Deletefacebook and Hashtag Activism in a Perspective of Critical Discourse Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Deletefacebook and Hashtag Activism in a Perspective of Critical Discourse Analysis Master Thesis (Two-Year) #DeleteFacebook and Hashtag Activism in a Perspective of Critical Discourse Analysis Student: Greta Bühring Semester: Spring 2021 Supervisor: Dr. Michael Krona Examiner: Dr. Bo Reimer Malmö University Abstract This thesis aims to conduct an in-depth study of the activism surrounding the #DeleteFacebook hashtag by applying Critical Discourse Analysis. By theorizing framing, digital colonialism, power relations, and antagonism, this thesis examines the qualitative analysis of 1.987 Tweets posted on Twitter between 20 February and 4 March 2021. This study identifies the key thematic content of these Tweets and then conducts an in-depth critical analysis. These questions will be addressed in the research: “What are the principle discourse typologies and their intertextual interpretation of hashtag activism #DeleteFacebook?”, “What were the key themes that emerged during the #DeleteFacebook hashtag movement?” and “How can we interpret the online engagement with #DeleteFacebook as hashtag activism?”. This thesis presents an analysis of #DeleteFacebook related Tweets through coding and then reveals an intertextual analysis of it, including the social context. Also, this study provides a thorough review of the related literature concerning the costs of connection, social movements, hashtag activism, and collective identity. Finally, it concludes with a discussion reflecting on the role of digital colonialism and the power of Facebook. Keywords: #DeleteFacebook, Hashtag Activism, Digital Colonialism, Power Relations, Antagonism, Critical Discourse Analysis, Framing 2 List of Figures Figure 1. Meme about data harvesting on Facebook ......................................... 9 Figure 2. Brian Acton tweets #DeleteFacebook................................................ 11 Figure 3. Frequency in use of #DeleteFacebook .............................................. 39 Figure 4. Framework for CDA ........................................................................... 45 Figure 5. Visual representation of the key themes ............................................ 48 List of Tables Table 1. The Scope of Tweets analysis ............................................................ 38 Table 2. The #DeleteFacebook campaign chronologically ............................... 40 Table 3. Coding of the Tweets .......................................................................... 41 Table 4. Coding stages ..................................................................................... 42 Table 5. Quantitative representation of the key themes ................................... 49 3 Table of Contents Abstract .............................................................................................................. 2 List of Figures ..................................................................................................... 3 List of Tables ...................................................................................................... 3 Table of Contents ............................................................................................... 4 1. Introduction .................................................................................................. 6 2. Background of #DeleteFacebook ................................................................. 8 2.1. Celebrities and #DeleteFacebook ....................................................... 10 2.2. Critics .................................................................................................. 12 2.3. Twitter ................................................................................................. 13 2.4. #DeleteFacebook in Australia ............................................................. 14 3. Literature Review ....................................................................................... 16 3.1. The Cost of Connection ....................................................................... 16 3.2. Social Movements ............................................................................... 18 3.3. New Social Movements ....................................................................... 20 3.4. Hashtag activism ................................................................................. 21 3.5. Other studies of Hashtag activism ....................................................... 23 3.6. Collective Identity ................................................................................ 26 3.7. Resistance Movements ....................................................................... 18 4. Theory........................................................................................................ 27 4.1. Framing of Social Movements ............................................................. 27 4.2. Digital Colonialism ............................................................................... 29 4 4.3. Power Relations .................................................................................. 30 4.4. Antagonism ......................................................................................... 31 5. Research Design ....................................................................................... 33 5.1. Research Problem............................................................................... 33 5.2. Research Question .............................................................................. 34 5.3. Research Paradigm ............................................................................. 34 5.4. Limitations ........................................................................................... 35 5.5. Ethical Considerations......................................................................... 36 6. Methodology .............................................................................................. 37 6.1. Quantitative Analysis ........................................................................... 37 6.2. Qualitative Analysis ............................................................................. 44 6.2.1. Critical Discourse Analysis ........................................................... 44 6.2.2. Why CDA? .................................................................................... 46 7. Key findings and Analysis .......................................................................... 47 7.1. Presentation of Quantitative Content Analysis .................................... 47 7.2. Presentation of Qualitative Content Analysis ...................................... 50 7.2.1. Encouragement to Delete Facebook ............................................ 50 7.2.2. Resentment or antipathy expressed towards Data Privacy issues 57 8. Further Study ............................................................................................. 62 9. Discussion ................................................................................................. 63 10. Conclusion ................................................................................................. 65 11. References ................................................................................................ 70 5 1. Introduction This thesis aims to present and analyze the discourses that emerged during the #DeleteFacebook hashtag movement. The research will focus on the theoretical frameworks of framing, digital colonialism, power relations, and antagonism. Through the quantitative research method of coding and the qualitative method of critical discourse analysis, the main research question: “What are the principle discourse typologies and their intertextual interpretation of hashtag activism #DeleteFacebook?” will be addressed. In order to accomplish that, two subsidiary questions have been added: 1. What were the key themes that emerged during the #DeleteFacebook hashtag movement? 2. How can we interpret the online engagement with #DeleteFacebook as hashtag activism? The following is how the study is structured: the history and meaning of the #DeleteFacebook movement are discussed first. The second step is to review the relevant literature, including studies on the cost of connection, resistance towards power relations, social movements, hashtag activism, and collective identity. The thesis is supported by a two-part methodological framework: coding as quantitative analysis and critical discourse analysis as a qualitative method of in- depth analysis. The findings are then interpreted in accordance with the theoretical context. Finally, I give some concluding remarks as well as some implications for potential research in a discussion. The #DeleteFacebook online movement emerged after the 2018 Facebook- Cambridge Analytica scandal, where the profile data of 270,000 users was leaked and used for various purposes. This study analyzes the most recent spike of this movement‘s activity and presents a critical discourse analysis of the Tweets posted by the participants urging the boycott of Facebook. 6 The goal of this thesis is to contribute to the study of Media and Communications. There is no need to say that social media is a big part of everyday life; there is much research done about social media with different theories, methodologies, and approaches in academia. My research provides a clear structure that could be in use for future researchers. For social media analysis, especially hashtag movements, where the researcher can identify a specific topic, the combination of quantitative (coding) and qualitative (critical discourse analysis)
Recommended publications
  • M&A @ Facebook: Strategy, Themes and Drivers
    A Work Project, presented as part of the requirements for the Award of a Master Degree in Finance from NOVA – School of Business and Economics M&A @ FACEBOOK: STRATEGY, THEMES AND DRIVERS TOMÁS BRANCO GONÇALVES STUDENT NUMBER 3200 A Project carried out on the Masters in Finance Program, under the supervision of: Professor Pedro Carvalho January 2018 Abstract Most deals are motivated by the recognition of a strategic threat or opportunity in the firm’s competitive arena. These deals seek to improve the firm’s competitive position or even obtain resources and new capabilities that are vital to future prosperity, and improve the firm’s agility. The purpose of this work project is to make an analysis on Facebook’s acquisitions’ strategy going through the key acquisitions in the company’s history. More than understanding the economics of its most relevant acquisitions, the main research is aimed at understanding the strategic view and key drivers behind them, and trying to set a pattern through hypotheses testing, always bearing in mind the following question: Why does Facebook acquire emerging companies instead of replicating their key success factors? Keywords Facebook; Acquisitions; Strategy; M&A Drivers “The biggest risk is not taking any risk... In a world that is changing really quickly, the only strategy that is guaranteed to fail is not taking risks.” Mark Zuckerberg, founder and CEO of Facebook 2 Literature Review M&A activity has had peaks throughout the course of history and different key industry-related drivers triggered that same activity (Sudarsanam, 2003). Historically, the appearance of the first mergers and acquisitions coincides with the existence of the first companies and, since then, in the US market, there have been five major waves of M&A activity (as summarized by T.J.A.
    [Show full text]
  • Ethics of Facebook: Analyzing the Social Network and Global Leader
    Ethics of Facebook: Analyzing the Social Network and Global Leader A Thesis Submitted to the Faculty of the School of Engineering and Applied Science University of Virginia • Charlottesville, Virginia In Partial Fulfillment of the Requirements of the Degree Bachelor of Science, School of Engineering Selwyn Hector Spring 2020 On my honor as a University Student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments Signature __________________________________________ Date __________ Selwyn Hector Approved __________________________________________ Date __________ Michael Gorman, Department of Engineering and Society Ethics of Facebook: Analyzing the Social Network and Global Leader Introduction As computing technology has grown, the internet and computers have become an essential part of people’s daily lives. According to data from the US Census, 81% of United States homes had a computer with internet access in 2016 and 76% of households had at least 1 one smartphone. Facebook is one of the internet’s largest services with 1.59 billion daily active 2 users and 2.41 billion monthly active users as of June 2019. ​ Facebook’s massive user base gives ​ it a platform to influence many parts of the world. Facebook began as a platform for connecting college students but now is a behemoth in entertainment, news, advertising, and more. Small decisions in how content is prioritized and what content is allowed to be posted have consequences across many cultures. This enormous power makes Facebook not only a social network that connects friends but a global leader that shapes the future. Unfortunately, the platform has been at the center of many controversies related to user 3,4 privacy, misinformation, and hate speech.
    [Show full text]
  • Whatsapp-Ening with Mobile Instant Messaging?
    Please do not remove this page Getting acquainted with social networks and apps: WhatsApp-ening with mobile instant messaging? Anderson, Katie Elson https://scholarship.libraries.rutgers.edu/discovery/delivery/01RUT_INST:ResearchRepository/12643391590004646?l#13643535980004646 Anderson, K. E. (2016). Getting acquainted with social networks and apps: WhatsApp-ening with mobile instant messaging? In Library Hi Tech News (Vol. 33, Issue 6, pp. 11–15). Rutgers University. https://doi.org/10.7282/T3HD7XVX This work is protected by copyright. You are free to use this resource, with proper attribution, for research and educational purposes. Other uses, such as reproduction or publication, may require the permission of the copyright holder. Downloaded On 2021/09/25 05:30:36 -0400 Getting acquainted with social networks and apps: WhatsApp-ening with Mobile Instant Messaging? The use of Mobile Messaging (MM) or Mobile Instant Messaging (MIM) has grown in the past few years at astonishing rates. This growth has prompted data gatherers and trend forecasters to look at the use of mobile messaging apps in different ways than in the past. In a 2015 survey, The Pew Research Center asked about use of mobile messaging apps separately from cell phone texting for the first time (Duggan, 2015). Digital marketing site eMarketer.com published their first ever worldwide forecast for mobile messaging in 2015. This forecast report shows 1.4 billion current users of mobile messaging apps or 5% of smartphone users accessing a mobile messaging app at least once month. This a 31.6% increase from the previous year. The forecast predicts that by 2018 there will be two billion users, representing 80% of smartphone users (eMarketer.com, 2015).
    [Show full text]
  • Encryption Policy and Its International Impacts 3
    A HOOVER INSTITUTION ESSAY Encryption Policy and Its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects RYAN BUDISH, HErbERT BURKERT, AND UrS GASSER Aegis Series Paper No. 1804 Introduction In the wake of the 2016 San Bernardino shooting, Apple and the US Federal Bureau of Investigation waged a public battle over the availability of essentially unbreakable encryption in consumer devices.1 Ultimately the FBI was able to access the contents of the phone.2 This forestalled proposed changes to US law and policy that would have effectively 3 changed the level of encryption available in American consumer technologies. Throughout Law and Technology, Security, National this tense domestic debate—involving a US crime, US law enforcement, a US company, and US law—there was only a vague sense of what the broader international implications might be.4 As the Trump administration considers reopening the debate over US encryption policies, and as many countries around the world consider and implement their own encryption policies, it is more important than ever to understand the ways in which seemingly domestic encryption policy decisions can reverberate around the globe.5 The recent scuffles over iPhone encryption are just one set of examples of the ways in which new consumer technologies with built-in encryption have created novel challenges for law enforcement agencies, national security agencies, and other policy-makers. In response to these technological challenges, policy-makers are increasingly considering policies with direct and indirect impacts on the effectiveness of encryption tools. While the domestic impacts of such policies are often intended and predictable, the international implications are often both unintentional and poorly understood.
    [Show full text]
  • Crowdfunding
    New Institutions for Innovation Finance: Global Angels and Crowdfunding Christian Catalini @ccatalini World Bank Innovation Policy Course April 17th, 2014 Agenda 1. Introduction 2. Some Simple Economics of Crowdfunding 3. Crowdfunding versus Regular Sources of Finance 4. The US Equity Crowdfunding Debate 5. Crowdfunding and Entrepreneurial Ecosystems 6. Democratizing Access to Capital 7. The Young, Restless and Creative 8. Measurement 9. A $96B Opportunity 10. Policy Tools WhatsApp 2009 • Founded in 2009 by Jan Koum and Brian Acton (both Yahoo! employees) • $250K in seed funding 2011 • $8M Series A lead by Sequoia Capital 2013 • $50M Series C lead by Sequoia Capital • 400M monthly active users • 10 billion messages per day 2014 • Acquired in February 2014 by Facebook for $19B “Palmer Luckey, the founder of Oculus, earned a reputation for having the largest personal collection of head-mounted displays in the world, and is a longtime moderator in Meant to be Seen (MTBS) 3D's discussion forums.” Oculus VR 2012 • In August, Palmer Luckey, a designer at the University of Southern California Institute for Creative Technologies, launches a Kickstarter campaign • In 36 hours the campaign raises more $1M • September 1st, closes at $2.4M 2013 • Series A round for $16M • Series B round for $75M lead by Andreessen Horowitz 2014 • Acquired in April 2014 by Facebook for $2.3B • Only 39 companies in 10 years (~4 year) • .07% of venture-backed consumer and enterprise software startups • It takes >7 years to a liquidity event Aileen Lee (2013) “Welcome
    [Show full text]
  • Pdfmachine from Broadgun Software, Http
    Analyzing Instant Messaging Applications for Threats : WhatsApp Case Study Priti Jagwani* Internet has revolutionized the way we communicate. Email, social media, instant messengers and now mobile messaging are milestones in this trail. This paper has presented details about instant messengers covering their important features, working methodology and safety threats of using them. However, the use of WhatsApp and similar mobile instant messaging apps also poses new privacy risks for users. Further we investigated in detail, security issues of WhatsApp: the most popular instant messaging application available now days. Privacy implications of using WhatsApp and potential keypoints to remain safe while using it are also discussed. Keywords: WhatsApp, Instant Messaging, Threats. Introduction Along with the advancement of social media instant messaging applications are gaining popularity. Now days these messaging services have become integral part of our communication networks. Instant messaging is an online chat application which offers transfer of text on internet in real time. Instant messaging facilitates transmition of messages between two parties bi directionally. After typing the text when a user on either side wants to transmit, he/she selects “send”. Almost all instant messaging in their fancy versions provides voice chat, file transfers, voice over IP and clickable hyperlinks. Depending on the protocol used in instant messaging, the technical architecture can be peer-to-peer (direct point-to-point transmission) or client-server. Starting from early 1990s with Unix “talk”, instant messaging (IM) applications traveled a glorious path till present scenario of height of popularity. Each and every IM service provides its own client either in the form of a browser based piece of application or in the form of a separately installed piece of software.
    [Show full text]
  • Case-Whatsapp.Pdf
    WhatsApp Case Study Entrepreneurship © 2012 ff -Jack M. Wilson, Distinguished Professor WhatsApp 1 WhatsApp • Simple, secure, reliable messages and free phone calls. – https://www.whatsapp.com/ • WhatsApp Messenger is a proprietary, cross-platform, encrypted instant messaging client for smartphones.It uses the Internet to send text messages, documents, PDF files, GIF images, video, user location and audio messages to other users using standard cellular mobile numbers. • As of February 2016, WhatsApp had a user base of one billion, making it the most popular messaging application. • WhatsApp Inc., based in Mountain View, California, was acquired by Facebook Inc. on February 19, 2014, for approximately US$19.3 billion. – https://en.wikipedia.org/wiki/WhatsApp Entrepreneurship © 2012 ff -Jack M. Wilson, Distinguished Professor WhatsApp 2 Remember what are some of the new venture issues? • Opportunity Recognition • Building a Team • Search for a viable Business Model • Acquiring necessary resources • Growing the Business • Harvesting the fruits of the labor. Entrepreneurship © 2012 ff -Jack M. Wilson, Distinguished Professor WhatsApp 3 Opportunity Recognition • Jan Koum and Brian Acton –both former Facebook employees. • Recognized that building apps for the iPhone was going to be very big. • Felt that messaging, although with several competitors already in the space, could be a huge opportunity. Entrepreneurship © 2012 ff -Jack M. Wilson, Distinguished Professor WhatsApp 4 Team Building • Jan Koum and Brian Acton –both former Facebook employees teamed up in 2009 – with Koum focusing more on the technical development and – Acton on the resource development. • Recruited Igor Solomenikov, a Russian iPhone app developer to help create the app’s front end.
    [Show full text]
  • Facebook – Whatsapp: the Price Is…
    Facebook – WhatsApp: the price is… Facebook Market Cap (as of 21/02/2014): USD174.89bn Facebook, Inc. the listed US based company headquartered in Menlo Park, California, has signed a definitive agreement on Wednesday, the 19th of February to acquire the venture-backed WhatsApp Inc for USD16bn plus USD3bn in restricted stock units (RSU from now on). The deal is the largest acquisition of a venture-backed company in history, which also clearly puts it in the early lead for the single biggest venture return this year. It should be enough to consider that by itself this exit would satisfy the IRR requirement of the whole USD1.3bn fund of Sequoia that invested a mere USD58.3mln in the mobile messaging company. Ironically, one of the two co- founders, Brian Acton, was turned down for employment by Twitter and Facebook in 2009, when he was seeking a job after nine years of experience at Yahoo Inc. as infrastructure engineer. Shortly after the rejections, he met with former colleague Jan Koum and together founded Whatsapp, which after only 5 years, made them billionaires thanks to the company that refused Brian Acton. The total consideration agreed by Facebook will be paid both in cash (USD 4bn) and equity (USD 12bn). The equity part will be paid through the issue of circa 184mln shares, at a price of approximately USD 65.3 each based on the six-day average closing price preceding the announcement. Additionally, Facebook could pay up to USD 3bn, through the issue of another 46mln RSUs to WhatsApp employees which will vest in four years.
    [Show full text]
  • Big Tech Acquisitions and the Potential Competition Doctrine: the Case of Facebook
    Big Tech Acquisitions and the Potential Competition Doctrine: The Case of Facebook Mark Glick and Catherine Ruetschlin Working Paper No. 104 October 2019 ABSTRACT The Big Tech companies, including Google, Facebook, Amazon, Microsoft and Apple, have individually and collectively engaged in an unprecedented number of acquisitions. When a dominant firm purchases a start-up that could be a future entrant and thereby increase competitive rivalry, it raises a potential competition issue. Unfortunately, the antitrust law of potential competition mergers is ill-equipped to address tech mergers. We contend that the Chicago School’s assumptions and policy prescriptions hobbled antitrust law and policy on potential competition mergers. We illustrate this problem with the example of Facebook. Facebook has engaged in 90 completed acquisitions in its short history (documented in the Appendix to this paper). Many antitrust commentators have focused on the Instagram and WhatsApp acquisitions as cases of mergers that have reduced potential competition. We show the impotence of the potential competition doctrine applied to these two acquisitions. We suggest that the remedy for Chicago Professor and Assistant Professor, Department of Economics, University of Utah. Email:[email protected]. The authors would like to thank INET for its generous support for this research and Brandi Chase for her research contributions. https://doi.org/10.36687/inetwp104 School damage to the potential competition doctrine is a return to an empirically tractable structural approach to potential competition mergers. JEL Codes: K21, L40, L86. Keywords: Antitrust Law, Big Tech Companies, Digital Markets, Mergers, Potential Competition Big Tech Acquisitions and the Potential Competition Doctrine: The Case of Facebook 2 I.
    [Show full text]
  • Whats Whatsapp
    What is WhatsApp Basics & Tips So What is WhatsApp WhatsApp It could be described as a simple, free, cross-platform, Instant Message Service Some might describe it as a phenomenon that’s much more than just a means of keeping in touch 2 Billion Users Worldwide mobile telephone number based end-to-end encryption WhatsApp The History Launched January 2009 by two former Yahoo! Developers, Brian Acton and Jan Koum. They went traveling and finding it difficult to reliably keep in touch with friends and family saw an opportunity. On returning they applied for a jobs at Facebook & Twitter but thankfully got rejected. While out of work Koum purchased an iPhone & saw the app industry. WhatsApp The History Working to develop an App together, WhatsApp took shape (sounds like Whats Up) Rumoured seed cost was $250k, it was released in 2012 to a few dozen users. Brian Acton and Jan Koum test the technology Facebook became interested and in 2014 and bought it, paying $19 Billion. Initially charging a $1 per year they made it free in 2016. WhatsApp How is the App doing? WhatsApp Features Features WhatsApp • Uses Internet via WiFi or data plan • No Hidden costs or international charges • Message Friends or Family for free (similar to SMS) • Message with groups & share photos and videos • Run WhatsApp on a desktop or vis the web • Have voice calls for free via the internet (VoIP) • Have video calls with face-to-face chats for free • Send photos and video instantly using the built in camera • Security by default – end-to-end encryption • Share Documents
    [Show full text]
  • Big Tech's Buying Spree and the Failed Ideology of Competition
    Hastings Law Journal Volume 72 Issue 2 Article 1 2-2021 Big Tech’s Buying Spree and the Failed Ideology of Competition Law Mark Glick Catherine Ruetschlin Darren Bush Follow this and additional works at: https://repository.uchastings.edu/hastings_law_journal Part of the Law Commons Recommended Citation Mark Glick, Catherine Ruetschlin, and Darren Bush, Big Tech’s Buying Spree and the Failed Ideology of Competition Law, 72 HASTINGS L.J. 465 (2021). Available at: https://repository.uchastings.edu/hastings_law_journal/vol72/iss2/1 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Articles Big Tech’s Buying Spree and the Failed Ideology of Competition Law MARK GLICK,† CATHERINE RUETSCHLIN,† & DARREN BUSH† Big Tech is on a buying spree. Companies like Apple, Google, Facebook, and Amazon are gobbling up smaller companies at an unprecedented pace. But the law of competition isn’t ready for Big Tech’s endless appetite. Today’s antitrust law is controlled by the Chicago School of Law and Economics. The Chicago School’s ideological frame is toothless when a dominant firm purchases a startup that could be a future competitor. Under the “potential competition” doctrine, the Chicago School is impotent to face the anti-competitive thread of Big Tech. This Article shows how the Chicago School of law and economics hobbles antitrust law and policy on potential competition mergers. It illustrates this problem with a close study of public information regarding Facebook.
    [Show full text]
  • Ntrepid Academy Keeps You There
    Effective online operations require more than just highly capable technical solutions—they also require highly capable people. Ntrepid Academy is our cyber solutions center of excellence that provides customers with the training, analytic, and operational solutions they need to succeed in a dynamic operational space. Our solutions draw from Ntrepid products Ntrepid’s product, cyber research and development, and data sciences put you on the teams, as well as our decades’ worth of expertise supporting a variety of law enforcement, national security, and defense missions.Analytic cutting edge; Ntrepid Academy Training Solutions Your mission, your requirements, your training keeps you there Ntrepid Academy develops and delivers high-quality product and skills training for our customers. We offer an experiential training approach, supporting customers through tailored, hands-on activities. Students spend a majority of each course using our products in scenario-based exercises, allowing them to develop and refine practical skills, explore Ntrepid product features, and utilize tools as they would in real online missions. SPOTLIGHT SERIES on Mobile Messaging Applications Dec 2019 - Issue 21 Signal What Is It? Secure Signal NSIGHT SERIES Signal is an end-to-end encrypted messaging platform available for Android, December 2019 — Issue 3 iOS, and desktop operating systems. It was developed in July 2014 by Signal Messenger LLC, which is funded by the non-profitCAMOSINT Signal Foundation and ledOperations on Social Media by WhatsApp co-founder Brian Acton. Signal offers individual and group chats, A Case Study of Coordinated Inauthentic Behavior time-sensitive disappearing messages, as well as video and voice calls. The platform’s self-described goal is to have as close to “zero knowledge” of their users as possible.
    [Show full text]