Social Networking: a Guide to Strengthening Civil Society Through Social Media
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Study on Social Network Analysis Through Data Mining Techniques – a Detailed Survey
ISSN (Online) 2278-1021 ISSN (Print) 2319-5940 IJARCCE International Journal of Advanced Research in Computer and Communication Engineering ICRITCSA M S Ramaiah Institute of Technology, Bangalore Vol. 5, Special Issue 2, October 2016 A Study on Social Network Analysis through Data Mining Techniques – A detailed Survey Annie Syrien1, M. Hanumanthappa2 Research Scholar, Department of Computer Science and Applications, Bangalore University, India1 Professor, Department of Computer Science and Applications, Bangalore University, India2 Abstract: The paper aims to have a detailed study on data collection, data preprocessing and various methods used in developing a useful algorithms or methodologies on social network analysis in social media. The recent trends and advancements in the big data have led many researchers to focus on social media. Web enabled devices is an another important reason for this advancement, electronic media such as tablets, mobile phones, desktops, laptops and notepads enable the users to actively participate in different social networking systems. Many research has also significantly shows the advantages and challenges that social media has posed to the research world. The principal objective of this paper is to provide an overview of social media research carried out in recent years. Keywords: data mining, social media, big data. I. INTRODUCTION Data mining is an important technique in social media in scrutiny and analysis. In any industry data mining recent years as it is used to help in extraction of lot of technique based reports become the base line for making useful information, whereas this information turns to be an decisions and formulating the decisions. This report important asset to both academia and industries. -
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
Integrating Technology with Student-Centered Learning
integrating technology with student-centered learning A REPORT TO THE NELLIE MAE EDUCATION FOUNDATION Prepared by Babette Moeller & Tim Reitzes | July 2011 www.nmefdn.org 1 acknowledgements We thank the Nellie Mae Education Foundation (NMEF) for the grant that supported the preparation of this report. Special thanks to Eve Goldberg for her guidance and support, and to Beth Miller for comments on an earlier draft of this report. We thank Ilene Kantrov for her contributions to shaping and editing this report, and Loulou Bangura for her help with building and managing a wiki site, which contains many of the papers and other resources that we reviewed (the site can be accessed at: http://nmef.wikispaces.com). We are very grateful for the comments and suggestions from Daniel Light, Shelley Pasnik, and Bill Tally on earlier drafts of this report. And we thank our colleagues from EDC’s Learning and Teaching Division who shared their work, experiences, and insights at a meeting on technology and student-centered learning: Harouna Ba, Carissa Baquarian, Kristen Bjork, Amy Brodesky, June Foster, Vivian Gilfroy, Ilene Kantrov, Daniel Light, Brian Lord, Joyce Malyn-Smith, Sarita Pillai, Suzanne Reynolds-Alpert, Deirdra Searcy, Bob Spielvogel, Tony Streit, Bill Tally, and Barbara Treacy. Babette Moeller & Tim Reitzes (2011) Education Development Center, Inc. (EDC). Integrating Technology with Student-Centered Learning. Quincy, MA: Nellie Mae Education Foundation. ©2011 by The Nellie Mae Education Foundation. All rights reserved. The Nellie Mae Education Foundation 1250 Hancock Street, Suite 205N, Quincy, MA 02169 www.nmefdn.org 3 Not surprising, 43 percent of students feel unprepared to use technology as they look ahead to higher education or their work life. -
Social Media Analytics
MEDIA DEVELOPMENT Social media analytics A practical guidebook for journalists and other media professionals Imprint PUBLISHER EDITORS Deutsche Welle Dr. Dennis Reineck 53110 Bonn Anne-Sophie Suntrop Germany SCREENSHOTS RESPONSIBLE Timo Lüge Carsten von Nahmen Helge Schroers Petra Berner PUBLISHED AUTHOR June 2019 Timo Lüge © DW Akademie MEDIA DEVELOPMENT Social media analytics A practical guidebook for journalists and other media professionals INTRODUCTION Introduction Having a successful online presence is becoming more and In part 2, we will look at some of the basics of social media more important for media outlets all around the world. In analysis. We’ll explore what different social media metrics 2018, 435 million people in Africa had access to the Internet mean and which are the most important. and 191 million of them were using social media.1 Today, Africa is one of the fastest growing regions for Internet access and Part 3 looks briefly at the resources you should have in place social media use. to effectively analyze your online communication. For journalists, this means new and exciting opportunities to Part 4 is the main part of the guide. In this section, we are connect with their › audiences. Passive readers, viewers and looking at Facebook, Twitter, YouTube and WhatsApp and will listeners are increasingly becoming active participants in a show you how to use free analytics tools to find out more dialogue that includes journalists and other community mem- about your communication and your audience. Instagram is bers. At the same time, social media is consuming people’s not covered in this guide because, at the time of writing, only attention: Time that used to be spent listening to the radio very few DW Akademie partners in Africa were active on the is now spent scrolling through Facebook, Twitter, Instagram, platform. -
Beginners and Basics
Beginners & Basics S O C I A L M E D I A 1 0 1 Beginners W E L C O M E T O & Basics T W I T T E R 1 0 1 What is Twitter? Twitter is technically a “micro-blogging service,” allowing users to post and share comments, photos, videos and more. So what does that actually mean? Because it has a 240 character limit (recently bumped up from 140), it’s a place to share brief posts — not paragraphs. Twitter has some unique terminology when referring to specific features. It may be confusing to newbies, so we broke down the basics for you: Twitter Lingo Who Uses It? Tweet: to post With over 330 million monthly active users Retweet: to repost another user’s and 145 million daily active users, Twitter post has a huge influence. Many users are Reply: using the @ to respond to younger, but Twitter’s reach is not just someone’s post millennials and Gen-Z. Direct Message: private chat Hashtag: a symbol (the # sign) that 63% of Twitter users are between the ages categorizes tweets of 35 and 65. While other social media platforms like Snapchat and TikTok are Brands that are killing the Twitter game famous for catering to younger generations, it’s clear that Twitter appeals to a more mature audience as well. 17.7M 13.2M 11.2M 12M Why is it helpful? With such an impressive number of active users, Twitter is one of the best digital marketing tools for businesses. Twitter allows for brands and businesses to engage personally with their consumers. -
Download Download
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media (ICWSM 2021) A Large Open Dataset from the Parler Social Network Max Aliapoulios1, Emmi Bevensee2, Jeremy Blackburn3, Barry Bradlyn4, Emiliano De Cristofaro5, Gianluca Stringhini6, Savvas Zannettou7 1New York University, 2SMAT, 3Binghamton University, 4University of Illinois at Urbana-Champaign, 5University College London, 6Boston University, 7Max Planck Institute for Informatics [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract feasible in technical terms to create a new social media plat- Parler is as an “alternative” social network promoting itself form, but marketing the platform towards specific polarized as a service that allows to “speak freely and express yourself communities is an extremely successful strategy to bootstrap openly, without fear of being deplatformed for your views.” a user base. In other words, there is a subset of users on Twit- Because of this promise, the platform become popular among ter, Facebook, Reddit, etc., that will happily migrate to a new users who were suspended on mainstream social networks platform, especially if it advertises moderation policies that for violating their terms of service, as well as those fearing do not restrict the growth and spread of political polariza- censorship. In particular, the service was endorsed by several tion, conspiracy theories, extremist ideology, hateful and vi- conservative public figures, encouraging people to migrate olent speech, and mis- and dis-information. from traditional social networks. After the storming of the US Capitol on January 6, 2021, Parler has been progressively de- Parler. -
Effectiveness of Dismantling Strategies on Moderated Vs. Unmoderated
www.nature.com/scientificreports OPEN Efectiveness of dismantling strategies on moderated vs. unmoderated online social platforms Oriol Artime1*, Valeria d’Andrea1, Riccardo Gallotti1, Pier Luigi Sacco2,3,4 & Manlio De Domenico 1 Online social networks are the perfect test bed to better understand large-scale human behavior in interacting contexts. Although they are broadly used and studied, little is known about how their terms of service and posting rules afect the way users interact and information spreads. Acknowledging the relation between network connectivity and functionality, we compare the robustness of two diferent online social platforms, Twitter and Gab, with respect to banning, or dismantling, strategies based on the recursive censor of users characterized by social prominence (degree) or intensity of infammatory content (sentiment). We fnd that the moderated (Twitter) vs. unmoderated (Gab) character of the network is not a discriminating factor for intervention efectiveness. We fnd, however, that more complex strategies based upon the combination of topological and content features may be efective for network dismantling. Our results provide useful indications to design better strategies for countervailing the production and dissemination of anti- social content in online social platforms. Online social networks provide a rich laboratory for the analysis of large-scale social interaction and of their social efects1–4. Tey facilitate the inclusive engagement of new actors by removing most barriers to participate in content-sharing platforms characteristic of the pre-digital era5. For this reason, they can be regarded as a social arena for public debate and opinion formation, with potentially positive efects on individual and collective empowerment6. -
The Social Economy
McKinsey Global Institute McKinsey Global Institute The social economy: Unlocking value and productivity through social technologies social through productivity and value Unlocking economy: The social July 2012 The social economy: Unlocking value and productivity through social technologies The McKinsey Global Institute The McKinsey Global Institute (MGI), the business and economics research arm of McKinsey & Company, was established in 1990 to develop a deeper understanding of the evolving global economy. Our goal is to provide leaders in the commercial, public, and social sectors with the facts and insights on which to base management and policy decisions. MGI research combines the disciplines of economics and management, employing the analytical tools of economics with the insights of business leaders. Our “micro-to-macro” methodology examines microeconomic industry trends to better understand the broad macroeconomic forces affecting business strategy and public policy. MGI’s in-depth reports have covered more than 20 countries and 30 industries. Current research focuses on six themes: productivity and growth; the evolution of global financial markets; the economic impact of technology and innovation; urbanization; the future of work; and natural resources. Recent reports have assessed job creation, resource productivity, cities of the future, and the impact of big data. MGI is led by three McKinsey & Company directors: Richard Dobbs, James Manyika, and Charles Roxburgh. Susan Lund serves as director of research. Project teams are led by a group of senior fellows and include consultants from McKinsey’s offices around the world. These teams draw on McKinsey’s global network of partners and industry and management experts. In addition, leading economists, including Nobel laureates, act as research advisers. -
The Notube Beancounter: Aggregating User Data for Television Programme Recommendation
The NoTube BeanCounter: Aggregating User Data for Television Programme Recommendation Chris van Aart1, Lora Aroyo1, Dan Brickley13, Vicky Buser2, Libby Miller2, Michele Minno3, Michele Mostarda3, Davide Palmisano3, Yves Raimond2, Guus Schreiber1, and Ronald Siebes1 1 VU University Amsterdam, the Netherlands 2 BBC - Future Media & Technology, London, UK 3 Asemantics Srl, Rome Italy Abstract. In this paper we present our current experience of aggregat- ing user data from various Social Web applications and outline several key challenges in this area. The work is based on a concrete use case: reusing activity streams to determine a viewer's interests and generating television programme recommendations from these interests. Three sys- tem components are used to realise this goal: (1) an intelligent remote control: iZapper for capturing viewer activities in a cross-context televi- sion environment; (2) a backend: BeanCounter for aggregation of viewer activities from the iZapper and from different social web applications; and (3) a recommendation engine: iTube for recommending relevant tele- vision programmes . The focus of the paper is the BeanCounter as the first step to apply Social Web data for viewer and context modelling on the Web. This is work in progress of the NoTube project4. 1 Introduction: Television Meets the Social Web Television watching has always been a social activity, but as channels and deliv- ery mechanisms multiply, the enablers of social watching - simultaneous broad- cast times for everyone and limited choice - are decreasing[7]. There is a trend towards watching television or using television-related services[1] such as Elec- tronic Programme Guides (EPGs) on PC, handheld or other networked device. -
Obtaining and Using Evidence from Social Networking Sites
U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks. -
Introduction to Online Communities
An Introduction to Online Communities by Helen Baxter Community Manager KnowledgeBoard.com Sift, 100 Victoria Street, Bristol, BS1 6HZ, 0117 915 9600, www.sift.co.uk For more details contact Richard Dennys, [email protected] Introduction by Helen Baxter I have been involved in online communities since 1994, first as a member, then community producer, and am now Community Manager of Knowledgeboard.com, the portal for the EC's Knowledge Management Forum. I have made many great friends over the years through online communities and even 'met' my husband online. I think that the increasing success of online communities stems from the fact that they harness the way that people naturally use the Internet. It is the innate human nature to communicate and build relationships that has driven the development of the Internet as we see it today. Ever since the network was opened up to the academic establishment in the 1970s, 'online' or 'virtual' communities have formed. In real life most communities are formed through geographical proximity, but online communities are mostly formed around a shared interest or need, and are a powerful tool for building trust and relationships, word of mouth marketing, and knowledge acquisition and exchange. This 'Introduction to Online Communities' has been written to give an overview of the different types of online community, what makes an online community, and the various community tools. Every community is unique and it is difficult to give a guaranteed recipe for success, but I will cover common factors found in every good online community. It is also worth remembering that as in real life communities take time to grow, and will continually evolve. -
Awesomeness 01 BE YOU 1
cre 11 Se ts to Awesomeness 01 BE YOU 1 BE YOU It’s easier to run your Twitter account if you can just be yourself. Of course if you are tweeting on behalf of a brand and there are several of you working on managing Twitter, it’s sometimes hard to be a “person” on Twitter. Big brands like Coca-Cola or McDonalds especially can’t realistically expect to have only one person represent their Twitter account. But smaller businesses (like ours - Top Left Design - @topleftdesign) d o benefit from having their REAL name along with their Twitter name. Some examples: www.twitter.com/B3Creative (real name James Marsh) www.twitter.com/StartLicensing (real name Ian Downes) www.twitter.com/Minervity (real name Richard Darell) www.twitter.com/PlainTalkingHR (real name Bina Briggs) www.twitter.com/mashable (real name Pete Cashmore) Or you can have a Twitter name that represents your name or nickname and also have your real name: www.twitter.com/gina_romero (Gina Romero) www.twitter.com/grattongirl (Sarah-Jayne Gratton) www.twitter.com/lorimcneeartist (Lori Mcnee) www.twitter.com/MamaBritt (Britt Michaelian) 02 USE YOUR FACE 2 YOUR PICTURE Your picture should be a cropped picture of your face. No point in having a full length as it shows up as a thumbnail on people’s Twitter feeds, and on their phone apps. So, you want to be recognisable. Also, surveys have shown that people prefer a picture of a face to a logo or a cartoon avatar. 03 DON’T JUST TWEET ABOUT YOURSELF The whole time.