Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3085228.3085273acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

A Research Agenda for Distributed Hashtag Spoiling: Tails of a Survived Trending Hashtag

Published: 07 June 2017 Publication History

Abstract

During some rounds of nuclear negotiations between the world powers and Iran, we noticed a situation in which some Twitter users were seemingly trying to disengage people from the flow of latest news about the most trending negotiation's hashtag, "#IranTalks". We recorded and sampled the tweets containing this hashtag on a random basis. We then marked the disengaging tweets based on some criteria and recorded the accounts responsible for these tweets in a list. Then, we applied social and organizational network analysis techniques and found strong evidence for the existence of a networked organization through which the accounts responsible for such tweeting behavior are connected. We believe the results of this study can stimulate more research about this social and organizational phenomenon and its possible impacts.

References

[1]
L. Leung, "Effects of Internet Connectedness and Information Literacy on Quality of Life," Soc. Indic. Res., vol. 98, no. 2, pp. 273--290, Sep. 2010.
[2]
M. Anderson and A. Caumont, "How social media is reshaping news," Pew Reseach Center, 24-Sep-2014.
[3]
J. Gottfried and E. Shearer, "News Use Across Social Media Platforms 2016," Pew Reseach Center, 26-May-2016.
[4]
A. Campbell, "What is Hashtag Hijacking?," Small Business Trends, 18-Aug-2013.
[5]
J. M. Burkhardt, M. C. MacDonald, and A. J. Rathemacher, Teaching information literacy: 50 standards-based exercises for college students, 2nd ed. Chicago: American Library Association, 2010.
[6]
B. Solis, "Discovering And Listening To Conversations In Twitter," Brian Solis, 21-Mar-2008.
[7]
F. Revuelta, "Why Twitter Matters to Content Strategy," Strong Pages, 13-Apr-2016.
[8]
O. Andrew, "Cloud Computing and Social Networks," Cloud Tweaks, 22-Jan-2015.
[9]
V. Doctor, "How to 'Spam' Your Twitter Feed without Being Annoying," Hashtag.org - Organizing the World's Hashtags, 16-Dec-2013.
[10]
K. Thomas, C. Grier, D. Song, and V. Paxson, "Suspended accounts in retrospect: an analysis of twitter spam," 2011, p. 243.
[11]
A. H. Wang, "Don't follow me: Spam detection in Twitter," presented at the Proceedings of the 2010 International Conference onSecurity and Cryptography (SECRYPT), Athens, Greece, 2010.
[12]
J. Song, S. Lee, and J. Kim, "Spam Filtering in Twitter Using Sender-Receiver Relationship," in Recent Advances in Intrusion Detection, vol. 6961, R. Sommer, D. Balzarotti, and G. Maier, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 301--317.
[13]
C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the underground on 140 characters or less," 2010, p. 27.
[14]
S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd, "Detecting spam in a Twitter network," First Monday, vol. 15, no. 1, Dec. 2009.
[15]
A. Segal, "China's Twitter-Spam War against Pro-Tibet Activists," 23-Mar-2012.
[16]
J. Emspak, "Russian Protesters Get Twitter-Bombed," Discovery, 09-Dec-2011. {Online}. Available: http://news.discovery.com/tech/russian-protesters-get-twitter-bombed-111209.htm. {Accessed: 01-May-2016}.
[17]
A. Qtiesh, "Spam Bots Flooding Twitter to Drown Info About #Syria Protests," 18-Apr-2011.
[18]
Zeinobia, "Social Media Politics: MB e-Committees," Egyptian Chronicles - Egypt That You Don't Know, 29-Dec-2012.
[19]
J. Baker, "South Korea: 50k+ Protest National Intelligence Service Election Rigging," Revolution News, 06-Jul-2013. {Online}. Available: https://revolution-news.com/south-korea-50k-protest-national-intelligence-service-election-rigging. {Accessed: 01-May-2016}.
[20]
S. Woolley, "Ecuador is Spending Millions on Malware, Pro-Government Trolls," Political Bots, 04-Aug-2015. {Online}. Available: http://politicalbots.org/?p=248. {Accessed: 01-May-2016}.
[21]
K. Finley, "Pro-Government Twitter Bots Try to Hush Mexican Activists," Wired, 23-Aug-2015. {Online}. Available: https://www.wired.com/2015/08/pro-government-twitter-bots-try-hush-mexican-activists/. {Accessed: 01-May-2016}.
[22]
J. Baker, "Troll Wars on Social Media and the Case of Turkey," Revolution News, 13-Sep-2014. {Online}. Available: http://revolution-news.com/troll-wars-social-media-case-turkey/. {Accessed: 01-May-2016}.
[23]
Hurriyet Daily News, "Turkey's pro-gov't 'trolls' hit hard in latest Twitter battle," Hurriyet Daily News, Istanbul, Turkey, 05-Apr-2015.
[24]
A. Almaatouq et al., "Twitter: who gets caught? observed trends in social micro-blogging spam," 2014, pp. 33--41.
[25]
J.-P. Verkamp and M. Gupta, "Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest.," in FOCI, 2013.
[26]
M. Flacy, "Instagram Mass Deletes Spam Accounts, Users Freak," 18-Dec-2014.
[27]
T. Cahill, "Pro-Clinton Super PAC Caught Spending $1 Million on Social Media Trolls," US Uncut, 21-Apr-2016.
[28]
C. Taylor, "Hillary Trolls Just Got Facebook To Shut Down Bernie Groups By Reporting Them As Pornography," 26-Apr-2016.
[29]
N. Zimmerman, "Hillary supporters accused of taking down Bernie FB pages in porn attack," The Hill, 26-Apr-2016.
[30]
BBC News, "Full text: Iran declaration," BBC News, 21-Oct-2003.
[31]
G. Porter, "Behind the Scenes: How the US and Iran Reached Their Landmark Deal," 05-Sep-2015.
[32]
D. Blair, "Late-night rows and threatened walkouts: how the Iran deal was done," 14-Jul-2015.
[33]
H. L. O'Brien and E. G. Toms, "The development and evaluation of a survey to measure user engagement," J. Am. Soc. Inf. Sci. Technol., vol. 61, no. 1, pp. 50--69, Jan. 2010.
[34]
E. A. Bodine-Baron, Examining ISIS support and opposition networks on Twitter. Santa Monica, CA: RAND, 2016.

Cited By

View all
  • (2025)Hashtag Hijacking as a Governmental Social Responsibility Action: A Communication Network Approach to the COVID-19 Vaccination Arena in RomaniaResponsibility in Strategic Communication10.1108/S2398-391420250000008011(189-210)Online publication date: 17-Feb-2025
  • (2023)Achieving Online and Scalable Information Integrity by Harnessing Social Spam CorrelationsIEEE Access10.1109/ACCESS.2023.323660411(7768-7781)Online publication date: 2023
  • (2022)“Where’s the Outrage??”: An Analysis of #BlackLivesMatter and #BlackTransLivesMatter Twitter CounterpublicsJournalism & Mass Communication Quarterly10.1177/1077699022110923699:3(763-783)Online publication date: 19-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '17: Proceedings of the 18th Annual International Conference on Digital Government Research
June 2017
639 pages
ISBN:9781450353175
DOI:10.1145/3085228
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • IOS Press: IOS Press
  • Digital Government Society of North America

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Iran Talks
  2. Nuclear Deal
  3. SNA
  4. Social Networks
  5. Spam
  6. Twitter

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

dg.o '17

Acceptance Rates

dg.o '17 Paper Acceptance Rate 66 of 114 submissions, 58%;
Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Hashtag Hijacking as a Governmental Social Responsibility Action: A Communication Network Approach to the COVID-19 Vaccination Arena in RomaniaResponsibility in Strategic Communication10.1108/S2398-391420250000008011(189-210)Online publication date: 17-Feb-2025
  • (2023)Achieving Online and Scalable Information Integrity by Harnessing Social Spam CorrelationsIEEE Access10.1109/ACCESS.2023.323660411(7768-7781)Online publication date: 2023
  • (2022)“Where’s the Outrage??”: An Analysis of #BlackLivesMatter and #BlackTransLivesMatter Twitter CounterpublicsJournalism & Mass Communication Quarterly10.1177/1077699022110923699:3(763-783)Online publication date: 19-Aug-2022
  • (2022)Grief hypejacking: Influencers, #ThoughtsAndPrayers, and the commodification of grief on InstagramThe Information Society10.1080/01972243.2022.207121238:3(174-187)Online publication date: 23-May-2022
  • (2021)Studying the Community of Trump Supporters on Twitter during the 2020 US Presidential Election via Hashtags #maga and #trump2020Journalism and Media10.3390/journalmedia20400422:4(709-731)Online publication date: 18-Nov-2021
  • (2020)The Tropes of Celebrity EnvironmentalismAnnual Review of Environment and Resources10.1146/annurev-environ-012320-08170345:1Online publication date: 22-Apr-2020
  • (2019)What do the US West Coast public libraries post on Twitter?Proceedings of the Association for Information Science and Technology10.1002/pra2.2018.1450550102455:1(216-225)Online publication date: Feb-2019
  • (2019)Characterizing transgender health issues in TwitterProceedings of the Association for Information Science and Technology10.1002/pra2.2018.1450550102355:1(207-215)Online publication date: Feb-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media