Presentation at the Tech4Freedom: Democracy and Human Rights in the Digital Age conference (Beirut 14-15 Dec. 2017) in the Tech 4 Political Change panel
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
Presentation at Concordia University October 2018
Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University.
Email: a.maddox@deakin.edu.au
Keywords:
Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data.
Abstract
Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data.
Bio:
Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.
Hackers are often misunderstood and portrayed negatively in popular culture. A hacker's motivation comes from intellectual curiosity to learn more about information systems, rather than malicious intent. However, "crackers" hack systems to cause harm. Hackers believe that all information should be free and accessible, and that one should be judged based on skills rather than attributes. The group Anonymous both promotes hacktivism but also contributes to hackers' negative reputation through questionable tactics. As technology evolves, society's perspective of hackers remains complex.
Jones And Turner iran seattle presentationCameron Jones
This document compares the uses of social media in the 1999 Battle of Seattle protests and the 2009 Iranian election protests. It discusses how early internet technologies like email lists and Indymedia allowed for radical democracy in Seattle, while Twitter and YouTube helped spread information about and draw global attention to protests in Iran despite state restrictions. While new media helped organize both movements, the document argues that Western liberal ideologies still shaped coverage in ways that reconciled protests with the status quo.
Overview of technological determinism and technological inevitablism. Analysis of implications in four key areas; environment, nuclear weapons, artificial intelligence, poverty.
Presentation about global protests evolution, tecnopolitics, squares occupation and the Spanish new post party era, where citizen confluences will rule the main cities.
Bitcoin Blockchains on Twitter timelines: A Social Media analysis of cryptocu...Alexia Maddox
Presentation at Concordia University October 2018
Dr Alexia Maddox, Lecturer in Communications, School of Communication and Creative Arts, Deakin University.
Email: a.maddox@deakin.edu.au
Keywords:
Social media analysis; twitter; cryptocurrencies; social disruption; digital trace data.
Abstract
Cryptocurrencies represent emerging financial technologies engendered through overlapping community values of decentralised peer-to-peer exchange, encryption technologies and an overarching agenda towards the disruption of centralised banking within the fiat economy. This paper will trace the development and shifts in public discourse within social media surrounding cryptocurrencies. The last five years have seen cryptocurrencies move from technological emergence to a broadening range of applications and history potholed with disputes, divergence, hacks and scams within the community. The accompanying influence of speculation has shifted the focus from social adoption to value volatility and seen the incorporation of associated technologies within banking and other organisational processes. The emphasis within public discourse has also followed a shift from bitcoin to blockchain. The study is grounded through a Twitter analysis of cryptocurrency-related social media discourse within the Australian context. The social media analysis works with social media archives of the Australian Twittersphere captured between early 2012 to May 2017. Access to this curated archive is through TrISMA and the timeframe under analysis aligns with the most detailed available dataset. The analysis seeks to characterise the emergence of public dialogue surrounding cryptocurrency use and application over time, focusing on peak engagement events. The key concepts directing the focus and interpretation of the social media analysis include financial inclusion, socio-technical disruption and social change. The whimsical quest of the study is to learn where the digital frontier has shifted to within this community and point to possible future developments. From a community studies perspective the case study represents an initial foray into data analytics to explore whether it is possible to detect the shifting shape and form of digital community through its environmental imprint (Maddox 2016). This methodological aspect of the work speaks to an attempt to generate a data recognition practice that can be deployed to search for signatures of social disruption within digital trace data.
Bio:
Alexia Maddox is a digital sociologist with research interests are community studies, research methods and digital frontiers. Here recent book, Research Methods and Global Online Communities: a case study with Routledge, combines these areas and forms the basis of her study of emerging communities forming through the internet and cryptography.
Hackers are often misunderstood and portrayed negatively in popular culture. A hacker's motivation comes from intellectual curiosity to learn more about information systems, rather than malicious intent. However, "crackers" hack systems to cause harm. Hackers believe that all information should be free and accessible, and that one should be judged based on skills rather than attributes. The group Anonymous both promotes hacktivism but also contributes to hackers' negative reputation through questionable tactics. As technology evolves, society's perspective of hackers remains complex.
Jones And Turner iran seattle presentationCameron Jones
This document compares the uses of social media in the 1999 Battle of Seattle protests and the 2009 Iranian election protests. It discusses how early internet technologies like email lists and Indymedia allowed for radical democracy in Seattle, while Twitter and YouTube helped spread information about and draw global attention to protests in Iran despite state restrictions. While new media helped organize both movements, the document argues that Western liberal ideologies still shaped coverage in ways that reconciled protests with the status quo.
Overview of technological determinism and technological inevitablism. Analysis of implications in four key areas; environment, nuclear weapons, artificial intelligence, poverty.
Presentation about global protests evolution, tecnopolitics, squares occupation and the Spanish new post party era, where citizen confluences will rule the main cities.
Hack Democracy San Francisco meetup #1 - introhackdemocracy
This document outlines an agenda for a meetup of the Hack Democracy SF group. It thanks presenters and attendees. It discusses the meaning of the term "hacker" and how hackers can work with public institutions to define the future of democracy. The agenda lists 5 presentations on projects using technology to increase transparency and civic participation, including Code for America, Circle Voting, ScraperWiki, VoteReports.org, and ShortStack. It notes the format will be 5-minute presentations plus Q&A and discusses plans to expand the group to other cities.
In just under 50 years, computers have gone from frightening behemoths to countercultural totems to everyday consumer fashion accessories. The history of new media helps us understand why it is so ideologically powerful today.
These lecture slides are from my Masters unit, Future Media Platforms, taught at Bournemouth University.
This document discusses how new technologies are remediating and reshaping urban spaces in complex ways. It provides four key points: 1) The relationship between real and virtual is one of remediation, not distinct binaries. 2) Cities are "fluid machines" characterized by movement of people, goods, data and services. 3) Ubiquitous technologies tend to become invisible infrastructure over time. 4) This automatic production of space through technology establishes a new urban-technological politics with multiple trajectories, including consumerization, securitization, and activism/democratization.
Darknet imaginaries: The discursive malleability of the cultural status of di...Piotr Siuda
This document discusses a research study analyzing 505 internet memes related to the darknet in order to understand how they collectively contribute to cultural conceptions of this niche technology. The researchers identified 9 themes across the memes, including depictions of the darknet vs the clear web, darknet technology and users, the shadowy nature of the darknet, unexpected aspects of the darknet, and dark humor related to the darknet. The analysis shows that internet memes present a complex, diverse, and sometimes contradictory representation of the darknet, demonstrating the discursive malleability of how cultural status is developed for niche technologies with few users.
Introduction to hack democracy meetup 2hackdemocracy
The document summarizes a meetup of the #HackDemocracy group in Brussels on January 19, 2011. It thanks the organizers and speakers at the event. It announces the launch of #HackDemocracy in San Francisco and invites people to help out or speak at future meetups. It also describes the #Hacks/Hackers group which brings together journalists and programmers, mentioning their 17 chapters worldwide. Finally, it lists three topics to be discussed about Wikileaks: how it ensures anonymity, how organizations are using Wikileaks' data, and Wikileaks' implications for international relations.
This is the first lecture for my Intro to Social Media class at Loyola Marymount University. It provides a look back at the concepts that inspired today's social media phenomenon, as well as how these concepts evolved over the past 2000 years.
The document discusses the evolution of technological innovation and social innovation. It notes that while technological progress in the 2000s led to major advances like smartphones and Internet access, it did not fully address major societal challenges. It then discusses the concept of social innovation and how it seeks to apply new ideas and technologies to better solve societal problems. The document advocates for a new approach it calls "social hacking" that draws on the collaborative spirit and values of the original hacker culture to drive social innovation through new technologies.
This document discusses different perspectives on digital humanities. It partitions digital humanities into four areas: traditional scholarship about digital things, data analysis using digital tools, data representation using digital tools, and making digital tools. Each area is then briefly described, with examples provided. The document also discusses how digital tools and techniques are being applied in humanities research processes and outputs.
TEDx Raval 3 de mar 2012 @efernandez 15min short webEd Fernandez
The document discusses emerging trends in technology and innovation, including:
- Advancing computing power and digital storage capacity according to Moore's Law, Kryder's Law, and other technology laws.
- The rise of wireless, smaller, more powerful and cheaper devices in the post-PC era.
- How human communications and globalization will be enriched and accelerated by wireless technology, mobile internet services, and global/hyperlocal communities.
- The opportunity we now have to use technology to drive positive social, political, and economic transformations.
This document provides a summary of Lindsey Leitera's Senior Major Project analyzing rhetorical motives in information liberation texts from Richard Stallman to Edward Snowden. It traces the evolution of debates around political ideology, enlightenment ideals, identity, and transparency from 1983 to 2013. Key events discussed include Stallman's "GNU Manifesto", debates between hackers and entrepreneurs like Bill Gates, the emergence of hacktivism with Anonymous and WikiLeaks, and national security whistleblowing by Edward Snowden. The project uses rhetorical analysis of manifestos, essays, and other texts to understand how a "Hacker Ethic" of free information sharing has manifested over time and influenced digital activism and issues of cyber security, technology policy
The document discusses the history and development of social media and connectivity online. It notes that initially, users were drawn to social media sites to fulfill a need for human connection (paragraph 1). This connectivity then allowed platforms to build profitable online markets. After the creation of the World Wide Web in 1991, more interactive and two-way platforms for online social connections emerged after 2000 (paragraph 2). Everything once shared privately, like family photos, became publicly shared. The document outlines different types of social media and discusses how platforms and social practices evolved together. It also notes how connectivity became quantifiable through metrics like likes and followers (paragraph 3). While early platforms encouraged participation and peer production, they became larger and harder to regulate after 2005 as
The document discusses the history and development of social media and connectivity online. It notes that initially, users were drawn to social media sites to feel connected to others (paragraph 1). This connectivity allowed platforms to build profitable online markets. After the invention of the World Wide Web in 1991, more interactive and two-way forms of social media emerged after 2000 that further enabled online social interactions and sharing (paragraph 2). However, this also meant that intimate details and information that users previously only shared with close connections became public. The document then discusses how platforms and social media became more focused on algorithms, data tracking, and commercialization after 2005 in order to generate revenue from all the new connections and relationships being facilitated online (paragraphs 3-4
The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
Don't expect answers from a God of love; don't expect anything but love.Rhea Myers
This document contains a collection of short quotes and phrases on various topics including technology, information, content, mobile apps, politics, and more. It promotes contact information and credits for the presentation under a Creative Commons license. The document touches on many different ideas but does not provide an overarching theme or argument to summarize.
This document outlines a research study comparing the outcomes of the Spanish Indignados and Occupy Wall Street movements. It proposes a new framework for analyzing the political, cultural, and social impacts of networked social movements in the information age. This framework evaluates how movements' goals and values change over time, their cultural influence on civil society through online and offline support, and their impact on decision-making processes, institutions, and the political system. The study will use netnography, discourse analysis of movement materials, and interviews with activists to apply this framework to the Indignados and Occupy Wall Street cases.
A case for accountability-oriented design - keynote 2016 design and the cityDietmar Offenhuber
This document discusses accountability-oriented design, which calls attention to issues of governance and shapes public discourse through managing visibility. Accountability-oriented design makes systems more legible and acknowledges its own limitations. It can collect data, coordinate volunteers, and spread messages to ask hard questions. Examples discussed include technologies that track waste collection and provide public WiFi while also sensing urban data. The document argues accountability-oriented design does not explain but shows to facilitate discussion about limiting opacity through transparency in systems and infrastructure.
This document provides an overview of social media analysis and network science techniques. It discusses how to collect and graph data from Facebook and Twitter, and how to analyze the graphs using tools like NodeXL, Gephi, and SPSS. It describes how to identify influential users in a discussion and understand user roles. It also covers calculating basic network metrics, performing content and sentiment analysis, and examining individual user networks and how they are situated within broader networks. Finally, it discusses network interventions like stimulating influential users or groups, and optimizing network structure.
Hack Democracy San Francisco meetup #1 - introhackdemocracy
This document outlines an agenda for a meetup of the Hack Democracy SF group. It thanks presenters and attendees. It discusses the meaning of the term "hacker" and how hackers can work with public institutions to define the future of democracy. The agenda lists 5 presentations on projects using technology to increase transparency and civic participation, including Code for America, Circle Voting, ScraperWiki, VoteReports.org, and ShortStack. It notes the format will be 5-minute presentations plus Q&A and discusses plans to expand the group to other cities.
In just under 50 years, computers have gone from frightening behemoths to countercultural totems to everyday consumer fashion accessories. The history of new media helps us understand why it is so ideologically powerful today.
These lecture slides are from my Masters unit, Future Media Platforms, taught at Bournemouth University.
This document discusses how new technologies are remediating and reshaping urban spaces in complex ways. It provides four key points: 1) The relationship between real and virtual is one of remediation, not distinct binaries. 2) Cities are "fluid machines" characterized by movement of people, goods, data and services. 3) Ubiquitous technologies tend to become invisible infrastructure over time. 4) This automatic production of space through technology establishes a new urban-technological politics with multiple trajectories, including consumerization, securitization, and activism/democratization.
Darknet imaginaries: The discursive malleability of the cultural status of di...Piotr Siuda
This document discusses a research study analyzing 505 internet memes related to the darknet in order to understand how they collectively contribute to cultural conceptions of this niche technology. The researchers identified 9 themes across the memes, including depictions of the darknet vs the clear web, darknet technology and users, the shadowy nature of the darknet, unexpected aspects of the darknet, and dark humor related to the darknet. The analysis shows that internet memes present a complex, diverse, and sometimes contradictory representation of the darknet, demonstrating the discursive malleability of how cultural status is developed for niche technologies with few users.
Introduction to hack democracy meetup 2hackdemocracy
The document summarizes a meetup of the #HackDemocracy group in Brussels on January 19, 2011. It thanks the organizers and speakers at the event. It announces the launch of #HackDemocracy in San Francisco and invites people to help out or speak at future meetups. It also describes the #Hacks/Hackers group which brings together journalists and programmers, mentioning their 17 chapters worldwide. Finally, it lists three topics to be discussed about Wikileaks: how it ensures anonymity, how organizations are using Wikileaks' data, and Wikileaks' implications for international relations.
This is the first lecture for my Intro to Social Media class at Loyola Marymount University. It provides a look back at the concepts that inspired today's social media phenomenon, as well as how these concepts evolved over the past 2000 years.
The document discusses the evolution of technological innovation and social innovation. It notes that while technological progress in the 2000s led to major advances like smartphones and Internet access, it did not fully address major societal challenges. It then discusses the concept of social innovation and how it seeks to apply new ideas and technologies to better solve societal problems. The document advocates for a new approach it calls "social hacking" that draws on the collaborative spirit and values of the original hacker culture to drive social innovation through new technologies.
This document discusses different perspectives on digital humanities. It partitions digital humanities into four areas: traditional scholarship about digital things, data analysis using digital tools, data representation using digital tools, and making digital tools. Each area is then briefly described, with examples provided. The document also discusses how digital tools and techniques are being applied in humanities research processes and outputs.
TEDx Raval 3 de mar 2012 @efernandez 15min short webEd Fernandez
The document discusses emerging trends in technology and innovation, including:
- Advancing computing power and digital storage capacity according to Moore's Law, Kryder's Law, and other technology laws.
- The rise of wireless, smaller, more powerful and cheaper devices in the post-PC era.
- How human communications and globalization will be enriched and accelerated by wireless technology, mobile internet services, and global/hyperlocal communities.
- The opportunity we now have to use technology to drive positive social, political, and economic transformations.
This document provides a summary of Lindsey Leitera's Senior Major Project analyzing rhetorical motives in information liberation texts from Richard Stallman to Edward Snowden. It traces the evolution of debates around political ideology, enlightenment ideals, identity, and transparency from 1983 to 2013. Key events discussed include Stallman's "GNU Manifesto", debates between hackers and entrepreneurs like Bill Gates, the emergence of hacktivism with Anonymous and WikiLeaks, and national security whistleblowing by Edward Snowden. The project uses rhetorical analysis of manifestos, essays, and other texts to understand how a "Hacker Ethic" of free information sharing has manifested over time and influenced digital activism and issues of cyber security, technology policy
The document discusses the history and development of social media and connectivity online. It notes that initially, users were drawn to social media sites to fulfill a need for human connection (paragraph 1). This connectivity then allowed platforms to build profitable online markets. After the creation of the World Wide Web in 1991, more interactive and two-way platforms for online social connections emerged after 2000 (paragraph 2). Everything once shared privately, like family photos, became publicly shared. The document outlines different types of social media and discusses how platforms and social practices evolved together. It also notes how connectivity became quantifiable through metrics like likes and followers (paragraph 3). While early platforms encouraged participation and peer production, they became larger and harder to regulate after 2005 as
The document discusses the history and development of social media and connectivity online. It notes that initially, users were drawn to social media sites to feel connected to others (paragraph 1). This connectivity allowed platforms to build profitable online markets. After the invention of the World Wide Web in 1991, more interactive and two-way forms of social media emerged after 2000 that further enabled online social interactions and sharing (paragraph 2). However, this also meant that intimate details and information that users previously only shared with close connections became public. The document then discusses how platforms and social media became more focused on algorithms, data tracking, and commercialization after 2005 in order to generate revenue from all the new connections and relationships being facilitated online (paragraphs 3-4
The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
Don't expect answers from a God of love; don't expect anything but love.Rhea Myers
This document contains a collection of short quotes and phrases on various topics including technology, information, content, mobile apps, politics, and more. It promotes contact information and credits for the presentation under a Creative Commons license. The document touches on many different ideas but does not provide an overarching theme or argument to summarize.
This document outlines a research study comparing the outcomes of the Spanish Indignados and Occupy Wall Street movements. It proposes a new framework for analyzing the political, cultural, and social impacts of networked social movements in the information age. This framework evaluates how movements' goals and values change over time, their cultural influence on civil society through online and offline support, and their impact on decision-making processes, institutions, and the political system. The study will use netnography, discourse analysis of movement materials, and interviews with activists to apply this framework to the Indignados and Occupy Wall Street cases.
A case for accountability-oriented design - keynote 2016 design and the cityDietmar Offenhuber
This document discusses accountability-oriented design, which calls attention to issues of governance and shapes public discourse through managing visibility. Accountability-oriented design makes systems more legible and acknowledges its own limitations. It can collect data, coordinate volunteers, and spread messages to ask hard questions. Examples discussed include technologies that track waste collection and provide public WiFi while also sensing urban data. The document argues accountability-oriented design does not explain but shows to facilitate discussion about limiting opacity through transparency in systems and infrastructure.
This document provides an overview of social media analysis and network science techniques. It discusses how to collect and graph data from Facebook and Twitter, and how to analyze the graphs using tools like NodeXL, Gephi, and SPSS. It describes how to identify influential users in a discussion and understand user roles. It also covers calculating basic network metrics, performing content and sentiment analysis, and examining individual user networks and how they are situated within broader networks. Finally, it discusses network interventions like stimulating influential users or groups, and optimizing network structure.
Honey-pot profiles and malevolent e-reputation attacks on FacebookNasri Messarra
The document discusses using "honeypot profiles" on Facebook to attract engaged fans of a target brand or group. It describes three methods for attracting friends to these honeypot profiles: common interests, popular friends, and impersonation. These optimized networks of engaged users can then be strategically used to influence brands or spread information organically without being banned from pages. While raising ethical questions, the authors argue this demonstrates how profiles can manipulate networks and that brands should be aware and prepared for future evolutions.
Soutenance Stratégie du marketing viral sur Facebook-v4_ENNasri Messarra
Nasri Messarra defended a PhD dissertation on viral marketing strategies on Facebook. The dissertation included 5 experiments analyzing initial seeding populations for information diffusion. Experiment 1 found that between 4-28% of users' social graphs could be rebuilt using fake profiles. Experiment 2 showed that a network of hubs centered around a fake profile was not an effective seeding population. Experiment 3 demonstrated that a population of engaged consumers increased virality by 400%. Experiment 4 identified political bridging nodes that could be used for seeding new ideas. Finally, Experiment 5 optimized the seeding population for a personal brand over time, increasing engagements. The dissertation provided both theoretical and methodological contributions regarding viral marketing and extracting social graphs on Facebook.
Rethinking marketing strategies on facebookNasri Messarra
This document discusses different marketing strategies on Facebook and which Facebook support is best for each. It finds that Facebook Pages are best for mass marketing and niche marketing, while Timelines are better for relationship marketing. Groups are also good for relationship marketing. Pages score highest overall for relationship marketing factors like identifying customers, building connections, and enhancing loyalty. Pages allow for the widest targeting and most tools for viral, mass, and niche marketing strategies. A work in progress will compare engagement for the same posts on a Facebook Page versus a personal Timeline.
Finding political network bridges on facebookNasri Messarra
Is it possible to use Facebook to identify bridges overlapping structural holes in polarized crowds on Facebook?
Experimenting on a political situation
Building reputation vectors using honeypot profiles on FacebookNasri Messarra
E-reputation has become an important concern for firms
Pampers, Nestlé and other brands have already paid the heavy price of fan attacks (Champoux et al., 2012; Paul Gillin, 2012; Steel, 2010).
The observation of the buzz and more particularly of the negative buzz (bad buzz) is important (Cuvelier, Aufaure, 2011)
Attacks on Facebook are more frequent and research is required to better understand and counteract them
Initiating a Network Effect in a Social Network - A Facebook ExperimentNasri Messarra
- Can we initiate network effects on the Facebook social network in a non-automated experiment under controlled environment?
- How to put into evidence network effects in a social network?
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
04062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
Essential Tools for Modern PR Business .pptxPragencyuk
Discover the essential tools and strategies for modern PR business success. Learn how to craft compelling news releases, leverage press release sites and news wires, stay updated with PR news, and integrate effective PR practices to enhance your brand's visibility and credibility. Elevate your PR efforts with our comprehensive guide.
Here is Gabe Whitley's response to my defamation lawsuit for him calling me a rapist and perjurer in court documents.
You have to read it to believe it, but after you read it, you won't believe it. And I included eight examples of defamatory statements/
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
Acolyte Episodes review (TV series) The Acolyte. Learn about the influence of the program on the Star Wars world, as well as new characters and story twists.
1. From Smart Mobs
to Smart Govs
The New Shift in Power
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 1
2. Smart Mobs
• Smart Mobs: The Next Social Revolution (Howard
Rheingold, 2002)
• Social, economic and political changes implicated by
developing technology
• Collective Intelligence
• Crowd Dynamics
• Shift in Power: Communities Dominate Brands
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 2
3. Govs Dominate Crowds
Smart Mobs
(2002)
Arab Spring
(2010)
“Smart Govs”
(2011)
"thumb tribes" in Tokyo
and Helsinki use text
messaging to organize
impromptu raves or to
stalk celebrities
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 3
4. Network Interventions
• Network Engineering:
Alteration
• Physically Eliminating Hubs
and Bridges
• Infiltrating the Social
Networks
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 4
5. Psychometrics
• Post-Truth Era: Emotions not Facts
• “in this era of post-truth politics, it's easy to cherry-pick data and come to whatever conclusion you
desire” (Oxford Dictionary)
• Our smartphone is a vast psychological questionnaire that we are constantly filling out, both consciously
and unconsciously (Michal Kosinksi, Cambridge Psychometrics Center)
• Weaponized online rumors and fake news have the upper hand over activist idealism (The Economist,
2017)
• Hijacked Democracy
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 5
6. Majority Illusion Paradox
• Social Bots:
Automation of
manipulation
• Niche Influencers,
Bridges and High
PageRank
• Easily Influenced
People vs Influencers
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 6
7. PolarizationofDiscussions
Twitter discussion about the garbage crisis
Sep. 8, 2015
Civil society groups
Community Clusters
Twitter discussion about the garbage crisis
Feb. 2, 2016
Two major groups: IranianAffairs and KSA24
Polarized crowds
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 7
8. The next big threat
0% Traceability
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 8
9. If you have to pick one fight
• The right to know the source / Right to know the origin:
• Who posted it first?
• Creator vs Sender
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 9
10. Tech4Journalism
• Hire Big Data Analysts
• Own your Data
• Choice of channels
• Business Model
• Learn the Processes
• Fight Back
15-Dec-17 Nasri Messarra (http://nasri.messarra.com) 10
Editor's Notes
Tech4Freedom: Democracy and Human Rights in the Digital Age
Wajih Ajouz Award for Online Activism
Beirut, 14-15 December 2017
The 2011 Khuzestan protests, known among protesters as the Ahvaz Day of Rage, relates to violent protests, which erupted on 15 April 2011 in Iranian Khuzestan, to mark an anniversary of the 2005 Ahvaz unrest, and as a response to the regional Arab Spring. The protests lasted for 4 days and resulted in 12 to 15 protesters killed and many wounded and arrested. 1 security officer was killed as well, and another wounded.[2] Crackdown on Arab political opposition in the area continued since with arrests and executions.[3]