Pepe's Power: Internet Memes, Constitutive Rhetoric, And

Total Page:16

File Type:pdf, Size:1020Kb

Load more

PEPE’S POWER: INTERNET MEMES, CONSTITUTIVE RHETORIC, AND POLITICAL COMMUNITIES BY KORY A. RIEMENSPERGER A Thesis Submitted to the Graduate Faculty of WAKE FOREST UNIVESITY GRADUATE SCHOOL OF ARTS AND SCIENCES in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS Communication May 2018 Winston-Salem, North Carolina Approved By: Allan Louden, Ph.D., Advisor Ananda Mitra, Ph.D., Chair Laurie E. Gries, Ph.D. Ron Von Burg, Ph.D. ii ACKNOWLEDGMENTS I would like to thank: my mother – Kristin Kaye Jensen – and my father – Karl Andrew Riemensperger for conspiring together to introduce me to this world; my brothers and sisters for constituting a real family and keeping me honest; my grandparents who have convinced me that life should be enjoyed at all times and in all places; citalopram for allowing me to use what brain I have; Dr. Ron Von Burg for shepherding the communication graduate program during my time at Wake; Dr. Alessandra Von Burg for planting a seed about graduate school in my head during my first years at Wake; Dr. John Llewellyn for the same, and for showing me the difference between intelligence and wisdom; all the professors, adjuncts, teachers, substitutes, and educators who cared enough to show me that learning is a noble pursuit; Nathan Henry Bedsole for being a positive intellectual influence since my undergraduate days; Carleigh Morgan for sending me an email that greatly influenced the path of this research; Lori Kie for counseling me to write concisely; and Ali Dagger for being kind to me at my most stressed. iii TABLE OF CONTENTS LIST OF FIGURES ........................................................................................................... iv ABSTRACT .........................................................................................................................v CHAPTER I. INTRODUCTION: INTERNET MEMES, CONSTITUITIVE RHETORIC, AND POLITICALCOMMUNITIES ............1 Ethos Statement .................................................................................................2 Defining the Internet Meme ...............................................................................3 Internet Memes as Constitutive Rhetoric ...........................................................7 Digital Communities, Constituted .....................................................................9 Political Campaigns and the Internet Meme ....................................................12 Literature Review.............................................................................................15 Methodology ....................................................................................................25 Chapter Preview ...............................................................................................28 II. CHAPTER ONE: THE ARTIFACT AND THE SOURCE(S): PEPE THE FROG AND 4CHAN .......................................................................................30 Distinction between Visuals, Images and Pictures ..........................................30 Memetic Logics ...............................................................................................32 The Origins of Pepe .........................................................................................41 4chan, the First Pepe Collective.......................................................................45 The Genres of Pepe ..........................................................................................49 The Transformation of Pepe ............................................................................52 The Radicalization of Pepe ..............................................................................54 The “Death” of Pepe ........................................................................................57 III. CHAPTER TWO: A COMMUNITY CONSTITUTED: REDDIT’S /R/THE_DONALD ..........................................................................................59 Revisiting Constitutive Rhetoric ......................................................................59 An Introduction to Reddit ................................................................................67 /r/The_Donald, the Second Pepe Collective ....................................................69 IV. CHAPTER THREE: THE CAMPAIGN: RECOMENDATIONS FOR POLITICAL COMMUNICATIONS IN A HYPERMEMETIC WORLD .....74 The Trump Cases .............................................................................................75 Recommendations to Political Campaigns ......................................................81 A Tentative Conclusion ...................................................................................83 FIGURES ...........................................................................................................................86 REFERENCES ................................................................................................................104 iv APPENDIX ......................................................................................................................131 CURRICULUM VITAE ..................................................................................................132 v LIST OF FIGURES Figures 1. A colorized version of “Feels Good Man,” an early Pepe the Frog ......................86 2. A "Smug Pepe" image from the early 2010s .........................................................86 3. A "Smug Pepe" image remixed with French candidate Marine Le Pen ................87 4. A "Smug Pepe" remix incorporating Donald Trump .............................................87 5. One of two retweets from Donald Trump’s Twitter account featuring a remixed Pepe image .............................................................................................................88 6. Portion of a /pol/ thread between three unique individuals ...................................88 7. A picture depicting Pepe embracing “AFD-Chan” ................................................89 8. A 4chan post reappropriating the image of Kim Il-sung .......................................89 9. A 4chan post reappropriating the image of Massimo D'Alema .............................90 10. The original photograph of Massimo D'Alema that inspired an internet meme ....90 11. “Pepe’s reaction” ...................................................................................................91 12. Untitled strip from Boy’s Club ..............................................................................92 13. Untitled strip from Boy’s Club ..............................................................................93 14. Untitled strip from Boy’s Club ..............................................................................94 15. Untitled strip from Boy’s Club ..............................................................................95 16. Untitled strip from Boy’s Club ..............................................................................96 17. The first true blog post on 4chan ...........................................................................97 18. A comparison of 4chan and 2chan’s thread features .............................................97 19. Scene from the introduction sequence of SEGA videogame Zero Wing ..............98 20. Original “9/11 Tourist Guy” picture ......................................................................98 21. An example of a typical 4chan “thread” ................................................................99 22. An early memetic remix of text from Furie’s original drawing .............................99 23. An example of an apolitical “Feels Good Man” post without an accompanying Pepe image ...........................................................................................................100 24. A created collage of “Feels Good Man” and Pokemon character transformations ..............................................................................................................................100 25. A collage of two pictures of Parkland survivor Emma González ........................101 26. The front-page of /r/The_Donald for most of the 2016 presidential campaign ...101 27. A memetic response to Matt Furie’s cease and desist order ................................102 28. A memetic response to Matt Furie’s cease and desist order ................................102 29. An image from “The Adventures of Pepe and Pede” ..........................................103 30. A Pepe image featuring a nuclear blast ................................................................103 Tables 1. Know Your Meme “pepe” query results ................................................................51 vi ABSTRACT Internet memes cannot be manufactured by any one individual. These artifacts are best defined as bodies of work that manufacture and distribute meaning online. Internet memes persuade politically-motivated individuals to join and stay together using common memetic logics. Using Limor Shifman’s definition of an internet meme, Ryan Milner’s framework of memetic logics, and Laurie Gries’ new materialist research strategies, this thesis will examine the memetic definition and rhetorical transformations of Pepe the Frog – an internet meme that has undergone radical symbolic growth since its inception in the late 2000s. These transformations successfully constituted ideologies in several digital political communities. In turn, these digital places generated images that were circulated by political actors
Recommended publications
  • UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations

    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations

    UC Santa Barbara UC Santa Barbara Electronic Theses and Dissertations Title A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Permalink https://escholarship.org/uc/item/6w76f8x7 Author Swift, Kathy Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Santa Barbara A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Education by Kathleen Anne Swift Committee in charge: Professor Richard Duran, Chair Professor Diana Arya Professor William Robinson September 2017 The dissertation of Kathleen Anne Swift is approved. ................................................................................................................................ Diana Arya ................................................................................................................................ William Robinson ................................................................................................................................ Richard Duran, Committee Chair June 2017 A Web of Extended Metaphors in the Guerilla Open Access Manifesto of Aaron Swartz Copyright © 2017 by Kathleen Anne Swift iii ACKNOWLEDGEMENTS I would like to thank the members of my committee for their advice and patience as I worked on gathering and analyzing the copious amounts of research necessary to
  • The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All

    The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All

    A report from the Center on Extremism 09 18 New Hate and Old: The Changing Face of American White Supremacy Our Mission: To stop the defamation of the Jewish people and to secure justice and fair treatment for all. ABOUT T H E CENTER ON EXTREMISM The ADL Center on Extremism (COE) is one of the world’s foremost authorities ADL (Anti-Defamation on extremism, terrorism, anti-Semitism and all forms of hate. For decades, League) fights anti-Semitism COE’s staff of seasoned investigators, analysts and researchers have tracked and promotes justice for all. extremist activity and hate in the U.S. and abroad – online and on the ground. The staff, which represent a combined total of substantially more than 100 Join ADL to give a voice to years of experience in this arena, routinely assist law enforcement with those without one and to extremist-related investigations, provide tech companies with critical data protect our civil rights. and expertise, and respond to wide-ranging media requests. Learn more: adl.org As ADL’s research and investigative arm, COE is a clearinghouse of real-time information about extremism and hate of all types. COE staff regularly serve as expert witnesses, provide congressional testimony and speak to national and international conference audiences about the threats posed by extremism and anti-Semitism. You can find the full complement of COE’s research and publications at ADL.org. Cover: White supremacists exchange insults with counter-protesters as they attempt to guard the entrance to Emancipation Park during the ‘Unite the Right’ rally August 12, 2017 in Charlottesville, Virginia.
  • Pepe the Frog

    Pepe the Frog

    PEPE THE FROG: A Case Study of the Internet Meme and its Potential Subversive Power to Challenge Cultural Hegemonies by BEN PETTIS A THESIS Presented to the School of Journalism and Communication and the Robert D. Clark Honors College in partial fulfillment of the requirements for the degree of Bachelor of Arts Spring 2018 An Abstract of the Thesis of Ben Pettis for the degree of Bachelor of Arts in the School of Journalism and Communication to be taken Spring 2018 Title: Pepe the Frog: A Case Study of the Internet Meme and Its Potential Subversive Power to Challenge Cultural Hegemonies Approved: _______________________________________ Dr. Peter Alilunas This thesis examines Internet memes, a unique medium that has the capability to easily and seamlessly transfer ideologies between groups. It argues that these media can potentially enable subcultures to challenge, and possibly overthrow, hegemonic power structures that maintain the dominance of a mainstream culture. I trace the meme from its creation by Matt Furie in 2005 to its appearance in the 2016 US Presidential Election and examine how its meaning has changed throughout its history. I define the difference between a meme instance and the meme as a whole, and conclude that the meaning of the overall meme is formed by the sum of its numerous meme instances. This structure is unique to the medium of Internet memes and is what enables subcultures to use them to easily transfer ideologies in order to challenge the hegemony of dominant cultures. Dick Hebdige provides a model by which a dominant culture can reclaim the images and symbols used by a subculture through the process of commodification.
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools

    POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools

    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
  • Flashback As a Rhetorical Online Battleground

    Flashback As a Rhetorical Online Battleground

    http://www.diva-portal.org This is the published version of a paper published in Social Media + Society. Citation for the original published paper (version of record): Blomberg, H., Stier, J. (2019) Flashback as a rhetorical online battleground: Debating the (dis)guise of the Nordic Resistance Movement Social Media + Society https://doi.org/10.1177/2056305118823336 Access to the published version may require subscription. N.B. When citing this work, cite the original published paper. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:du-29134 SMSXXX10.1177/2056305118823336Social Media <span class="symbol" cstyle="Mathematical">+</span> SocietyBlomberg and Stier 823336research-article20192019 Article Social Media + Society January-March 2019: 1 –10 Flashback as a Rhetorical Online © The Author(s) 2019 Article reuse guidelines: sagepub.com/journals-permissions Battleground: Debating the (Dis)guise DOI:https://doi.org/10.1177/2056305118823336 10.1177/2056305118823336 of the Nordic Resistance Movement journals.sagepub.com/home/sms Helena Blomberg1 and Jonas Stier2 Abstract The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts.
  • On the Emergence of Sinophobic Behavior on Web Communities In

    On the Emergence of Sinophobic Behavior on Web Communities In

    “Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19 Fatemeh Tahmasbi Leonard Schild Chen Ling Binghamton University CISPA Boston University [email protected] [email protected] [email protected] Jeremy Blackburn Gianluca Stringhini Yang Zhang Binghamton University Boston University CISPA [email protected] [email protected] [email protected] Savvas Zannettou Max Planck Institute for Informatics [email protected] ABSTRACT KEYWORDS The outbreak of the COVID-19 pandemic has changed our lives in COVID-19, Sinophobia, Hate Speech, Twitter, 4chan unprecedented ways. In the face of the projected catastrophic conse- ACM Reference Format: quences, most countries have enacted social distancing measures in Fatemeh Tahmasbi, Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca an attempt to limit the spread of the virus. Under these conditions, Stringhini, Yang Zhang, and Savvas Zannettou. 2021. “Go eat a bat, Chang!”: the Web has become an indispensable medium for information ac- On the Emergence of Sinophobic Behavior on Web Communities in the quisition, communication, and entertainment. At the same time, Face of COVID-19. In Proceedings of the Web Conference 2021 (WWW ’21), unfortunately, the Web is being exploited for the dissemination April 19–23, 2021, Ljubljana, Slovenia. ACM, New York, NY, USA, 12 pages. of potentially harmful and disturbing content, such as the spread https://doi.org/10.1145/3442381.3450024 of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people and people of Asian 1 INTRODUCTION descent since COVID-19 is believed to have originated from China.
  • Monitoring of Online Offenders by Researchers

    Monitoring of Online Offenders by Researchers

    SGOC STUDYING GROUP ON ORGANISED CRIME https://sgocnet.org Sifting through the Net: Monitoring of Online Offenders by Researchers Research note Sifting through the Net: Monitoring of Online Offenders by Researchers David Décary-Hétu and Judith Aldridge* Abstract: Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on- going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online. Keywords: Cybercrime – Internet research methods – Crawler – Cryptomarkets avid e cary- e tu is Assistant Professor at the School of Criminology, University of Montreal, and Researcher at the International Centre of Comparative Criminology (ICCC).
  • Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?

    Hard-Coded Censorship in Open Source Mastodon Clients — How Free Is Open Source?

    Proceedings of the Conference on Technology Ethics 2020 - Tethics 2020 Hard-coded censorship in Open Source Mastodon clients — How Free is Open Source? Long paper Juhani Naskali 0000-0002-7559-2595 Information Systems Science, Turku School of Economics, University of Turku Turku, Finland juhani.naskali@utu.fi Abstract. This article analyses hard-coded domain blocking in open source soft- ware, using the GPL3-licensed Mastodon client Tusky as a case example. First, the question of whether such action is censorship is analysed. Second, the licensing compliance of such action is examined using the applicable open-source software and distribution licenses. Domain blocking is found to be censorship in the literal definition of the word, as well as possibly against some the used Google distribu- tion licenses — though some ambiguity remains, which calls for clarifications in the agreement terms. GPL allows for functionalities that limit the use of the software, as long as end-users are free to edit the source code and use a version of the appli- cation without such limitations. Such software is still open source, but no longer free (as in freedom). A multi-disciplinary ethical examination of domain blocking will be needed to ascertain whether such censorship is ethical, as all censorship is not necessarily wrong. Keywords: open source, FOSS, censorship, domain blocking, licensing terms 1 Introduction New technologies constantly create new challenges. Old laws and policies cannot al- ways predict future possibilities, and sometimes need to be re-examined. Open source software is a licensing method to freely distribute software code, but also an ideology of openness and inclusiveness, especially when it comes to FOSS (Free and Open-source software).
  • Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling

    Doxxing, Swatting and the New Trends in Online Harassment 22 April 2015, by Andrew Quodling

    Doxxing, swatting and the new trends in online harassment 22 April 2015, by Andrew Quodling citizens about "swatting" (see below) since 2008. It has become common to see articles about how these attacks have affected politicians (both Republican and Democrat in the US), celebrities, journalists, businesses, video game streamers and public servants. What is doxxing? Doxxing – named for "documents" or "docs" – is the act of release of someone's personal and/or When the SWAT team bursts into your bedroom, it’s not identifiable information without their consent. This only unpleasant but potentially deadly. Credit: Jason can include things like their full legal name, social Eppink/Flickr, CC BY security numbers, home or work addresses and contact information. There's no set format for a "dox"; the doxxer simply Imagine this: there's a knock at your door. "Pizza publishes whatever information they've managed to delivery!" It's the fifth time in the last hour that turn up in their searches. Sometimes this even you've had to say to a delivery-person: "No, I really includes the names and details of their target's didn't order anything." That's irritating. family or close friends. Half an hour later, there's another noise at the As a tactic of harassment, doxxing serves two door. This time it's forced open as your house is purposes: it intimidates the people targeted by stormed by the heavily armed and aggressive invading and disrupting their expectations of special response unit of your local police force. privacy; and it provides an avenue for the They're responding to a tip off that warned them of perpetuation of that person's harassment by a hostage situation at your address.
  • Deciphering L33tspeak

    Deciphering L33tspeak

    Ghent University Faculty of Arts and Philosophy Thesis Deciphering L33t5p34k Internet Slang on Message Boards Supervisor: Master Paper submitted in partial fulfilment of Prof. Anne-Marie Simon-Vandenbergen the requirements for the degree of ―Master in de Taal- en Letterkunde – Afstudeerrichting: Engels‖ By Eveline Flamand 2007-2008 i Acknowledgements I would like to thank my promoter, professor Anne-Marie Vandenbergen, for agreeing on supervising this perhaps unconventional thesis. Secondly I would like to mention my brother, who recently graduated as a computer engineer and who has helped me out when my knowledge on electronic technology did not suffice. Niels Cuelenaere also helped me out by providing me with some material and helping me with a Swedish translation. The people who came up to me and told me they would like to read my thesis, have encouraged me massively. In moments of doubt, they made me realize that there is an audience for this kind of research, which made me even more determined to finish this thesis successfully. Finally, I would also like to mention the members of the Filologica forum, who have been an inspiration for me. ii Index 1. Introduction .......................................................................................................................... 1 2. Methodology ......................................................................................................................... 1 2.1 4chan ...............................................................................................................................
  • What Role Has Social Media Played in Violence Perpetrated by Incels?

    What Role Has Social Media Played in Violence Perpetrated by Incels?

    Chapman University Chapman University Digital Commons Peace Studies Student Papers and Posters Peace Studies 5-15-2019 What Role Has Social Media Played in Violence Perpetrated by Incels? Olivia Young Chapman University, [email protected] Follow this and additional works at: https://digitalcommons.chapman.edu/peace_studies_student_work Part of the Gender and Sexuality Commons, Peace and Conflict Studies Commons, Social Control, Law, Crime, and Deviance Commons, Social Influence and oliticalP Communication Commons, Social Media Commons, Social Psychology and Interaction Commons, and the Sociology of Culture Commons Recommended Citation Young, Olivia, "What Role Has Social Media Played in Violence Perpetrated by Incels?" (2019). Peace Studies Student Papers and Posters. 1. https://digitalcommons.chapman.edu/peace_studies_student_work/1 This Senior Thesis is brought to you for free and open access by the Peace Studies at Chapman University Digital Commons. It has been accepted for inclusion in Peace Studies Student Papers and Posters by an authorized administrator of Chapman University Digital Commons. For more information, please contact [email protected]. Peace Studies Capstone Thesis What role has social media played in violence perpetrated by Incels? Olivia Young May 15, 2019 Young, 1 INTRODUCTION This paper aims to answer the question, what role has social media played in violence perpetrated by Incels? Incels, or involuntary celibates, are members of a misogynistic online subculture that define themselves as unable to find sexual partners. Incels feel hatred for women and sexually active males stemming from their belief that women are required to give sex to them, and that they have been denied this right by women who choose alpha males over them.
  • 3.3.5.Haulath.Pdf

    3.3.5.Haulath.Pdf

    CONTENTS SL. PAGE NO. ARTICLE NO 1 DATA PRE-PROCESSING FOR EFFECTIVE INTRUSION DETECTION RIYAD AM 5 2. AN ENHANCED AUTHENTICATION SYSTEM USING MULTIMODAL BIOMETRICS MOHAMED BASHEER. K.P DR.T. ABDUL RAZAK 9 6. GRADIENT FEATURE EXTRACTION USING FOR MALAYALAM PALM LEAF DOCUMENT IMAGEGEENA K.P 19 7. INTERNET ADDICTION JESNA K 23 8. VANETS AND ITS APPLICATION: PRESENT AND FUTURE.JISHA K 26 9. DISTRIBUTED OPERATING SYSTEM AND AMOEBAKHAIRUNNISA K 30 5. INDIVIDUAL SOCIAL MEDIA USAGE POLICY: ORGANIZATION INFORMATION SECURITY THROUGH DATA MINING REJEESH.E1, MOHAMED JAMSHAD K2, ANUPAMA M3 34 3. APPLICATION OF DATA MINING TECHNIQUES ON NETWORK SECURITY O.JAMSHEELA 38 4. SECURITY PRIVACY AND TRUST IN SOCIAL MEDIAMS HAULATH K 43 10. SECURITY AND PRIVACY ISSUES AND SOLUTIONS FOR WIRELESS SYSTEM NETWORKS (WSN) AND RFID RESHMA M SHABEER THIRUVAKALATHIL 45 11. ARTIFICIAL INTELLIGENCE IN CYBER DEFENSESHAMEE AKTHAR. K. ASKARALI. K.T 51 SECURITY PRIVACY AND TRUST IN SOCIAL MEDIA Haulath K, Assistant professor, Department of Computer Science, EMEA College, Kondotty. [email protected] Abstract— Channels social interactions using 2. Social Blogs extremely accessible and scalable publishing A blog (a truncation of the expression weblog) is a methods over the internet. Connecting individuals, discussion or informational site published on communities, organization. Exchange of idea Sharing the World Wide Web consisting of discrete entries message and collaboration through security privacy (“posts”) typically displayed in reverse chronological and trust. order (the most recent post appears first). Until 2009, Classification of Social Media blogs were usually the work of a single individual, occasionally of a small group, and often covered a 1.