Cambridge Analytica and the Political Economy of Persuasion

Total Page:16

File Type:pdf, Size:1020Kb

Cambridge Analytica and the Political Economy of Persuasion ISSN (Online) - 2349-8846 Cambridge Analytica and the Political Economy of Persuasion AMBA UTTARA KAK Amba Uttara Kak ([email protected]) is at the Mozilla Foundation, New Delhi. Vol. 53, Issue No. 20, 19 May, 2018 The author wishes to thank Maya Palit for reading a draft of the article. Where do the financial interests of social media platforms and advertising firms align with the interests of political actors? Where might these interests conflict with constitutional values? As we approach the 2019 general elections in India, a framework to regulate political advertising and data privacy has become most urgent. We would know what kind of messaging you are susceptible to—the framing, topic, tone … where you are most likely to consume it … and how many times we would need to touch you with that to change how you think. The above excerpt is from an interview with Christopher Wylie (Wickendon 2018) of Cambridge Analytica, the political consulting firm that has risen from relative obscurity to being globally known in a matter of weeks. Cambridge Analytica used deceptive means (illegal in several countries) to gain access from Facebook to “granular” information about more than 50 million Americans and deployed it to tailor political messaging for Donald Trump’s (eventually successful) presidential campaign. Propaganda is not new and, when done right, it does involve manipulation of public opinion. ISSN (Online) - 2349-8846 What, then, was new about this incident? For one, information about people’s preferences and motivations had been obtained under the pretence of a cheerful personality quiz on Facebook (Cadwalladr and Graham-Harrison 2018). Users were outraged that their (and their Facebook friends’) information was used as fodder for a political campaign, without their knowledge or consent. We do not know the extent to which, or whether at all, Cambridge Analytica’s activities contributed to Trump’s victory; but, for now, that speculation is irrelevant. In the outrage surrounding the exposér, the promise of the internet as a decentralised, open, and democratic space for public dialogue and private communications seems ever more distant. You can still “tell your story” in ways that television or print has never made possible, but what (or who) decides its audience? It has been an open secret that communications on the internet are concentrated on a handful of social media platforms, and with a smaller subset of companies that own them. The internet might have limitless content, but its consumers have finite attention. Platforms are built around addressing this attention scarcity, with the stated goal of bringing forth content that is relevant and tailored to each user. Social media companies do not generally produce content, and so their very public community guidelines apply to users, rather than constitute editorial guidelines for the platform. Through the operation of algorithms, however, they organise and rank what an individual user sees on the platform and when, as well as decide on the basis for classification of “trending topics.”[1] Overall, these algorithms determine the content that is amplified and that which disappears without a trace. A part of this, of course, is sponsored content, which may be artificially boosted to target audiences in exchange for payment. These algorithmic choices and business dynamics shape our exposure to opinion and fact, and the range of sources from which we get them. The manipulation of their preferences may not interfere directly with an individual’s options, but, as legal philosopher Joseph Raz (1986: 377) explains, “perverts the way that person reaches decisions, forms preferences, or adopts goals.” This distortion, too, is an “invasion of autonomy.” India’s constitutional jurisprudence affirms that a range of informational choices is intrinsically important for both individual freedom and democracy. Justice Mathews, in his dissenting opinion in Bennett Coleman v Union of India (1973), noted that an informed electorate is not harmed by government censorship alone, but equally by more subtle “restraints on access” that are put in place by private players. In a different case, in 1995 the Supreme Court made the seminal observation that if “only the affluent few” were to control airwaves for broadcasting, it would put them “in a position to use it to serve their own interest by manipulating news and views.” Such a situation would pose a danger to free speech because it would threaten diversity of opinion and deny the public “truthful information on all sides of an issue” (Ministry of Information and Broadcasting v Cricket Association of Bengal 1995). ISSN (Online) - 2349-8846 Where, then, do the financial interests of platforms and advertising firms align with the interests of political actors, and where might these interests conflict with constitutional values? What technologies aid such interests and why might these justify being thought of differently from similar conflicts offline? Part of this debate, I would argue, tends to overstate the impact of technological architecture on public opinion. First, we need much more India-specific research. Internet penetration through mobile phone, might be nearing 60% in urban areas, but less than 20% of rural India is online.[2] This means that much of electoral propaganda is still spread through offline tools. That said, these numbers are rising, as are data-driven election campaigns. As we approach the 2019 general elections, a robust legal framework for both political advertising and data privacy has become urgent. Personalisation and Targeting The organising principle for content on social media platforms is personalisation, or the targeting of content that is specific to the individual’s preferences and networks. These platforms might be “neutral” to the content they host, in that there is no human curation, but they involve a host of design choices. Specifically, they are formulated to optimise “engagement” or interaction on the platform: the more time spent on the site, the more clicks, the more “likes” (Wu 2017). These tools allow political campaigns or their agents to deploy messaging that is tailored to more specific target groups. Eventually, the more granular and specific the targeting, the longer the users are expected to spend on these sites,[3] and therefore the more attractive it is for advertisers. The (economic) value of the platform subsequently increases. But, what impact does this have on users? Given that their attention is limited, some amount of filtering is not only justified, but necessary. However, many are alarmed that personalising entails exposing individuals only to views they are already sympathetic to, and those of their immediate networks, thereby fostering a more polarised populace (Sunstein 2007; Pariser 2011). In offering a single persuasive opinion at the right time, targeted communications are uniquely placed to narrow our information choices (Benkler 2001). As news consumption moves away from traditional media to social media channels, studies point to a vanishing “common core” of what is newsworthy in a society, and even a lack of a shared sense of reality (Moeller et al 2006). The internet, once celebrated for creating space for marginalised narratives, is today being accused of promoting only special-interest politics (Sunstein 2007). At the same time, while these concerned voices often assume technology to be a defining factor in social and political relations, the extent of its impact on, say, electoral outcomes, remains an open question. Many of these accounts risk overstating the links. A study conducted by a team from Harvard University found that over the course of the presidential election in the United States (US), the right-wing media system had developed into an “insulated knowledge community, reinforcing the shared world view of readers and ISSN (Online) - 2349-8846 shielding them from journalism that challenged it” (Benkler et al 2017). However, this polarisation was asymmetrical—more acute on the right-wing than on the left—which is indicative of the internal political, non-technological dynamics that might make certain communities less connected to non-partisan mainstream news outlets than others. Similar research is critical for India, particularly before our general elections in 2019. The immediate concern is that these tools for targeting are on offer to the highest bidder. Those with deeper pockets can access greater scale and more precise targeting than ordinary users. Political Advertising Political advertising on social media comes in many forms and remains underexamined in India. Direct forms include political campaigns paying social media companies to promote their content. Increasingly, however, advertising is channelled through personal accounts of individuals with large networks and high levels of engagement, labelled as “social-media influencers” (Basu 2018). These agents float content that invariably does not disclose that these are paid for by political campaigns or their social media companies. In India, reports suggest that WhatsApp (much more than Facebook or Twitter) is the primary tool for the dissemination of political communications (Dias 2017; Daniyal 2018; Calamur 2017). These forms of political messaging may be distinguished from traditional mass media in at least two ways. First, personalisation allows political actors to tailor their messages right down to the individual level, at scale and in real time. It is possible to roughly identify where particular
Recommended publications
  • Expert Says Brexit Campaign Used Data Mined from Facebook 27 March 2018, by Danica Kirka
    Expert says Brexit campaign used data mined from Facebook 27 March 2018, by Danica Kirka persuade voters. "It was everywhere." Among the companies that had access to the data was AggregateIQ, a Canadian political consultant that did work for Vote Leave, the official campaign backing Britain's withdrawal from the EU, Wylie said. Wylie described Cambridge Analytica as just one arm of a global company, SCL Group, that gets most of its income from military contracts but is also a political gun-for-hire, often in countries where democratic institutions are weak. He suggested the company combines computer algorithms and dirty tricks to help candidates win regardless of the cost. Whistleblower Christopher Wylie who alleges that the The 28-year-old Canadian with a swath of pink hair campaign for Britain to leave the EU cheated in the referendum in 2016, speaking at a lawyers office to the says he helped set up Cambridge Analytica in media in London, Monday, March 26, 2018. Chris 2013. He left the next year. Wylie's claims center around the official Vote Leave campaign and its links to a group called BeLeave, which Wylie has previously alleged that Cambridge it helped fund. The links allegedly allowed the campaign Analytica used personal data improperly collected to bypass spending rules. (AP Photo/Alastair Grant) from Facebook users to help Trump's 2016 presidential campaign. Cambridge Analytica says none of the Facebook The computer expert who alleges a trove of data was used in its work on the Trump campaign. Facebook data was improperly used to help It denies any wrongdoing.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
    EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28
    [Show full text]
  • The Great Hack - Netflix Documentary Review
    The Great Hack - Netflix documentary review The Great Hack is a documentary discussing the ideas of how data and user actions on devices can create individual profiles of you and how companies can use these profiles and personality traits based on a user actions to target you on advertisements that are specifically for that type of character and drive persuasion. This is much more effective than randomly sending adverts to random users. The documentary focuses on a company that does this called Cambridge Analytica which is the worlds leading data driven communications company and David Carrol an associate professor who wokred on exposing this companies unethical and illegal ways of gaining access to users data and using it to drive votes for specific campaigns. Cambridge Analytica played a big part in the 2016 Presidential campaign. They spent 6 months sending surveys to users which were designed to create and find personailty profiles which were then sent back and would be targeted videos and other propaganda through media. This could be a video that would pop up on a persons recomended page on youtube which could be spreading shame to Hilary Clinton in this case and therefore drive the user to vote for Trump. Further on during the documentary, you are introduced to Carole Cadwalladr who was the investigative jounarlist for the Guardian. She investigated Cambridge Analytica and how it tied to the Brexit campaign. Other students should watch this as it gives you an incite on how big and important data can be and be used and manipulated and it one of the big reasons why actions like Brexit and Trump becoming president are in place today.
    [Show full text]
  • The Cambridge Analytica Files
    For more than a year we’ve been investigating Cambridge Analytica and its links to the Brexit Leave campaign in the UK and Team Trump in the US presidential election. Now, 28-year-old Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate by Carole Cadwalladr Sun 18 Mar 2018 06:44 EDT The first time I met Christopher Wylie, he didn’t yet have pink hair. That comes later. As does his mission to rewind time. To put the genie back in the bottle. By the time I met him in person [www.theguardian.com/uk- news/video/2018/mar/17/cambridge-analytica- whistleblower-we-spent-1m-harvesting-millions-of- facebook-profiles-video], I’d already been talking to him on a daily basis for hours at a time. On the phone, he was clever, funny, bitchy, profound, intellectually ravenous, compelling. A master storyteller. A politicker. A data science nerd. Two months later, when he arrived in London from Canada, he was all those things in the flesh. And yet the flesh was impossibly young. He was 27 then (he’s 28 now), a fact that has always seemed glaringly at odds with what he has done. He may have played a pivotal role in the momentous political upheavals of 2016. At the very least, he played a From www.theguardian.com/news/2018/mar/17/data-war-whistleblower-christopher-wylie-faceook-nix-bannon- trump 1 20 March 2018 consequential role. At 24, he came up with an idea that led to the foundation of a company called Cambridge Analytica, a data analytics firm that went on to claim a major role in the Leave campaign for Britain’s EU membership referendum, and later became a key figure in digital operations during Donald Trump’s election [www.theguardian.com/us-news/2016/nov/09/how- did-donald-trump-win-analysis] campaign.
    [Show full text]
  • Investigation Into the Use of Data Analytics in Political Campaigns
    Information Commissioner’ Investigation into the use of data analytics in political campaigns Investigation update 11 July 2018 ? Contents Executive summary ................................................................................................................................. 2 1. Introduction ................................................................................................................................ 6 2. The investigation ......................................................................................................................... 9 3. Regulatory enforcement action and criminal offences ............................................................ 12 3.1 Failure to properly comply with the Data Protection Principles; ........................................... 13 3.2 Failure to properly comply with the Privacy and Electronic Communications Regulations (PECR); ........................................................................................................................................... 13 3.3 Section 55 offences under the Data Protection Act 1998 ...................................................... 13 4. Interim update .......................................................................................................................... 14 4.1 Political parties ........................................................................................................................ 14 4.2 Social media platforms ...........................................................................................................
    [Show full text]
  • H-Diplo | ISSF POLICY Series America and the World—2017 and Beyond
    H-Diplo | ISSF POLICY Series America and the World—2017 and Beyond Beyond Cyber-Threats: The Technopolitics of Vulnerability Essay by Rebecca Slayton, Cornell University Published on 4 April 2018 | issforum.org Editor: Robert Jervis, Joshua Rovner, and Diane Labrosse Web and Production Editor: George Fujii Shortlink: http://tiny.cc/PR-1-5BC Permalink: http://issforum.org/roundtables/policy/1-5BC-technopolitics PDF URL: http://issforum.org/ISSF/PDF/Policy-Roundtable-1-5BC.pdf yber-threats seem to be everywhere these days. In the past two weeks alone, we have learned that Russia has hacked into critical infrastructure sectors upon which citizens depend for daily survival, C including nuclear, water, and aviation; that Iran has stolen massive amounts of data and intellectual property from professors around the world (such activities have previously been attributed primarily to China); and that the self-professed lone hacker who claimed to have provided stolen Democratic National Committee e-mails to Wikileaks, was actually working for the Russian military intelligence agency to meddle in electoral politics.1 Finally, after months of concern about Russian disinformation and propaganda campaigns, new revelations about how big tech companies like Facebook furthered these efforts, have amplified profound questions about the future of representative governance, national sovereignty, and self- determination. Facebook has already been under scrutiny for its role in selling advertising and otherwise enhancing the operations of Russian troll farms and bots, which aimed not only to undermine Hillary Clinton’s presidential run, but more fundamentally to spread disinformation, polarize political discourse, and undermine confidence in U.S. institutions.2 Now, documents provided by whistleblower Christopher Wylie show that 1 On Russian penetration of critical infrastructure, see Brian Naylor, “Russia Hacked U.S.
    [Show full text]
  • Ilnitnt ~Tares ~Cnetc JEFF FLAKE
    CHARLES E. GRASSLEY, IOWA, CHAIRMAN ORRIN G. HATCH, UTAH DIANNE FEINSTEIN. CALIFORNIA LINDSEY O GRAHAM, SOUTH CAROLINA PATRICK J LEAHY. VERMONT JOHN CORNYN, TEXAS RICHARD J DURBIN, ILLINOIS MICHAELS. LEE, UTAH SHELDON WHITEHOUSE, RHODE ISLAND TED CRUZ, TEXAS AMY KLOBUCHAR, MINNESOTA BEN SASSE. NEBRASKA CHRISTOPHER A . COONS, DELAWARE ilnitnt ~tares ~cnetc JEFF FLAKE. ARIZONA RICHARD BLUMENTHAL, CONNECTICUT MIKE CRAPO, IDAHO MAZIE K. HIRONO. HAWAII COMMITIEE ON THE JUDICIARY THOM TILLIS, NORTH CAROLINA CORY A. BOOKER, NEW JERSEY JOHN KENNEDY. LOUISIANA KAMALA D. HARRIS, CALIFORNIA WASHINGTON, DC 20510-6275 KoLAN L DAVIS, Ch,ef Counsel and Staff O,rector JENNIFER DUCK, Oemocrat,c Chief Counsel and Staff Director January 25, 2018 Mr. Stephen Bannon c/o William Burck Quinn Emanuel Urquhart & Sullivan, LLP 777 6th Street NW, I Ith floor Washington, D.C. 20001 Dear Mr. Bannon: As chief executive of the Trump campaign, a senior aide to the transition team, and former White House chief strategist, we believe that you have information that would assist the Committee in its investigation related to Russian interference in the 2016 presidential election and the dismissal of Director Corney. Accordingly, we are writing to request documents and schedule an interview with you in February 2018. Your positions placed you at key events of interest to the Committee in its investigation of Russian interference in the 2016 election and possible obstruction ofjustice . For example, it has been reported that you were involved in the Trump campaign's decision to hire Cambridge Analytica, 1 and were aware of WikiLeaks communications during the campaign with Donald Trump, Jr.
    [Show full text]
  • Cyberspace During a Crisis in Trust
    Governing Cyberspace during a Crisis in Trust An essay series on the economic potential — and vulnerability — of transformative technologies and cyber security Contents Governing Cyberspace during a Crisis in Trust . 4 Aaron Shull Tackling Cyber-enabled Crime Will Require Public-Private Leadership . 9 Neil Desai Election Cyber Security Challenges for Canada . 16 Elizabeth F. Judge and Michael Pal State and Surveillance . 21 David Lyon Trust and Data . 26 Paul Vallée Beware Fake News . 31 Eric Jardine The Need for a National Digital Identity Infrastructure . 36 Andre Boysen The Emerging Internet of Things . 41 Christopher S. Yoo The Cyber Security Battlefield . 45 Robert Fay and Wallace Trenholm TLD Operator Perspective on the Changing Cyber Security Landscape . 49 Byron Holland Strategic Stability, Cyber Operations and International Security . 55 David Mussington The Quantum Threat to Cyber Security . 60 Michele Mosca and Bill Munson Mitigating Cyber Risk across the Financial Sector . 64 Christian Leuprecht The Danger of Critical Infrastructure Interdependency . 69 Tyson Macaulay Programmable Trust . 74 Michael Mason and Matthew Spoke Patching Our Digital Future Is Unsustainable and Dangerous . 80 Melissa Hathaway Canada and Cyber Governance . 91 Stephanie Carvin Watch videos with series authors at cigionline.org/cyberspace Credits Executive Digital Media President Web Developer Rohinton P. Medhora Rebecca Anderson Interim Manager, Strategic Graphic Designer Initiatives and Special Projects Sami Chouhdary Liliana Araujo Multimedia Producer
    [Show full text]
  • Hacking the Electorate
    Hacking the Electorate On the Use of Personal Data in Political Campaigning www.kas.de Legal notice Publisher: Konrad-Adenauer-Stiftung e. V. 2020, Berlin Cover photo: © iStock/Orbon Alija Chapter marker: p. 10 © Adobe Stock/Gorodenkoff; p. 28 © Adobe Stock/Alexander; p. 38 © Shutterstock/mrmohock Design and typesetting: yellow too, Pasiek Horntrich GbR The print edition of this publication was printed by copy print Kopie & Druck GmbH, Berlin. Printed in Germany. Produced with financial support from the Federal Republic of Germany. The text of this publication is licensed under the terms of “Creative Commons Attribution-ShareAlike 4.0 International”, CC BY-SA 4.0 (available at: https://creativecommons.org/licenses/by-sa/4.0/legalcode.de). ISBN 978-3-95721-772-1 Hacking the Electorate On the Use of Personal Data in Political Campaigning At a Glance › Although data-driven political campaigning is not a new phenomenon, the tools used, the amount of data accessible, and the potential capacity to influence voters represent a new and challenging scenario for the rule of law. › With the arrival of participatory and social web, Internet users can now generate data in a complex network and without any obligation to the pursuit of objectivity or journalistic standards as pillars for content creation. › People in different countries are increasingly getting informed and learning about political candidates and other political issues through social networks. › In recent years political parties and campaigners around the world have invested heavily in online advertising, demonstrating all the potential to reach more people in an efficient, targeted, and accessible way.
    [Show full text]
  • Ad Hoc Session of the United Nations Commission on Science and Technology
    Ad Hoc Session of The United Nations Commission on Science and Technology Specialized Agency Queen’s National Model United Nations 2021 1 International Tech Summit 2018 From the Secretary-General Dear Delegates, It is my privilege to welcome you to Queen’s National Model United Nations 2021! My name is Samuel Tobert, and it is my honour to serve as your Secretary-General for QNMUN 2021. Originally from Vancouver, B.C. I study Biochemistry, Political Science and Business at Queen’s University. Model UN has been an integral part of my High School and University careers, and through it, I have met some of my closest friends, made some of my fondest memories, and learned valuable skills, becoming a more engaged global citizen. I am so glad that you have chosen to join us for this year’s iteration of QNMUN, held virtually for the first time in our history. COVID-19 has brought many challenges to our community and has presented new obstacles to Model UN; however, I can confidently say that our team has been working tirelessly to deliver a high quality and engaging conference for you. If there is anything we can do to make our conference more accessible in its online format, please do not hesitate to reach out. With this year marking my 8th on the Model UN circuit, I reflect upon the many experiences that I have had in MUN. I can confidently say that Model UN is one of the most fulfilling activities I have had the privilege to participate in. It has made me a better speaker, a better problem solver and taught me so much about myself and the world we live in.
    [Show full text]
  • Twitter Analyzer—How to Use Semantic Analysis to Retrieve an Atmospheric Image Around Political Topics in Twitter
    big data and cognitive computing Article Twitter Analyzer—How to Use Semantic Analysis to Retrieve an Atmospheric Image around Political Topics in Twitter Stefan Spettel 1 and Dimitrios Vagianos 2,* 1 Faculty of Informatics, Technical University of Vienna, Karlsplatz 13, 1040 Wien, Austria 2 Department of International and European Studies, University of Macedonia, Egnatia 156, 54636 Thessaloniki, Greece * Correspondence: [email protected]; Tel.: +30-2310-891-487; Fax: +30-2310-891-285 Received: 5 June 2019; Accepted: 2 July 2019; Published: 6 July 2019 Abstract: Social media are heavily used to shape political discussions. Thus, it is valuable for corporations and political parties to be able to analyze the content of those discussions. This is exemplified by the work of Cambridge Analytica, in support of the 2016 presidential campaign of Donald Trump. One of the most straightforward metrics is the sentiment of a message, whether it is considered as positive or negative. There are many commercial and/or closed-source tools available which make it possible to analyze social media data, including sentiment analysis (SA). However, to our knowledge, not many publicly available tools have been developed that allow for analyzing social media data and help researchers around the world to enter this quickly expanding field of study. In this paper, we provide a thorough description of implementing a tool that can be used for performing sentiment analysis on tweets. In an effort to underline the necessity for open tools and additional monitoring on the Twittersphere, we propose an implementation model based exclusively on publicly available open-source software. The resulting tool is capable of downloading Tweets in real-time based on hashtags or account names and stores the sentiment for replies to specific tweets.
    [Show full text]