Tracking and Quantifying Censorship on a Chinese Microblogging Site

Total Page:16

File Type:pdf, Size:1020Kb

Tracking and Quantifying Censorship on a Chinese Microblogging Site Tracking and Quantifying Censorship on a Chinese Microblogging Site Tao Zhu David Phipps Adam Pridgen Jedidiah R. Crandall Dan S. +allach [email protected] Computer Science Computer Science Computer Science Computer Science Independent Researcher Bowdoin College Rice Uni"ersity Uni"ersity of Ne% Mexico Rice Uni"ersity Abstract—We present measurements and analysis of censor- Since the media is heavily controlled in China, some current ship on Weibo, a popular microblogging site in China. Since e"ents do not appear in traditional media, and are not as we were limited in the rate at which we could download posts, prominent in social media as less sensiti"e topics are. +e we identified users likely to participate in sensitive topics and recursively followed their social contacts. We also leveraged new implemented a system which can find these current e"ents and natural language processing techniques to pick out trending the related discussions in social media before such content is topics despite the use of neologisms, named entities, and informal remo"ed for censorship reasons. +e ha"e de"eloped a user language usage in Chinese social media. tracking method for -nding sensiti"e topic posts before they We found that Weibo dynamically adapts to the changing are deleted. +e also apply no"el natural language processing interests of its users through multiple layers of filtering. he filtering includes both retroactively searching posts by keyword methods. To our kno%ledge, ours is the first system that can or repost links to delete them, and rejecting posts as they are successfully extract topics from posts that use unknown %ords posted. The trend of sensitive topics is short-lived, suggesting or phrases in Chinese social media. +e also document "arious that the censorship is effective in stopping the “viral” spread proacti"e and reacti"e filtering and deletion methods applied of sensitive issues. We also give evidence that sensitive topics in by +eibo, and find that these mechanisms are effecti"e at Weibo only scarcely propagate beyond a core of sensitive posters. restricting discussion of sensiti"e topics to a core set of posters. I. I)T ,!'CTI,) The rest of this paper is structured as follows. Section II Many countries %ant to ha"e the benefits of the Internet gi"es some basic background information about microblogging while also controlling the dissemination of content. There and Internet censorship in China. Then Section III describes are many reasons for censoring the Internet, but a major the algorithms and methods we used for our measurement and reason is to pre"ent ci"il unrest [1]. Censorship is difficult analysis, followed by Section IV that describes the natural to maintain at scale 03]. Social media companies in countries language processing %e applied to the data and presents that tightly control Internet content find themselves in a risky results from topical analysis. Section ? describes the "arious position. +ithout li"ely discussions, they will not ha"e user mechanisms that +eibo uses to filter sensiti"e content. Then, engagement and the advertising re"enues that come with it. after discussion in Section VI, we conclude. If discussions turn to sensiti"e topics, they risk go"ernment intervention that could ha"e negati"e consequences for the II. $&C@> ,')! company. Consequently. many +estern social network sites, China has in"ested heavily in a mixture of Internet filtering such as Twitter or 5acebook, are una"ailable inside nations technologies 0A2. 0B2. 0C2. [7], cyber police surveillance 0D2. 0E2. such as China, and homegrown competitors, such as Sina 0162. and policy 0112. 0132 in order to tightly control access +eibo, ha"e de"eloped sophisticated censorship systems. to, and the spread of, Internet content. +eibo is the most popular microblogging site in China. Starting from 3616. %hen microblogs debuted in China, In February 3613. it had o"er 766 million users [3]. Like not only ha"e there been many top news stories where the Twitter in other countries, +eibo plays an important role reporting %as dri"en by social media, but social media has in the discourse surrounding current e"ents in China. Both also been part of the story itself for a number of prominent professional reporters and amateurs can provide immediate, e"ents, including the protests of +ukan 0172. the Deng Fujiao first-hand accounts and opinions of e"ents as they unfold. :"en incident 01A2. the Fao Jiaxin murder case 01B2 and the recent though a user might normally only see messages from other Shifang protest [16]. There ha"e also been e"ents where social users that they directly follo%. any message can rapidly “go media has forced the go"ernment to address issues directly. viral” by being shared or “retweeted” from one user to the such as the Beijing rainstorms in July. next. 5or companies such as Twitter or 5acebook, viral posts Sina +eibo Gweibo.com. referred to in this paper simply impose technical challenges to the scalability and response as ;+eibo”) has the most acti"e user community of any time of their service. To +eibo and other such firms, they microblog site in China [17]. +eibo provides services which create huge censorship challenges as well. +eibo must conduct are similar to Twitter. with @usernames, #hashtags, reposting, its own censorship rather than relying on external mechanisms, and ' 8 shortening. Posts can also contain 1A6 UTF-8 char9 such as China’s “Great Fire%all.< acters. Because %ords in written Chinese often only require two characters, 1A6 Chinese characters can ha"e 79B times that were later allowed to be searched. From the search results, as much information as 1A6 characters in English. T%o other we picked 3B users who stood out for posting about sensiti"e major differences are that +eibo allows embedded images and topics. videos, and users can comment on each others’ posts. Next, we needed to broaden our search to a larger group There is relati"ely little research on Chinese social me- of users. +e assumed that anybody who has been reposted dia 01D2. despite the fact that English-speaking social media more than -"e times by our sensiti"e users must be sensiti"e scholars perform research on Russian and Persian language as well. +e followed them for a period of time and measured online corpora e"en though they cannot speak Russian or ho% often their posts %ere deleted. Any user with more than Persian (see, e.g.. 019]). One of many concerns that can hinder B deleted posts %as considered to be sensiti"e. By expanding this %ork is the general difficulty of mechanically processing outward in this fashion. after -"e days of crawling we settled Chinese text. +estern speakers (and algorithms) expect %ords on a group of o"er 7.B66 sensiti"e +eibo users, collecti"ely to be separated by whitespace or punctuation. In written experiencing more than 7.666 deletions per day (roughly AM Chinese, howe"er. there are no such %ord boundary delimiters. of the total posts from those users). The %ord segmentation problem in Chinese is exacerbated While our methodology cannot be considered to yield a by the existence of unknown %ords such as named entities representati"e sample of +eibo users o"erall, we belie"e it is (people, companies, movies, etc.) or neologisms (substituting representati"e of ho% users who discuss sensiti"e topics will characters that appear similar to others, or otherwise coining experience +eibo’s censorship. +e also belie"e our sample ne% euphemisms or expressions, to defeat keyword-based is broad enough to also speak to the topics that +eibo is censorship) [20]. Furthermore, since social media is heavily censoring on any gi"en day. centered around current e"ents, it may well contain ne% named entities that will not appear in any static lexicon [21]. B. Crawling Despite these concerns, +eibo censorship has been the Once we settled on our list of users to follo%. we %anted to subject of previous research. Bamman et al. 0332 performed a follo% them with suf-cient fidelity to see posts as they were statistical analysis of deleted posts, showing that the presence made and measure ho% long they last prior to being deleted. of some sensiti"e terms indicated a higher probability of the +e use two APIs pro"ided by +eibo, allowing us to query deletion of a post. Their %ork also showed some geographic individual user timelines as well as the public timeline [25]. patterns in post deletion, with posts from the provinces of Starting in July 3613. %e queried each of our 7B66 users, once Tibet and Qinghai exhibiting a higher deletion rate than other per minute, for which +eibo returns the most recent B6 posts. provinces. +e also queried the public timeline roughly once e"ery four +eiboScope 0372 %as de"eloped at the Uni"ersity of Hong seconds, for which +eibo returns the most recent 366 posts. @ong in order to track trends on +eibo, concurrently with These posts appear to be 39B minutes older than real-time. +e our own study of +eibo. The core difference between our belie"e they represent anywhere from 1.7% to 16M of the full %ork and +eiboScope is that they track a large sample: around public timeline Gi.e.. we seem to obtain more complete traces 766 thousand users who each ha"e more than 1666 followers, at night, when many of +eibo’s users are sleeping and the allowing them to observe usually no more than 166 deletions posting rate is correspondingly lower). per day. +e follo% a much smaller sample of users, as we will +eibo appears to enforce rate limits both on individual describe shortly.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Reporters Without Borders TV5 Monde Prize 2015 Nominees
    Reporters Without Borders ­ TV5 Monde Prize 2015 Nominees Journalist Category Mahmoud Abou Zeid, aka Shawkan (Egypt) “I am a photojournalist, not a criminal,” Shawkan wrote from Tora prison in February. “My ​ ​ ​ indefinite detention is psychologically unbearable. Not even animals would survive in these conditions." ​ Shawkan is an Egyptian freelance photojournalist who has been in pre­trial detention for more than 760 days. He was arrested on 14 August 2013 while providing the US photojournalism agency Demotix and the US digital media company Corbis with coverage of ​ ​ ​ ​ the violence used to disperse demonstrations by deposed President Mohamed Morsi’s supporters in Rabiaa Al­Awadiya Square. Three journalists were killed that day in connection with their work Aged 28, Shawkan covered developments in Egypt closely from Mubarak’s fall to Morsi’s overthrow and on several occasions obtained striking shots of the popular unrest. His detention became illegal in August of this year because, under Egyptian law, pre­trial detention may surpass two years only in exceptional cases. Few people in Egypt have ever been held pending trial as long as him. A date has finally been set for the start of his trial, 12 December 2015, when he will be prosecuted before a Cairo criminal court along with more than 700 other defendants including members of the Muslim Brotherhood, which was declared a terrorist organization in December 2013. Many charges have been brought against him without any evidence, according to his lawyer, Karim Abdelrady. The most serious include joining a banned organization [the Muslim Brotherhood], murder, attacking the security forces and possession of weapons.
    [Show full text]
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • China's Global Media Footprint
    February 2021 SHARP POWER AND DEMOCRATIC RESILIENCE SERIES China’s Global Media Footprint Democratic Responses to Expanding Authoritarian Influence by Sarah Cook ABOUT THE SHARP POWER AND DEMOCRATIC RESILIENCE SERIES As globalization deepens integration between democracies and autocracies, the compromising effects of sharp power—which impairs free expression, neutralizes independent institutions, and distorts the political environment—have grown apparent across crucial sectors of open societies. The Sharp Power and Democratic Resilience series is an effort to systematically analyze the ways in which leading authoritarian regimes seek to manipulate the political landscape and censor independent expression within democratic settings, and to highlight potential civil society responses. This initiative examines emerging issues in four crucial arenas relating to the integrity and vibrancy of democratic systems: • Challenges to free expression and the integrity of the media and information space • Threats to intellectual inquiry • Contestation over the principles that govern technology • Leverage of state-driven capital for political and often corrosive purposes The present era of authoritarian resurgence is taking place during a protracted global democratic downturn that has degraded the confidence of democracies. The leading authoritarians are ABOUT THE AUTHOR challenging democracy at the level of ideas, principles, and Sarah Cook is research director for China, Hong Kong, and standards, but only one side seems to be seriously competing Taiwan at Freedom House. She directs the China Media in the contest. Bulletin, a monthly digest in English and Chinese providing news and analysis on media freedom developments related Global interdependence has presented complications distinct to China. Cook is the author of several Asian country from those of the Cold War era, which did not afford authoritarian reports for Freedom House’s annual publications, as regimes so many opportunities for action within democracies.
    [Show full text]
  • The Velocity of Censorship
    The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu, Independent Researcher; David Phipps, Bowdoin College; Adam Pridgen, Rice University; Jedidiah R. Crandall, University of New Mexico; Dan S. Wallach, Rice University This paper is included in the Proceedings of the 22nd USENIX Security Symposium. August 14–16, 2013 • Washington, D.C., USA ISBN 978-1-931971-03-4 Open access to the Proceedings of the 22nd USENIX Security Symposium is sponsored by USENIX The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Tao Zhu David Phipps Adam Pridgen [email protected] Computer Science Computer Science Independent Researcher Bowdoin College Rice University Jedidiah R. Crandall Dan S. Wallach Computer Science Computer Science University of New Mexico Rice University Abstract terconnected through their social graph and tend to post about sensitive topics. This biases us towards the content Weibo and other popular Chinese microblogging sites are posted by these particular users, but enables us to mea- well known for exercising internal censorship, to comply sure with high fidelity the speed of the censorship and with Chinese government requirements. This research discern interesting patterns in censor behaviors. seeks to quantify the mechanisms of this censorship: Sina Weibo (weibo.com, referred to in this paper sim- how fast and how comprehensively posts are deleted. ply as “Weibo”) has the most active user community of Our analysis considered 2.38 million posts gathered over any microblog site in China [39]. Weibo provides ser- roughly two months in 2012, with our attention focused vices which are similar to Twitter, with @usernames, on repeatedly visiting “sensitive” users.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Digital Neo-Colonialism: the Chinese Model of Internet Sovereignty in Africa
    AFRICAN HUMAN RIGHTS LAW JOURNAL To cite: W Gravett ‘Digital neo-colonialism: The Chinese model of internet sovereignty in Africa’ (2020) 20 African Human Rights Law Journal 125-146 http://dx.doi.org/10.17159/1996-2096/2020/v20n1a5 Digital neo-colonialism: The Chinese model of internet sovereignty in Africa Willem Gravett* Associate Professor, Faculty of Law, University of Pretoria, South Africa https://orcid.org/0000-0001-7400-0036 Summary: China is making a sustained effort to become a ‘cyber superpower’. An integral part of this effort is the propagation by Beijing of the notion of ‘internet sovereignty’ – China’s supreme right to govern the internet within its borders and keep it under rigid control. Chinese companies work closely with Chinese state authorities to export technology to Africa in order to extend China’s influence and promote its cyberspace governance model. This contribution argues that the rapid expansion across Africa of Chinese technology companies and their products warrants vigilance. If African governments fail to advance their own values and interests – including freedom of expression, free enterprise and the rule of law – with equal boldness, the ‘China model’ of digital governance by default might very well become the ‘Africa model’. Key words: Chinese internet censorship; data surveillance; digital authoritarianism; digital neo-colonialism; global cyber governance; internet sovereignty * BLC LLB (Pretoria) LLM (Notre Dame) LLD (Pretoria); [email protected]. I gratefully acknowledge the very able and
    [Show full text]
  • Congressional-Executive Commission on China
    CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2008 ONE HUNDRED TENTH CONGRESS SECOND SESSION OCTOBER 31, 2008 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 6011 Sfmt 5011 U:\DOCS\45233.TXT DEIDRE 2008 ANNUAL REPORT VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00002 Fmt 6019 Sfmt 6019 U:\DOCS\45233.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2008 ONE HUNDRED TENTH CONGRESS SECOND SESSION OCTOBER 31, 2008 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PRINTING OFFICE ★ 44–748 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 23:54 Nov 06, 2008 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 U:\DOCS\45233.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate SANDER LEVIN, Michigan, Chairman BYRON DORGAN, North Dakota, Co-Chairman MARCY KAPTUR, Ohio MAX BAUCUS, Montana TOM UDALL, New Mexico CARL LEVIN, Michigan MICHAEL M. HONDA, California DIANNE FEINSTEIN, California TIMOTHY J. WALZ, Minnesota SHERROD BROWN, Ohio CHRISTOPHER H. SMITH, New Jersey CHUCK HAGEL, Nebraska EDWARD R. ROYCE, California SAM BROWNBACK, Kansas DONALD A.
    [Show full text]
  • Social Media Overview
    Social Media Overview Presented by Rita Gavelis Technology Trainer / Consultant Facebook • Founded in 2004 • 840+ Million active users • 483 million daily active users logged onto Facebook in December 2011 • People spend over 700 billion minutes per month on Facebook Facebook Personal Accounts Allow you to share thoughts, photos, videos, games, and more with family and friends. Anyone over the age of 13 can create a Facebook account. Personal accounts are meant for individual people, not their pets, businesses, or interests. Facebook Groups Facebook groups are meant for small groups of people who share the same interests. It might be a discussion group focused on knitting, reading, motorcycles, movies, and, well, just about everything. Anyone can create a group. Facebook Pages Pages are meant for businesses, Buildings, Locations, Entertainers, and Artists. Only representatives of the above are allowed to create a page. Creating a Facebook page gives you a bigger web presence. Facebook pages show up in Google searches. Business Pages • Victory Motorcycles • AccountingCoach.com • American Airlines • Zappos • Beverly Hospital These are just a few examples Twitter • Twitter is a micro-blogging service • Founded in 2006 • Over 100 million active users • Over 230 million tweets per day 2 Key Events for Twitter Dec 21, 2008 – Continental Airlines jet veers off runway in Denver. News of the accident was first broadcast by a passenger via twitter. http://twitter.com/#!/2drinksbehind/status/1069832870 Jan 15, 2009 – US Airways flight 1549 made a miracle landing on the Hudson. A commuter on a nearby ferry broadcast the very first image of the plane in the water via Twitpic.
    [Show full text]