TREND ANALYSIS on TWITTER Tejal Rathod1, Prof

Total Page:16

File Type:pdf, Size:1020Kb

TREND ANALYSIS on TWITTER Tejal Rathod1, Prof TREND ANALYSIS ON TWITTER Tejal Rathod1, Prof. Mehul Barot2 1Research Scholar, Computer Department, LDRP-ITR, Gandhinagar Kadi Sarva Vishvavidhyalaya 2Assistant Prof. Computer Engineering Department, LDRP-ITR, Gandhinagar Abstract Twitter has standard syntax which listed follow: Twitter is most popular social media that . User Mentions: when a user mentions allows its user to spread and share another user in their tweet, @-sign is placed information. It Monitors their user postings before the corresponding username. Like @ and detect most discussed topic of the Username movement. They publish these topics on the . Retweets: Re-share of a tweet posted by list called “Trending Topics”. It show what is another user is called retweet. i.e., a retweet happening in the world and what people's means the user considers that the message in opinions are about it. For that it uses top 10 the tweet might be of interest to others. trending topic list. Twitter Use Method which When a user retweets, the new tweet copies provides efficient way to immediately and the original one in it. accurately categorize trending topics without . Replies: when a user wants to direct to need of external data. We can use different another user, or reply to an earlier tweet, Techniques as well as many algorithms for they place the @username mention at the trending topics meaning disambiguation and beginning of the tweet, e.g., @username I classify that topic in different category. totally agree with you. Among many methods there is no standard . Hashtags: Hashtags included in a tweet tend method which gave accuracy so comparative to group tweets in conversations or analysis is needed to understand which one is represent the main terms of the tweet, better and gave quality of the detected topic. usually referred to topics or common Keywords: Information Retrieval, social interests of a community. It is differentiated media, Twitter, Twitter Trending Topic, from the rest of the terms in the tweet in that Topic Detection, Text mining, Trend analysis, it has a leading hash, e.g., #hashtag. Real time. Trending Topic: I. INTRODUCTION As we know twitter allow user to spread Twitter has become a huge social media service and share information. It monitor on its user’s where millions of users contribute on a daily activity their postings and find out most basis. It exchange wide variety of local and real discussed topic of the movement which is called world event. Short text messages post by user “Trending Topics”. Trend shows what people which is called “Tweets”. Tweets are limited by are talking about and their opinion about 140 character in length and it can be viewed by particular topic. user’s follower. Twitter has two features: Trend show the list of the topics which are immediately popular rather than topics which . The shortness of tweets, which cannot go have been popular on daily basis. Trending topic beyond 140 characters, it facilitates consist short phrases, keyword and hashtags. To Creation and sharing of messages in a few find out trending topic there must be needed Real seconds time data. To handle real time data is the . Easiness of spreading message to a large complex task in information retrieval. Twitter number of user with in little time. ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-6, 2017 129 INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR) handle real time data, analyze that data then by topic. Like #MondayMotivation and Appling machine learning techniques it find out #MotivationMonday may be represented by trending topics. It use many techniques and #MondayMotivation. algorithms. We can choose to see trends that are not tailored for you by selecting a specific trends location on Example of Trending Topic: twitter.com, iOS, Android. Location trends popular topics among people in a specific geographic location. Event Detection and Extraction in Twitter: Fig 2 Trend Detection Methods [1] Fig 1 Trending topic list 1) Latent Dirichlet Allocation (LDA): Topic II. LITERATURE SURVEY extraction in textual corpora can be addressed Trend analysis is based on prediction by the Real through probabilistic topic models. In general, a time events. To monitor and detect all these topic model is a Bayesian model that associates aspects in real time, we need to extract relevant with each document a probability Distribution information from the continuous stream of data over topics, which are in turn distributions over originating from such online sources. There are a words. LDA [9] is the best known and most wide variety of methods and algorithms they widely used topic model. According to LDA, greatly affect the quality of results. Sampling every document is considered as a bag of terms, procedure and the pre-processing of the data all which are the only observed variables in the greatly affect the quality of detected topics, model. The topic distribution per document and which also depends on the type of detection the term distribution per topic are instead hidden method used [1]. and have to be estimated through Bayesian inference. We use the Collapsed Variation III. TOPIC DETECION FORM TWITTER Bayesian inference algorithm [10], an LDA How Trend Determine? variant that is computationally efficient, more Trend are determined by an algorithm and by accurate than standard variation Bayesian default are tailored for you based on who you inference for LDA, and has parallel follow, your interests, and your location. This implementations already available in Apache algorithms identifies topics that are popular now, Mahout 1. LDA requires the expected number of rather than topics that have been popular for a topics as input and in our evaluation we explore while or on a daily basis, to help you discover the the quality of the topic for different values of. hottest emerging topics of discussion on twitter. The estimation of the optimal, although possible through the use of non-parametric methods [11]. The Number of Tweets that are related to the Trends is just one of the factor the algorithm 2) Document-Pivot Topic Detection (Doc-p): It looks at when ranking and determining trends. is Topic Detection and Tracking method that Algorithmically, trends and hashtags are uses a document-pivot approach. It uses LSH to grouped together if they are related to the same rapidly retrieve the nearest neighbour of a ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-4, ISSUE-6, 2017 130 INTERNATIONAL JOURNAL OF CURRENT ENGINEERING AND SCIENTIFIC RESEARCH (IJCESR) document and accelerate the clustering task. The partitioned clustering algorithm and would principle behind this method is the same used for effectively provide an explicit link between the near-duplicate detection in the similarity- topics. We select the terms to be clustered, out of based aggregation step of the pre-processing the set of terms present in the corpus, using the phase. approach in [15]. It uses an independent reference corpus consisting of randomly Work as follow: collected tweets. For each of the terms in the . Perform online clustering of posts: reference corpus, the likelihood of appearance p Compute the cosine similarity of the tf- (w|corpus) is estimated as follows: idf[13] representation of an incoming post to all other posts processed so far. If the similarity to the best matching post is ……… (2) above some threshold θtf-idf, assign the item to the same cluster as its best match; Where, Nw is the number of otherwise create a new cluster with the new appearances of term in the corpus, n is the post as its only item. The best matching number of term types appearing in the corpus, δ tweet is efficiently retrieved by LSH. is a small constant that is included to regularize . Filter out clusters with item count smaller the probability estimate [15]. than. For each cluster , compute a score as To determine the most important terms in the follows: new corpus, we compute the ratio of the likelihoods of appearance in the two corpora for each term. That is, we compute: ..……… (1) Where wij is the th term appearing in the ith ………… (3) document of the cluster [11] The terms with the highest ratio will be the ones The merit of using LSH is that it can with significantly higher than usual frequency of rapidly provide the nearest neighbours with appearance and it is expected that they are related respect to cosine similarity in a large collection to the most actively discussed topics in the of documents. An alternative would be to use corpus. Once the high-ranking terms are inverted indices on the terms that appear in the selected, a term graph is constructed and the tweets and then compute the cosine similarity SCAN graph-based clustering algorithm is between the incoming document and the set of applied to extract groups of terms, each of which documents that have significant term overlap is considered to be a distinct topic. with it. The use of LSH is much more efficient as it can directly provide the nearest neighbours The algorithm steps are the following: with respect to cosine similarity. Selection: The top terms are selected using the ratio of likelihoods and a node 3) Graph-Based Feature-Pivot Topic Detection: for each of them is created in the graph This method has unique feature is that for the G. feature clustering step it uses the Structural . Linking: The nodes of G are connected Clustering Algorithm for Networks (SCAN) using a term linking strategy. First, a [14]. A property of SCAN is that apart from similarity measure for pairs of terms is detecting communities of nodes, it provides a list selected and then all pairwise similarities of hubs, each of which may be connected to a set are computed.
Recommended publications
  • Social Media Events
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2018 Social Media Events Katerina Girginova University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Communication Commons Recommended Citation Girginova, Katerina, "Social Media Events" (2018). Publicly Accessible Penn Dissertations. 3446. https://repository.upenn.edu/edissertations/3446 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/3446 For more information, please contact [email protected]. Social Media Events Abstract Audiences are at the heart of every media event. They provide legitimation, revenue and content and yet, very few studies systematically engage with their roles from a communication perspective. This dissertation strives to fill precisely this gap in knowledge by asking how do social media audiences participate in global events? What factors motivate and shape their participation? What cultural differences emerge in content creation and how can we use the perspectives of global audiences to better understand media events and vice versa? To answer these questions, this dissertation takes a social-constructivist perspective and a multiple-method case study approach rooted in discourse analysis. It explores the ways in which global audiences are imagined and invited to participate in media events. Furthermore, it investigates how and why audiences actually make use of that invitation via an analytical framework I elaborate called architectures of participation (O’Reilly, 2004). This dissertation inverts the predominant top-down scholarly gaze upon media events – a genre of perpetual social importance – to present a much needed bottom-up intervention in media events literature. It also provides a more nuanced understanding of what it means to be a member of ‘the audience’ in a social media age, and further advances Dayan and Katz’ (1992) foundational media events theory.
    [Show full text]
  • THE ESSENTIAL SOCIAL MEDIA RESOURCE GUIDE Everything You Ever Wanted to Know About Pinterest, Linkedin, Google+, Twitter, and Facebook
    THE ESSENTIAL SOCIAL MEDIA RESOURCE GUIDE Everything you ever wanted to know about Pinterest, LinkedIn, Google+, Twitter, and Facebook. And then a whole lot more. Copyright © 2016 | Act-On Software www.Act-On.com Your Guide to a Successful Social Media Program If you’re like most people, you’ve spent a good amount of time reading blog posts, downloading eBooks and sharing information about social media so you can get a deeper understanding of it. There’s a lot of information out there – in fact, it may seem as though every time you start your computer, there’s yet more information that you need to digest and understand. The problem is that there’s no simple, easy-to-understand guide that provides a roadmap for setting up, launching, and managing an effective social media program. Oh, sure, there’s plenty of information, but information is useless unless it’s laid out in a clear, action- oriented format. That’s why we created this guide. You’ll get tips on getting started, an overview of advertising opportunities, how to track and measure your social campaigns, insider tips, and common mistakes to avoid. You’ll learn everything you need to know about the most popular social media 11k platforms and more. In the end, our goal is quite simple – we want to provide you with the + tools and techniques you need to run a successful social media program, SHARE actionable information that you can implement right away, and a straightforward, easy-to-use reference guide you can use as you run and manage your social campaigns.
    [Show full text]
  • An Unprecedented Global Communications Campaign for the Event Horizon Telescope First Black Hole Image
    An Unprecedented Global Communications Campaign Best for the Event Horizon Telescope First Black Hole Image Practice Lars Lindberg Christensen Colin Hunter Eduardo Ros European Southern Observatory Perimeter Institute for Theoretical Physics Max-Planck Institute für Radioastronomie [email protected] [email protected] [email protected] Mislav Baloković Katharina Königstein Oana Sandu Center for Astrophysics | Harvard & Radboud University European Southern Observatory Smithsonian [email protected] [email protected] [email protected] Sarah Leach Calum Turner Mei-Yin Chou European Southern Observatory European Southern Observatory Academia Sinica Institute of Astronomy and [email protected] [email protected] Astrophysics [email protected] Nicolás Lira Megan Watzke Joint ALMA Observatory Center for Astrophysics | Harvard & Suanna Crowley [email protected] Smithsonian HeadFort Consulting, LLC [email protected] [email protected] Mariya Lyubenova European Southern Observatory Karin Zacher Peter Edmonds [email protected] Institut de Radioastronomie de Millimétrique Center for Astrophysics | Harvard & [email protected] Smithsonian Satoki Matsushita [email protected] Academia Sinica Institute of Astronomy and Astrophysics Valeria Foncea [email protected] Joint ALMA Observatory [email protected] Harriet Parsons East Asian Observatory Masaaki Hiramatsu [email protected] Keywords National Astronomical Observatory of Japan Event Horizon Telescope, media relations, [email protected] black holes An unprecedented coordinated campaign for the promotion and dissemination of the first black hole image obtained by the Event Horizon Telescope (EHT) collaboration was prepared in a period spanning more than six months prior to the publication of this result on 10 April 2019.
    [Show full text]
  • The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right
    The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right Jacob Davey Julia Ebner About this paper About the authors This report maps the ecosystem of the burgeoning Jacob Davey is a Researcher and Project Coordinator at ‘new’ extreme right across Europe and the US, which is the Institute for Strategic Dialogue (ISD), overseeing the characterised by its international outlook, technological development and delivery of a range of online counter- sophistication, and overtures to groups outside of the extremism initiatives. His research interests include the traditional recruitment pool for the extreme-right. This role of communications technologies in intercommunal movement is marked by its opportunistic pragmatism, conflict, the use of internet culture in information seeing movements which hold seemingly contradictory operations, and the extreme-right globally. He has ideologies share a bed for the sake of achieving provided commentary on the extreme right in a range common goals. It examines points of connectivity of media sources including The Guardian, The New York and collaboration between disparate groups and Times and the BBC. assesses the interplay between different extreme-right movements, key influencers and subcultures both Julia Ebner is a Research Fellow at the Institute for online and offline. Strategic Dialogue (ISD) and author of The Rage: The Vicious Circle of Islamist and Far-Right Extremism. Her research focuses on extreme right-wing mobilisation strategies, cumulative extremism and European terrorism prevention initiatives. She advises policy makers and tech industry leaders, regularly writes for The Guardian and The Independent and provides commentary on broadcast media, including the BBC and CNN. © ISD, 2017 London Washington DC Beirut Toronto This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged.
    [Show full text]
  • Online Hate Network Spreads Malicious COVID-19 Content
    www.nature.com/scientificreports OPEN Online hate network spreads malicious COVID‑19 content outside the control of individual social media platforms N. Velásquez1,2, R. Leahy1,2, N. Johnson Restrepo1,2, Y. Lupu2,4, R. Sear5, N. Gabriel3, O. K. Jha3, B. Goldberg6 & N. F. Johnson1,2,3* We show that malicious COVID‑19 content, including racism, disinformation, and misinformation, exploits the multiverse of online hate to spread quickly beyond the control of any individual social media platform. We provide a frst mapping of the online hate network across six major social media platforms. We demonstrate how malicious content can travel across this network in ways that subvert platform moderation eforts. Machine learning topic analysis shows quantitatively how online hate communities are sharpening COVID‑19 as a weapon, with topics evolving rapidly and content becoming increasingly coherent. Based on mathematical modeling, we provide predictions of how changes to content moderation policies can slow the spread of malicious content. In addition to its health and economic efects, the COVID-19 pandemic is playing out across the world’s online platforms1–4. While limiting the spread of infection through social distancing, isolation has led to a surge in social media use and heightened individuals’ exposure to increasingly virulent online misinformation. Users share misinformation about prevention and treatment, making it difcult for individuals to tell science from fction. As individuals react emotionally in their online posts to the growing death toll and economic peril 5, online extremists are rebranding their conspiracy theories around current events to draw in new followers 6. Tis growth in hateful online activity may have contributed to recent attacks against vulnerable communities and government crisis responders7–9.
    [Show full text]
  • Green Tweets
    twitter_praise_page Page i Thursday, March 12, 2009 12:35 PM Praise for Twitter API: Up and Running “Twitter API: Up and Running is a friendly, accessible introduction to the Twitter API. Even beginning web developers can have a working Twitter project before they know it. Sit down with this book for a weekend and you’re on your way to Twitter API mastery.” — Alex Payne, Twitter API lead “This book rocks! I would have loved to have had this kind of support when I initially created TwitDir.” — Laurent Pantanacce, creator of TwitDir “Twitter API: Up and Running is a very comprehensive and useful resource—any developer will feel the urge to code a Twitter-related application right after finishing the book!” — The Lollicode team, creators of Twitscoop “A truly comprehensive resource for anyone who wants to get started with developing applications around the Twitter platform.” — David Troy, developer of Twittervision “An exceptionally detailed look at Twitter from the developer’s perspective, including useful and functional sample code!” — Damon Cortesi, creator of TweetStats, TweepSearch, and TweetSum “This book is more than just a great technical resource for the Twitter API. It also provides a ton of insight into the Twitter culture and the current landscape of apps. It’s perfect for anyone looking to start building web applications that integrate with Twitter.” — Matt Gillooly, lead developer of Twalala “A wonderful account of the rich ecosystem surrounding Twitter’s API. This book gives you the insight and techniques needed to craft your own tools for this rapidly expanding social network.” — Craig Hockenberry, developer of Twitterrific twitter_praise_page Page ii Thursday, March 12, 2009 12:35 PM Twitter API: Up and Running Twitter API: Up and Running Kevin Makice Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Twitter API: Up and Running by Kevin Makice Copyright © 2009 Kevin Makice.
    [Show full text]
  • Breaking Television News: Is Social Media Coverage You Can Count On?
    University of the Incarnate Word The Athenaeum Theses & Dissertations 5-2016 Breaking Television News: Is Social Media Coverage You Can Count On? Eileen Canosa Teves University of the Incarnate Word, [email protected] Follow this and additional works at: https://athenaeum.uiw.edu/uiw_etds Part of the Business Administration, Management, and Operations Commons, and the Journalism Studies Commons Recommended Citation Teves, Eileen Canosa, "Breaking Television News: Is Social Media Coverage You Can Count On?" (2016). Theses & Dissertations. 7. https://athenaeum.uiw.edu/uiw_etds/7 This Dissertation is brought to you for free and open access by The Athenaeum. It has been accepted for inclusion in Theses & Dissertations by an authorized administrator of The Athenaeum. For more information, please contact [email protected]. BREAKING TELEVISION NEWS: IS SOCIAL MEDIA COVERAGE YOU CAN COUNT ON? by EILEEN C. TEVES A DISSERTATION Presented to the Faculty of the University of the Incarnate Word in partial fulfillment of the requirements for the degree of DOCTOR OF BUSINESS ADMINISTRATION UNIVERSITY OF THE INCARNATE WORD May 2016 ii Copyright by Eileen C. Teves 2016 iii ACKNOWLEDGMENTS The Doctor of Business Administration program has been a very rewarding experience. I am honored to be a part of history at the University of the Incarnate Word H-E-B School of Business & Administration, as the first graduate in the inaugural DBA program. I am grateful for everyone who has helped me reach this point of my destination. I want to first thank the participants involved in this study. Their involvement enabled me to insert the last piece of the puzzle, and possibly help launch innovative solutions in improving our industry.
    [Show full text]
  • Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS
    Media Manipulation and Disinformation Online Alice Marwick and Rebecca Lewis CONTENTS Executive Summary ....................................................... 1 What Techniques Do Media Manipulators Use? ....... 33 Understanding Media Manipulation ............................ 2 Participatory Culture ........................................... 33 Who is Manipulating the Media? ................................. 4 Networks ............................................................. 34 Internet Trolls ......................................................... 4 Memes ................................................................. 35 Gamergaters .......................................................... 7 Bots ...................................................................... 36 Hate Groups and Ideologues ............................... 9 Strategic Amplification and Framing ................. 38 The Alt-Right ................................................... 9 Why is the Media Vulnerable? .................................... 40 The Manosphere .......................................... 13 Lack of Trust in Media ......................................... 40 Conspiracy Theorists ........................................... 17 Decline of Local News ........................................ 41 Influencers............................................................ 20 The Attention Economy ...................................... 42 Hyper-Partisan News Outlets ............................. 21 What are the Outcomes? ..........................................
    [Show full text]
  • Listen Well on Twitter
    ★★★★★★★ ★★★★★★★ round 4: listen well on twitteR • • Launched: March 2006 • • The company’s logo, a little blue • • As of December 2012, there were bird, is officially named Larry, after more than 100 million users in the Larry Bird, the former player for the United States, 500 million world- Boston Celtics. wide. • • JetBlue was one of the first com- • • The Twitter concept evolved out of panies to start using Twitter for a brainstorming session that took marketing research and customer place at the top of a slide on a San s e r v i c e . Francisco playground. • • Users post 750 tweets per second. talk about Twitter with almost the same affection as I talk about my children. i It’s had that much of an impact on my life since I started using it to reach out to customers in 2007. As an extrovert who can get to know a room full of people in just a few hours, I felt at home in Twitter’s 140 -­word cocktail party environ­ ment. It was the platform that came most naturally to me, because it was per ­ fectly suited for small bursts of quick-­fire conversation and idea exchanges. If the only platform I’d had at my disposal in early 2006, when I first started trying to storytell about my family business, Wine Library, had demanded long-­form 83 Jab Jab Jab right Hook writing, like a magazine column or a written blog, the business would not be what it is today. Twitter’s restrictions played directly to my strengths.
    [Show full text]
  • Detection and Analysis of Twitter Trending Topics Via Link- Anomaly Detection
    Chandan M G Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -6) April 2015, pp.10-12 RESEARCH ARTICLE OPEN ACCESS Detection and Analysis of Twitter Trending Topics via Link- Anomaly Detection Chandan M G*, Chandra Naik** *(PG Scholar, Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ** (Department of Computer Science Engineering, NMAMIT, Nitte, Udupi-574 110, India) ABSTRACT This paper involves two approaches for finding the trending topics in social networks that is key-based approach and link-based approach. In conventional key-based approach for topics detection have mainly focus on frequencies of (textual) words. We propose a link-based approach which focuses on posts reflected in the mentioning behavior of hundreds users. The anomaly detection in the twitter data set is carried out by retrieving the trend topics from the twitter in a sequential manner by using some API and corresponding user for training, then computed anomaly score is aggregated from different users. Further the aggregated anomaly score will be feed into change-point analysis or burst detection at the pinpoint, in order to detect the emerging topics. We have used the real time twitter account, so results are vary according to the tweet trends made. The experiment shows that proposed link-based approach performs even better than the keyword-based approach. Keywords - anomaly-detection, social network, change-point analysis, burst detection. I. INTRODUCTION – Credit card fraud A. Introduction to Social network and Twitter: Cyber intrusion is the unauthorized act of spying, Nowadays Social network has become one of the snooping, and stealing information through cyber most important aspects in our daily life.
    [Show full text]
  • Insights Into Social Media Strategies by Small Marine Tourism Operators in Auckland
    Insights into Social Media Strategies by Small Marine Tourism Operators in Auckland by Mohamed Shenaan A thesis submitted to the Auckland University of Technology in partial fulfilment of the requirements for the degree of Master of International Tourism Management 2017 School of Hospitality and Tourism Abstract The development of Social Media from its infancy towards the end of the 20th century, to its mass proliferation in recent years has been rapid. Its function as a communication, marketing and distribution tool has influenced the consumer decision making process, especially for intangible, information intensive service industries, such as tourism. As a result of the low start-up costs and its ease of use, Social Media has facilitated new marketing channels for smaller businesses. The aim of this explorative study is to gain an insight into the usage, perception and barriers of using Social Media as a tool by small marine tourism operators in Auckland, New Zealand; to offer recommendations to improve the use of the tool by these businesses; and to add to existing scholarly knowledge in the area. Semi-structured interviews were used to collect data from twelve marine operators based in Auckland. The exploration of this data was carried out by using a thematic analysis approach. Results indicated that the most popular and most frequently used Social Media channels were the social network Facebook, and the recommendation and review website TripAdvisor. Findings suggest that Social Media use by participants lacked clear goals and strategies, mainly due to barriers such as lack of resources, lack of time, lack of knowledge, and due to, in a minority of cases, prioritisation of lifestyle choice over business growth.
    [Show full text]
  • Kompendium „Corporate Twitter“ Sechs Beiträge Zum Einsatz Von Twitter in Der Unternehmenskommunikation Von Jörg Hoepfner
    Kompendium „Corporate Twitter“ Sechs Beiträge zum Einsatz von Twitter in der Unternehmenskommunikation Von Jörg Hoepfner ÜBERSICHT ÜBER DIE EINZELNEN BEITRÄGE: ► Beitrag 1: Charakteristika von Twitter und Third-Party-Applikationen Beitrag 2: Die Nutzerschaft von Twitter sowie twitternde Organisationen und Einzelpersonen Beitrag 3: Generelle Nutzung von Twitter durch Unternehmen sowie Ziele und Strategien von Corporate Twitter Beitrag 4: Chancen und Risiken von Corporate Twitter sowie Details der Nutzung von Twitter durch Unternehmen Beitrag 5: Vier Beispiele für Chancen und Risiken von Corporate Twitter Beitrag 6: Resümee, Ausblick und weiterführende Literatur, Informationen und Tipps BEITRAG 1: Charakteristika von Twitter und Third-Party-Applikationen Einleitung Im August 2006 ging der Microblogging-Dienst Twitter online, seit Ende des Jahres 2008 ist Twitter auch in Deutschland in aller Munde. „Twittern“ ist in: Immer mehr Deutsche melden Profile (sogenannte „Accounts“) bei Twitter an, und die unterschiedlichsten Massenmedien berichten ausführlich über diese Medieninnovation. Ein wahrer „Hype“ lässt sich erkennen, der teilweise Parallelen zu dem Medien-Hype rund um das Metaversum „Second Life“ im Jahr 2007 erkennen lässt. Genau wie viele Bürger mit einer Anmeldung bei Twitter liebäugeln, wird auch in vielen Unternehmen diskutiert, inwiefern ein Einsatz von Twitter im Rahmen der Unternehmenskommunikation Sinn machen kann. Manche Unternehmen nutzen Twitter schon und haben unterschiedlichste Erfahrungen gemacht. Wiederum andere hatten
    [Show full text]