Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2441776.2441878acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Tweets are forever: a large-scale quantitative analysis of deleted tweets

Published: 23 February 2013 Publication History

Abstract

This paper describes an empirical study of 1.6M deleted tweets collected over a continuous one-week period from a set of 292K Twitter users. We examine several aggregate properties of deleted tweets, including their connections to other tweets (e.g., whether they are replies or retweets), the clients used to produce them, temporal aspects of deletion, and the presence of geotagging information. Some significant differences were discovered between the two collections, namely in the clients used to post them, their conversational aspects, the sentiment vocabulary present in them, and the days of the week they were posted. However, in other dimensions for which analysis was possible, no substantial differences were found. Finally, we discuss some ramifications of this work for understanding Twitter usage and management of one's privacy.

References

[1]
European Commission - Press Release: Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses, 2012-01-24.
[2]
André, P., Bernstein, M., and Luther, K. Who gives a tweet?: Evaluating microblog content value. In Proc. CSCW (2012).
[3]
Blei, D. M., Ng, A. Y., and Jordan, M. I. Latent dirichlet allocation. The Journal of Machine Learning Research (2003), 993--1022.
[4]
Bonneau, J. Attack of the zombie photos. Light Blue Touchpaper http://www.lightbluetouchpaper.org/2009/05/20/attackof-the-zombie-photos/ (2009).
[5]
Boyd, D., and Marwick, A. E. Social privacy in networked publics: Teens' attitudes, practices, and strategies. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society (2011).
[6]
Cheng, A., and Evans, M. Inside Twitter: An in-depth look inside the Twitter world. Sysomos http://www.sysomos.com/insidetwitter (2009).
[7]
Cheng, J. Are "deleted" photos really gone from Facebook? Not always. Ars Technica http://arstechnica.com/business/2009/07/are-thosephotos-really-deleted-from-facebook-think-twice (2009).
[8]
Cheng, J. Three years later, deleting your photos on Facebook now actually works. Ars Technica http://arstechnica.com/business/2012/08/facebookfinally-changes-photo-deletion-policy-after-3-years-ofreporting/ (2012).
[9]
Hovey, P. Real-time recovery and visualization of deleted tweets. Master's thesis, University of California, 2010.
[10]
Huberman, B., Romero, D., and Wu, F. Social networks that matter: Twitter under the microscope. First Monday (2008).
[11]
Java, A., Song, X., Finin, T., and Tseng, B. Why we twitter: Understanding microblogging usage and communities. In Proc. of WebKDD and SNA-KDD (2007).
[12]
Krishnamurthy, B., Gill, P., and Arlitt, M. A few chirps about Twitter. In Proc. WOSN, ACM (2008).
[13]
Kwak, H., Lee, C., Park, H., and Moon, S. What is Twitter, a social network or a news media? In Proc. WWW (2010).
[14]
Lampe, C., Ellison, N. B., and Steinfield, C. Changes in use and perception of Facebook. In Proc. CSCW (2008).
[15]
Levenshtein, V. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet Physics Doklady (1966).
[16]
Lin, J., Benisch, M., Sadeh, N., Niu, J., Hong, J., Lu, B., and Guo, S. A comparative study of location-sharing privacy preferences in the U.S. and China. Tech. rep., Carnegie Mellon University - CyLab, 2012.
[17]
Naaman, M., Boase, J., and Lai, C. Is it really about me?: Message content in social awareness streams. In Proc. CSCW (2010).
[18]
Nielsen, F. Å. A new ANEW: Evaluation of a word list for sentiment analysis in microblogs. ArXiv e-prints - arXiv:1103.2903 (2011).
[19]
Ramage, D., Dumais, S., and Liebling, D. Characterizing microblogs with topic models. In Proc. ICWSM (2010).
[20]
Raynes-Goldie, K. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday (2010).
[21]
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. Understanding and capturing people's privacy policies in a mobile social networking application. Personal Ubiquitous Computing (2009).
[22]
Sysomos. Twitter Statistics for 2010: An in-depth report at Twitter's growth 2010, compared with 2009. http://www.sysomos.com/insidetwitter/twitter-stats-2010/(2010).
[23]
Toch, E., Cranshaw, J., Drielsma, P. H., Tsai, J. Y., Kelley, P. G., Springfield, J., Cranor, L., Hong, J., and Sadeh, N. Empirical models of privacy in location sharing. In Proc. Ubicomp (2010).
[24]
Tufekci, Z. Facebook, youth and privacy in networked publics. In Proc. ICWSM (2008).
[25]
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., and Cranor, L. F. "I regretted the minute I pressed share": A qualitative study of regrets on Facebook. In Proc. SOUPS (2011).
[26]
Wu, S., Hofman, J., Mason, W., and Watts, D. Who says what to whom on Twitter. In Proc. WWW (2011).
[27]
Zhao, D., and Rosson, M. How and why people Twitter: The role that micro-blogging plays in informal communication at work. In Proc. Group (2009).

Cited By

View all
  • (2024)The Challenges of Replicating Volatile Platform-Data Studies: Replicating Schatto-Eckrodt et al. (2020)Media and Communication10.17645/mac.778912Online publication date: 15-Apr-2024
  • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
  • (2024)Nonrandom Tweet Mortality and Data Access Restrictions: Compromising the Replication of Sensitive Twitter StudiesPolitical Analysis10.1017/pan.2024.7(1-14)Online publication date: 17-May-2024
  • Show More Cited By

Index Terms

  1. Tweets are forever: a large-scale quantitative analysis of deleted tweets

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work
    February 2013
    1594 pages
    ISBN:9781450313315
    DOI:10.1145/2441776
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 February 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. deletion
    2. privacy
    3. social networks

    Qualifiers

    • Research-article

    Conference

    CSCW '13
    Sponsor:
    CSCW '13: Computer Supported Cooperative Work
    February 23 - 27, 2013
    Texas, San Antonio, USA

    Acceptance Rates

    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)69
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Challenges of Replicating Volatile Platform-Data Studies: Replicating Schatto-Eckrodt et al. (2020)Media and Communication10.17645/mac.778912Online publication date: 15-Apr-2024
    • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
    • (2024)Nonrandom Tweet Mortality and Data Access Restrictions: Compromising the Replication of Sensitive Twitter StudiesPolitical Analysis10.1017/pan.2024.7(1-14)Online publication date: 17-May-2024
    • (2024)The Linked Data Benchmark Council (LDBC): Driving Competition and Collaboration in the Graph Data Management SpacePerformance Evaluation and Benchmarking10.1007/978-3-031-68031-1_7(90-106)Online publication date: 22-Sep-2024
    • (2023)ExD: Explainable DeletionProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633503(34-47)Online publication date: 18-Sep-2023
    • (2023)The Impact of Data Persistence Bias on Social Media StudiesProceedings of the 15th ACM Web Science Conference 202310.1145/3578503.3583630(196-207)Online publication date: 30-Apr-2023
    • (2023)Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleaning Practices on Twitter After the Outbreak of the COVID-19 PandemicExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585583(1-7)Online publication date: 19-Apr-2023
    • (2023)Gone but Not Forgotten: A Novel Approach for Collecting Deleted Tweets and TTL Prediction2023 International Conference in Advances in Power, Signal, and Information Technology (APSIT)10.1109/APSIT58554.2023.10201692(338-342)Online publication date: 9-Jun-2023
    • (2023)Challenges of and approaches to data collection across platforms and time: Conspiracy-related digital traces as examples of political contentionJournal of Information Technology & Politics10.1080/19331681.2023.225077921:3(323-339)Online publication date: 28-Aug-2023
    • (2023)Message Deletion on Telegram: Affected Data Types and Implications for Computational AnalysisCommunication Methods and Measures10.1080/19312458.2023.218318818:1(92-114)Online publication date: 6-Mar-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media