The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not

Total Page:16

File Type:pdf, Size:1020Kb

The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2019 The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not Justin Robert Kinney University of Tennessee, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Recommended Citation Kinney, Justin Robert, "The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not. " PhD diss., University of Tennessee, 2019. https://trace.tennessee.edu/utk_graddiss/5686 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Justin Robert Kinney entitled "The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Political Science. Brandon C. Prins, Major Professor We have read this dissertation and recommend its acceptance: Krista E. Wiegand, Gary Uzonyi, Nicholas W. Geidner Accepted for the Council: Dixie L. Thompson Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) The Social Media Decision: Why Some Terrorist Organizations Choose to Build and Utilize a Social Media Presence and Others Do Not A Dissertation Presented for the Doctor of Philosophy Degree The University of Tennessee, Knoxville Justin Robert Kinney August 2019 ii Copyright (c) 2019 by Justin Robert Kinney All rights reserved. iii Dedication To my Mom and Dad, thank you for all of your love and support. You have always been there for me and encouraged me to aim high, to reach for the stars. You taught me to work hard, to stand up for what’s important in life, to chase my dreams, and to believe in myself. I wouldn’t be half the man I am today without you. To Rebecca, my sister, who always gave me the emotional support and confidence in me that only a sibling can give. I’m so proud of you and feel so blessed to have had you as my sister and best friend throughout my life. And above all, to God be all glory. There’s nothing I could accomplish without Him. iv Acknowledgements Thank you to Dr. Brandon Prins for his guidance and advice through this project. The time and effort he devoted was instrumental in helping me succeed and grow. Thank you also to Dr. Krista Wiegand, Dr. Gary Uzonyi, and Dr. Nicholas Geidner for agreeing to sit on my committee and for your contributions in providing suggestions, advice, and constructive critiques. Without your continued support throughout this program, I would never have succeeded in making it this far. Thank you to my classmates, colleagues, and professors in the Political Science Department. It’s been a real comfort and boost to go through this process alongside all of you. I am extremely grateful for all of your encouragement and assistance, both professionally and personally. Thank you all for making graduate school enjoyable. I wish you the best of luck! Thank you to my friends. Your faith in me and reassurance along the way was very needed and much appreciated. I have grown tremendously these last several years and I have you to thank. There are too many to name individually, but you have become my community and like family. You all keep me grounded and upbeat when I get stressed, with your support, humor, and perspective and for that, I will always be grateful. Finally, thank you again to my family. I would never be in this position without you. v Abstract Traditionally, radicalization was accomplished through isolation from society, in a small, personal, hands-on setting. But today, some groups have embraced social media platforms to reach and radicalize new supporters and recruits. This modern tool is an opportunity to reach more individuals in a manner that is less costly, easier, and less time-consuming. This has opened the process, allowing for both “direct recruiting”, targeting selected individuals, and “indirect recruiting”, loading material online and allowing it to spread to cause a form of self- radicalization in those who encounter it. This would seem beneficial for all rebel groups. If you successfully recruit even a few fighters or supporters through a low-cost process, it would be worthwhile to take advantage of that. Yet, we don’t see this occurring at the rate one would expect from such a low-cost, high-benefit approach. Certain groups—such as the Islamic State— have built an online presence and embraced social media, but others choose not to, or maintain a low presence. This presents a puzzle: which group actors choose to create and use social media as a radicalization and recruitment tool and which do not? What factors or characteristics determine this decision? This research project investigates the usage of social media as a strategic tactic by terrorist groups. We see certain groups embrace the tactic, to varying degrees, and others do not. So what types of groups choose to utilize this tool? Is there some component or trait of groups that can explain and/or predict the choice to create a social media presence? And if they have a presence, is there some component(s) that explains and predicts their level of social media activity? I propose several factors play important roles in this decision: ideological identity, recruitment opportunities through alliance networks, and competition or outbidding behavior spurred by the existence of rival groups. Testable hypotheses are derived from these factors and are tested on a dataset of 25 organizations from 2006 to 2016, then through three case studies on individual groups. The analysis reveals statistically significant support for all three variables and their relationship to social media engagement. vi Table of Contents General Introduction ....................................................................................................................1 Social Media Concerns ................................................................................................................3 Chapter One: Literature ...............................................................................................................7 Introduction ......................................................................................................................7 Terrorism..........................................................................................................................8 History and Context .............................................................................................8 Traditional Methods .........................................................................................................12 Previous Models...................................................................................................12 Traditional Radicalization & Recruitment ...........................................................14 Online Platform Literature ...............................................................................................19 Introduction ..........................................................................................................19 Social Media Purpose & Strategy ........................................................................20 Social Networking & Movements .......................................................................24 Technology Adoption ..........................................................................................26 Social Media Usage by Terrorists ........................................................................29 Conclusion .......................................................................................................................33 Chapter Two: Theory ...................................................................................................................35 The Puzzle ........................................................................................................................35 Identity .............................................................................................................................39 Alliance Networks ...........................................................................................................45 Rivalries ...........................................................................................................................49 Chapter Three: Research Design .................................................................................................55 Introduction ......................................................................................................................55 Group Selection ...............................................................................................................56 Dependent Variables ........................................................................................................59 Independent Variables .....................................................................................................62
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Global Economy, Economic Crisis, and White-Collar Crime
    Contents Volume 9 • Issue 3 • August 2010 SPECIAL ISSUE The Global Economy, Economic Crisis, and White-Collar Crime EDITORIAL INTRODUCTION White-collar crime and the Great Recession .......................................................................429 Neal Shover, Peter Grabosky WALLS OF SECRECY AND SILENCE RESEARCH ARTICLE. Walls of secrecy and silence: The Madoff case ..........................................435 and cartels in the construction industry Henk van de Bunt POLICY ESSAY. Secrecy, silence, and corporate crime reforms ..................................................455 William S. Laufer POLICY ESSAY. Silent or invisible? Governments and corporate financial crimes .....................467 John Minkes POLICY ESSAY. How to effectively get crooks like Bernie Madoff in Dutch .............................475 Henry N. Pontell, Gilbert Geis POLICY ESSAY. Getting our attention .......................................................................................483 Nancy Reichman SERIOUS TAX FRAUD AND NONCOMPLIANCE RESEARCH ARTICLE. Serious tax fraud and noncompliance: A review of evidence ....................493 on the differential impact of criminal and noncriminal proceedings Michael Levi POLICY ESSAY. Criminal prosecution within responsive regulatory practice ............................515 Valerie Braithwaite POLICY ESSAY. Fairness matters—more than deterrence: .........................................................525 Class bias and the limits of deterrence Paul Leighton POLICY ESSAY. Serious tax noncompliance: Motivation
    [Show full text]
  • Pandemic-Safe Research with Online Surveys, Robert Kubinec
    MENA Newsletter: Pandemic-Safe Research with Online Surveys Robert Kubinec Division of Social Sciences New York University Abu Dhabi April 8th, 2021 In this article I argue that a possible silver lining of the COVID-19 pandemic, which has required wrenching changes of the MENA research community (Allam, Buttorff, and Shalaby 2020), is that it has increased awareness of the utility of online survey research. Scholarly research in the MENA region, and developing countries more generally, would benefit over the long term from an increased openness to online-only research designs that reach MENA residents where they increasingly interact with one another: on social media. Separate from the pandemic, online-only research has the added advantage of reducing potential harm to respondents and research assistants, whose online activity within social media sites can only be imperfectly observed by domestic authorities.1 Online Surveys via Social Media Ads I draw, in this article, from my own and my colleagues’ recent experience implementing surveys using Facebook ad targeting. Facebook is probably the most useful social media platform in the MENA region as its usage vastly exceeds the scope of other popular social media platforms.2 The lack of censorship of Facebook by MENA countries, even in highly authoritarian regimes, makes it an attractive means to reach residents directly. Facebook usage in the region, reaching 74 percent of all internet users according to the Arab Barometer’s most recent data, has yet to peak (Wee and Li 2019, 7). In addition,
    [Show full text]
  • Filtering Practices of Social Media Platforms Hearing
    FILTERING PRACTICES OF SOCIAL MEDIA PLATFORMS HEARING BEFORE THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION APRIL 26, 2018 Serial No. 115–56 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 32–930 WASHINGTON : 2018 VerDate Sep 11 2014 23:54 Nov 28, 2018 Jkt 032930 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HR\OC\A930.XXX A930 SSpencer on DSKBBXCHB2PROD with HEARINGS COMMITTEE ON THE JUDICIARY BOB GOODLATTE, Virginia, Chairman F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ZOE LOFGREN, California LAMAR SMITH, Texas SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio STEVE COHEN, Tennessee DARRELL E. ISSA, California HENRY C. ‘‘HANK’’ JOHNSON, JR., Georgia STEVE KING, Iowa THEODORE E. DEUTCH, Florida LOUIE GOHMERT, Texas LUIS V. GUTIE´ RREZ, Illinois JIM JORDAN, Ohio KAREN BASS, California TED POE, Texas CEDRIC L. RICHMOND, Louisiana TOM MARINO, Pennsylvania HAKEEM S. JEFFRIES, New York TREY GOWDY, South Carolina DAVID CICILLINE, Rhode Island RAU´ L LABRADOR, Idaho ERIC SWALWELL, California BLAKE FARENTHOLD, Texas TED LIEU, California DOUG COLLINS, Georgia JAMIE RASKIN, Maryland KEN BUCK, Colorado PRAMILA JAYAPAL, Washington JOHN RATCLIFFE, Texas BRAD SCHNEIDER, Illinois MARTHA ROBY, Alabama VALDEZ VENITA ‘‘VAL’’ DEMINGS, Florida MATT GAETZ, Florida MIKE JOHNSON, Louisiana ANDY BIGGS, Arizona JOHN RUTHERFORD, Florida KAREN HANDEL, Georgia KEITH ROTHFUS, Pennsylvania SHELLEY HUSBAND, Chief of Staff and General Counsel PERRY APELBAUM, Minority Staff Director and Chief Counsel (II) VerDate Sep 11 2014 23:54 Nov 28, 2018 Jkt 032930 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 E:\HR\OC\A930.XXX A930 SSpencer on DSKBBXCHB2PROD with HEARINGS C O N T E N T S APRIL 26, 2018 OPENING STATEMENTS Page The Honorable Bob Goodlatte, Virginia, Chairman, Committee on the Judici- ary ........................................................................................................................
    [Show full text]
  • The Chinese Organic Market: Challenges and Opportunities for European Companies
    UNIVERSITE CATHOLIQUE DE LOUVAIN LOUVAIN SCHOOL OF MANAGEMENT The Chinese Organic Market: Challenges and Opportunities for European Companies Academic Director: Research Master’s Thesis Jean-Christophe Defraigne Submitted by Roxane de Callataÿ With a view of getting a Master’s degree in Business Engineering and International Management ACADEMIC YEAR 2015-2016 II Abstract This thesis aims at guiding European companies in their conquest of the Chinese organic market. It covers an in-depth analysis of the marketplace and an extensive literature review of its consumers with a view to providing insights into the attitudes of Chinese organic consumers, their preferences and purchase behaviours. To complement theory, the case of Belvas SA, a Belgian manufacturer of organic fair-trade chocolate based in Ghislenghien (Hainaut), is meant to support and illustrate the problematic. Furthermore, a field research, structured around four specific research questions related to the mind-set of Chinese consumers, has been conducted in Beijing throughout June 2016 to present a comprehensive picture of the current habits and beliefs in China. To sum up, this thesis builds further on the current international business knowledge of the Chinese organic market, and is interesting for European companies willing to export organic food to China since concrete recommendations are given on how to address this particular market. Key words: Organic Food – Chinese Consumers – Recommendations for Export – Business in China III My thesis provided me with a wonderful opportunity
    [Show full text]
  • Cultural Adaptation and Maintenance: Chinese International Students' Use of Facebook and Wechat Mengni Wang University of South Florida, [email protected]
    University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School March 2018 Cultural Adaptation and Maintenance: Chinese International Students' Use of Facebook and WeChat Mengni Wang University of South Florida, [email protected] Follow this and additional works at: http://scholarcommons.usf.edu/etd Part of the Communication Commons Scholar Commons Citation Wang, Mengni, "Cultural Adaptation and Maintenance: Chinese International Students' Use of Facebook and WeChat" (2018). Graduate Theses and Dissertations. http://scholarcommons.usf.edu/etd/7242 This Thesis is brought to you for free and open access by the Graduate School at Scholar Commons. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Cultural Adaptation and Maintenance: Chinese International Students’ Use of Facebook and WeChat by Mengni Wang A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts School of Mass Communications College of Arts and Sciences University of South Florida Major Professor: Scott Liu, Ph.D. Roxanne Watson, Ph.D. Artemio Ramirez, Jr., Ph.D. Date of Approval: March 21, 2018 Keywords: Facebook, WeChat, adaptation, maintenance and culture Copyright © 2018, Mengni Wang Acknowledgements There is never enough gratitude to my committee for their encouragement and guidance: Dr. Roxanne Watson, Dr. Artemio Ramirez and my committee chair Dr. Scott Liu. I express deeply my sincere gratitude to all my professors who help me to conquer the most difficulties in my thesis. Because of their trust and support, I achieved a lot of opportunities to explore and dig into in my interesting field.
    [Show full text]
  • Do Algorithms Have Cosmopolitics? a Discussion Based on Facebook's Nudity Policy
    Selected Papers of #AoIR2017: The 18th Annual Conference of the Association of Internet Researchers Tartu, Estonia / 18-21 October 2017 DO ALGORITHMS HAVE COSMOPOLITICS? A DISCUSSION BASED ON FACEBOOK'S NUDITY POLICY Amanda Jurno Communication Studies Graduate Program, Federal University of Minas Gerais (UFMG), Brazil Carlos d’Andréa Communication Studies Graduate Program, Federal University of Minas Gerais (UFMG), Brazil. Visiting scholar at the University of Amsterdam (2017-2018) Sociotechnical mediators that have an increasingly influence in digital platforms, the algorithms construct and implement regimes of power and knowledge (Kitchin, 2014). Although there is a strong institutional effort held by Facebook and other platforms to present them as “reliable sociotechnical actors” (Gillespie, 2014), frequent controversies around the agencies of the algorithms have been highlighting the importance of discussing their ethical and political implications. In this context, it seems pertinent to remeMber an issue - and a provocation - pointed by Langdon Winner (1986). By asking “Do the artifacts have politics?”, this author calls for attention to the specific forms of power and authority incorporated by technological innovations. Dialoguing with this perspective, Introna (2016, p.18) points that the algorithms "more or less enact important value choices, made implicitly or explicitly, by those who build them and implement them, which may have significant implications for those that draw upon them in their daily practices". One of the most
    [Show full text]
  • Opinions and Behavior of Students in Social Aspects of Internet Use in Serbia and Slovenia
    Originalni naučni rad Škola biznisa Broj 1/2014 UDC 378-053.81:[004.738.5:316(497.11+497.4) DOI 10.5937/skolbiz1-5993 OPINIONS AND BEHAVIOR OF STUDENTS IN SOCIAL ASPECTS OF INTERNET USE IN SERBIA AND SLOVENIA Borislav Jošanov*, Novi Sad Business School, Novi Sad Andreja Pucihar, University of Maribor, Faculty of Organizational Sciences, Kranj Ivana Jošanov–Vrgović, Modern Business School, Belgrade Abstract: Rapid involvement of Internet infrastructure and services brought a lot of new products based on information and communication technologies. In the focus of world’s social interest at this time are social networks and WikiLeaks and their abuse. In this paper authors analyze opinions and behaviour of students at Novi Sad Business School, Serbia, and Faculty of Organizational Sciences in Kranj, Slovenia. This research focuses on different kinds of abuse of social networks and WikiLeaks. Results are presented and analyzed according to the place where examinees study. Conclusions about the differencies found between the above-mentioned two groups are compared to the social states and events in these 2 countries which oficially separated 25 years ago. Key words: social networks, WikiLeaks, abuse, students, Slovenia, Serbia, cross- cultural. JEL classification: D83 STAVOVI I PONAŠANJE STUDENATA O SOCIJALNIM ASPEKTIMA KORIŠĆENJA INTERNETA U SRBIJI I SLOVENIJI Sažetak: Brzi razvoj infrastrukture Interneta i usluga doneo je više novih proizvoda zasnovanih na informacionim i komunikacionim tehnologijama. U centru pažnje opštih interesa u savremenom svetu su društvene mreže i Vikiliks, kao i njihove zloupotrebe. U ovom radu autori analiziraju stavove i ponašanja studenata Visoke poslovne škole strukovnih studija iz Novog Sada, Srbija i Fakulteta organizacionih nauka iz Kranja, Slovenija.
    [Show full text]
  • 25 Years of Sharing God's Love in the Middle East And
    SAT-7@25 1 News from SAT-7 May 2021 INSIGHT 25 YEARS OF SHARING GOD’S LOVE IN THE MIDDLE EAST AND NORTH AFRICA SAT-7@25 3 SAT-7@25: CHANGING LIVES IN A DIGITAL WORLD A greeting from Rita El-Mounayer, SAT-7 CEO This year, SAT-7 marks 25 years since our first-ever we heard at Open Studios – the stories we, inside broadcast on 31 May 1996. It is such an honour the ministry, hear every day – show just what a to lead this ministry as it marks this significant radical difference His love makes in people’s lives. milestone. I became CEO two years ago after serving in SAT-7 for more than two decades, and The Middle East and North Africa remains in I have witnessed first-hand how much we have to great need of God’s love today. The pandemic has be thankful for. Most of all, I am thankful for worsened many of the issues Middle Easterners God’s faithfulness and grace in bringing His face, and the road to recovery will be long. They will ministry this far. need God’s hope, and SAT-7 will be there to share the love and grace we have in Him. SAT-7 was a trailblazer 25 years ago, when we launched the first Christian satellite channel in the I am excited to share more about the impact Middle East and North Africa, and at 25, we are SAT-7 is having in our key mission priority areas, trailblazing again. In this anniversary year, we have and our pioneering new developments, in this launched SAT-7 PLUS – the region’s first Christian special SAT-7@25 edition of our magazine.
    [Show full text]
  • Cultural Influences Impact Social Networking on Chinese Students Studying in the United States Alethea Schepperly Union College - Schenectady, NY
    Union College Union | Digital Works Honors Theses Student Work 6-2012 Cultural Influences Impact Social Networking on Chinese Students Studying in the United States Alethea Schepperly Union College - Schenectady, NY Follow this and additional works at: https://digitalworks.union.edu/theses Part of the Chinese Studies Commons, Social and Cultural Anthropology Commons, and the Social Media Commons Recommended Citation Schepperly, Alethea, "Cultural Influences Impact Social Networking on Chinese Students Studying in the United States" (2012). Honors Theses. 895. https://digitalworks.union.edu/theses/895 This Open Access is brought to you for free and open access by the Student Work at Union | Digital Works. It has been accepted for inclusion in Honors Theses by an authorized administrator of Union | Digital Works. For more information, please contact [email protected]. Cultural Influences Impact Social Networking on Chinese Students Studying inthe United States Alethea Schepperly ********* Submitted in partial fulfillment Of the requirements for Honors in the Department of Asian Studies UNION COLLEGE June 2012 Alethea Schepperly Senior Project Winter Term 2012 Cultural Influences Impact Social Networking on Chinese Students Studying in the United States INTRODUCTION It is widely agreed that social networking is one of the most popular methods of communication in today’s world. One of the world’s most prevalent and popular social networking sites (hereinafter SNS) is Facebook; “Facebook holds about 130 million active users, and it is the fourth most trafficked website in the world” 1. According to Mike Sachoff and a new survey from Prompt Communications, “Facebook is now the most popular communication tool, followed by SMS and email.2 ” “Facebook, Inc.
    [Show full text]
  • The Future of Mobile Social Media in China
    The Future of Mobile Social Media in China: Empower or Control by Huanhuan Bi Bi 2 Abstratct China, the most populated country in the world, has blocked all the global social media services, and this attracted many scholars to study what are happening in China. I use Sina Weibo, the Chinese version of Twitter, to study the political power of social media in this country and conclude that mobile social media do empower the Chinese citizens and make the Chinese society more transparent. Bi 3 Table of Contents Chapter 1: Introduction Chapter 2: Background Chapter 3: Literature Review Chapter 4: Research Design Chapter 5: Data Analysis, Discussions, and Case Study Chapter 6: Conclusions and Recommendations Bi 4 Chapter 1: Introduction Siri: “What can I do for you?” Penny: “Find me the best Chinese food restaurant near Campus Drive.” Siri: “I don’t like the word ‘best’; it’s superficial. I suggest you some popular restaurants…” Jim: “Siri sucks try Yelp, buddy.” … Ten minutes later, we go to the Shanghai café. Half an hour passed, and food is served. “Hey, looks great!” “Wait a minute, let me take a picture.” “Me too!” Everybody takes out iPhone; shoot; upload it on Facebook. What? An airplane missed! Then all check Twitter. No one knows what is happening. OK, let us try New York Times; they should do the journalist job. Everyone is looking at the mobile. “Could we have human being interactions or just eat?” Welcome to the messy world of social media. Today, nearly everyone uses social media, talks social media, no matter what one’s favorite platform is, and we are overwhelmed by social media.
    [Show full text]
  • Censorship Addendum for Advertising-Based Measurement: a Platform of 7 Billion Mobile Devices
    Censorship Addendum for Advertising-based Measurement: A Platform of 7 Billion Mobile Devices Mark D. Corner, Brian N. Levine, Omar Ismail, and Angela Upreti College of Information and Computer Sciences University of Massachusetts Amherst, MA, USA mcorner,levine,oismail,[email protected] July 24, 2017 APPENDIX Given the controversial nature of studying censorship, we had to remove the following information from our submission to MobiCom [4]. We received negative feed- back from the MobiSys program committee on this issue and felt that it was not worth the risk in having it re- Figure 1: The 88×88 image we retrieved from youtube, blocked in China and Iran. jected at MobiCom. We disagree with the conclusion reached by the MobiSys TPC and in particular we do not believe that the non-interrogative nature of TPC is the best place to evaluate human subjects concerns. ernment may block or tamper with images or data re- You are welcome to cite this work separately from the quested by the browser. In addition, page access is ruled MobiCom paper. by the same-origin policy, which is a rule applied by all Before conducting the research described here, we browsers disallowing a script coming from one domain sought and obtained the consent of our own Institu- from requesting data from other domains. tional Review Board (IRB) under protocol numbers 2016- One of the rare exceptions to same-origin is that HTML 3112 and 2016-3141. Before starting the censorship image tags for arbitrary domains can be placed in a doc- study we sought additional IRB approval, as similar ument, though the script cannot access the contents of measurements taken from a website have been consid- those images.
    [Show full text]