptions are possible, individuals can display this work, we study the landscape of conflicts among sub- member-like behaviors by posting to subreddits they are reddits by deriving higher-level (community) behaviors from not part of. Such behaviors—subscription and posting—are the way individuals are sanctioned and rewarded. By con- structing a conflict network, we characterize different patterns not, however, a clear indication of the individual’s ‘social in subreddit-to-subreddit conflicts as well as communities of homes.’ An individual can display both social and anti-social ‘co-targeted’ subreddits .The dynamics of these interactions behaviors within the community via posting. -
Extracting Insights from Differences: Analyzing Node-Aligned Social
Extracting Insights from Differences: Analyzing Node-aligned Social Graphs by Srayan Datta A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in The University of Michigan 2019 Doctoral Committee: Associate Professor Eytan Adar, Chair Associate Professor Mike Cafarella Assistant Professor Danai Koutra Associate Professor Clifford Lampe Srayan Datta [email protected] ORCID iD: 0000-0002-5800-830X c Srayan Datta 2019 To my family and friends ii ACKNOWLEDGEMENTS There are several people who made this dissertation possible, first among this long list is my adviser, Eytan Adar. Pursuing a doctoral program after just finishing un- dergraduate studies can be a daunting task but Eytan made it easy with his patience, kindness, and guidance. I learned a lot from our collaborations and idle conversations and I am very grateful for that. I would like to extend my thanks to the rest of my thesis committee, Mike Ca- farella, Danai Koutra and Cliff Lampe for their suggestions and constructive feed- back. I would also like to thank the following faculty members, Daniel Romero, Ceren Budak, Eric Gilbert and David Jurgens for their long insightful conversations and suggestions about some of my projects. I would like to thank all of friends and colleagues who helped (as a co-author or through critique) or supported me through this process. This is an enormous list but I am especially thankful to Chanda Phelan, Eshwar Chandrasekharan, Sam Carton, Cristina Garbacea, Shiyan Yan, Hari Subramonyam, Bikash Kanungo, and Ram Srivatasa. I would like to thank my parents for their unwavering support and faith in me. -
Administering Avaya Social Media Manager
Administering Avaya Social Media Manager Release 6.2.x July 2016 © 2012-2016, Avaya, Inc. IF YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN such modifications, additions, or deletions were performed by or on AVAYA AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya. -
The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons -
Guحadel Usuario User Guide
E R D I E S U U G MFL67235901(1.0) MW U G This booklet is made from 60% post-consumer paper. recycled booklet ismade from This U S This booklet is printed with soy ink. with soy booklet isprinted This U Í A A D R Printed inMexico Printed E I O L Copyright©2011 LG Electronics, Inc. All rights reserved. TM Enlighten is registered trademark of Verizon Wireless and its related entities. All other trademarks are the property of their respective owners. Important Customer Information 1 When using this product, the safety precautions below must be taken to avoid possible legal liabilities and damages. Retain and follow all product safety and operating instructions. Observe all warnings in the product operating instructions. To reduce the risk of bodily injury, electric shock, fire, and damage to the equipment, observe the following precautions. ELECTRICAL SAFETY This product is intended for use when supplied with power from the designated battery or power supply unit. Other usage may be dangerous and will invalidate any approval given to this product. SAFETY PRECAUTIONS FOR PROPER GROUNDING INSTALLATION CAUTION: Connecting to improperly grounded equipment can result in an electric shock to your device. This product is equipped with a USB Cable for connecting to a desktop or notebook computer. Be sure your computer is properly grounded (earthed) before connecting this product to the computer. The power supply cord of a desktop or notebook computer has an equipment-grounding conductor and a grounding plug. The plug must be plugged into an appropriate outlet which is properly installed and grounded in accordance with all local codes and ordinances. -
Lexical Innovation on the Internet - Neologisms in Blogs
Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.