• Corpus ID: 44968043

Detecting Influential Users and Communities in Censored Tweets Using Data-Flow Graphs

@inproceedings{Tanash2016DetectingIU,
  title={Detecting Influential Users and Communities in Censored Tweets Using Data-Flow Graphs},
  author={Rima S. Tanash and Abdullah Aydogan and Zhouhan Chen and Dan S. Wallach and Melissa Marschall and Devika Subramanian and Christopher Bronk},
  year={2016}
}
Current literature on social media censorship examined various aspects of censorship. However, the relationship among censored social media users has received much less attention. We address this gap in the literature by constructing a complete dynamic data-flow graph that models the communication between users, identifies influential users, and utilizes a wide variety of metadata embedded in tweets to follow data paths of censored tweets. Using a dataset that includes over 25 million tweets… 

Figures and Tables from this paper

A Dataset of State-Censored Tweets

This work releases a dataset of 583,437 tweets by 155,715 users that were censored between 2012-2020 July and releases a set of 22,083,759 supplemental tweets made up of all tweets by users with at least one censored tweet as well as instances of other users retweeting the censored user.

The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup

It is found that self-censoring users appear to be more typical users who normally post neutral tweets, and only 6% political tweets on average, compared to activists who regularly tweet political content, and are more likely to be censored by the government.

Ideological Congruence and Social Media Text as Data

ABSTRACT Earlier studies on ideological congruence mostly rely on public opinion surveys to measure voter ideology, while politicians' ideology is measured by instruments such as roll call votes,

References

SHOWING 1-10 OF 23 REFERENCES

Known Unknowns: An Analysis of Twitter Censorship in Turkey

It is established that Twitter radically under-reports censored tweets in Turkey, raising the possibility that similar trends hold for censored tweets from other countries as well, and the relative ease of working around Twitter's censorship mechanisms.

Censorship and deletion practices in Chinese social media

This work presents the first large–scale analysis of political content censorship in social media, i.e. the active deletion of messages published by individuals, and uncovers a set of politically sensitive terms whose presence in a message leads to anomalously higher rates of deletion.

TURank: Twitter User Ranking Based on User-Tweet Graph Analysis

In this paper, TURank (Twitter User Rank), which is an algorithm for evaluating users' authority scores in Twitter based on link analysis, is proposed, and experimental results show that the proposed algorithm outperforms existing algorithms.

Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose

Data collected using Twitter's sampled API service is compared with data collected using the full, albeit costly, Firehose stream that includes every single published tweet to help researchers and practitioners understand the implications of using the Streaming API.

The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions

Focusing on original posts, not reposts/retweets, it is observed that nearly 30% of the total deletion events occur within 5- 30 minutes, and that deletions happen most heavily in the first hour after a post has been submitted.

Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data

Politicians and citizens increasingly engage in political conversations on social media outlets such as Twitter. In this article, I show that the structure of the social networks in which they are

Why we twitter: understanding microblogging usage and communities

It is found that people use microblogging to talk about their daily activities and to seek or share information and the user intentions associated at a community level are analyzed to show how users with similar intentions connect with each other.

Who is tweeting on Twitter: human, bot, or cyborg?

This paper proposes a classification system that uses the combination of features extracted from an unknown user to determine the likelihood of being a human, bot or cyborg on Twitter and demonstrates the efficacy of the proposed classification system.

Eight friends are enough: social graph approximation via public listings

It is demonstrated that it is difficult to safely reveal limited information about a social network from a "public view" which includes eight of the user's friendship links to search engines.

Social Networks that Matter: Twitter Under the Microscope

A study of social interactions within Twitter reveals that the driver of usage is a sparse and hidden network of connections underlying the “declared” set of friends and followers.