SlideShare a Scribd company logo
1 of 49
Twitter as a Social Reporting Tool
under Crisis Events: Two Studies
K. Hazel Kwon, PhD
Culture and Communication
Drexel University
Organization of the Presentation
1. Presenting a preceding study “Rumor theory
and Twitter during the Haiti Earthquake
2010”: To contextualize how the main research
began
2. Presenting the main study “The second-level
gatekeeping and content concentration in
Twitter: A temporal analysis of Gaza conflict
2009”
2011 Japan earthquake
& Tsunami:
•8.9
•15,844
• 5,890
•3,451
•A number of nuclear
accident
QUAKEBOOK:
•A Twitter-sourced
charity book
•Essays about the
moment of earthquake
•100% profits sent as
donation
“Day of Revolt 2011” in
Egypt
•2 millions at Tahrir Square
• The downfall of Murabak
•The April 6 Youth
Movement on Facebook
“We use Facebook to
schedule the protests,
Twitter to coordinate, and
YouTube to tell the world.”
“Ushahidi Project”
•Al-Jazeera collaborated
with Ushahidi during
Gaza-Israel conflict.
•“Networked Journalism”
• Citizens use mobile
media to report violence,
death, protest,
international aid, rape
etc.
What are in Common?
• Strategic communication (i.e. goal-oriented,
intend to change attitudes or behaviors or
mobilize actions).
• Communication exchanges on a global scale.
• Use mobile media and the Internet.
• Use the recent web applications (e.g. Facebook,
Twitter, Aggregating web services):
Social Media based
strategic communication
The preceding study: Twitter during
Haiti Earthquake 2010
• A project about the use of
social media as a social
reporting tool under
natural disasters.
• The Haiti paper looked at
the process of ambiguous
message exchanges
(rumors) developing into
strategic communication
and social collaboration.
The preceding study: Twitter during
Haiti Earthquake 2010
• The key finding was …
• Rumors are reduced by
adding credence to
information.
• Credible information helps
users understand the
situation correctly and
coordinate actions to solve
problems.
To reduce rumors…
To reduce rumors…
To reduce ambiguity, the
process to authenticate
information is necessary!
1) Aim of the study
To understand the process of information
authentication and how it led to the emergence of
collaboration in Twitter during Haiti Earthquake.
2) Methods
• Tweets from Jan 12th to Jan 21st, 2010.
• Search hashtags (#): HaitiEarthquake, HaitiQuake,
HaitiHelp.
• Contents were categorized into three types of
statements: Ambiguous, Authenticating, and
Strategic
Haiti Earthquake 2010
Statement Description Examples
Ambiguous •Emotionally charged
statements
•Questions and comments
without supporting
materials
•“My soul is deeply sad”
•“Which relief agencies donate
aid to Haiti?”
•“I have no idea if it‟s true or
not”
Authenticati
ng
•Add credence to what the
user says
•Citing reputed source or
references to self /others as
an expert on something
•“CNN reporting a further 2
aftershocks in Haiti mag 5.9
and 5.5”
Strategic •Statements that suggest a
course of action
•“Please RT to help the victims
of today's earthquake!”
Statement Categories
Stage 1 Stage 2 Stage 3 Stage 4
Ambiguous
Authenticating
Haiti Earthquake 2010: Change of
Twitter communication over time
Stage 1 Stage 2 Stage 3 Stage 4
Ambiguous
Authenticating
Strategic
Haiti Earthquake 2010: Change of
Twitter communication over time
Stage 1 Stage 4
Pentagon: authenticating words; Triangle: strategic words
Haiti Earthquake 2010: Semantic
Network Analysis
Conclusions from the study…
• Information authentication is the most prominent
communication process under the crisis event.
• It‟s enacted by lending credence to what users say.
• Credence is gained by reliable sources such as links
to pictures, mainstream media, or well-known
organizations.
• In other words, by citing external contents
outside Twitter.
• Sharing external content results in re-circulating/re-
distributing existing online contents.
Sharing preexisting online content
• A significant part of Twitter practice, especially to use
the media for strategic communication.
• Majority previous studies assume Twitter users as
content creators rather than distributors.
• Distribution is not merely a passive consumption: the
practice is enacted based on users‟ decision making
within the established media dynamics.
Main Study:
A Temporal Analysis of User-Selected
Contents in Twitter during the 2009 Gaza
Conflict
Contributions of the study
• Theoretically…
 Introduce a concept of “second-level gatekeeping”
adapting social media environment (i.e. Twitter).
 Understand the distribution pattern of online news
contents in social media (i.e. Twitter)
• In practice…
 Strategic use of Twitter does not occur in a vacuum.
 One of the early studies to discuss the utility of social
media as a carrier of citizen engagement within the
constrains of preexisting media dynamics.
Traditional Model of Gatekeeping
• “The process by which selections are made in media
work, especially decisions whether or not to admit a
particular news story to pass through the „gates‟ of a
news medium” (McQuail, 1994, p.213)
• Traditional model…
- A series of filtering mechanisms within the provider‟s
system.
-The role of receiver was considered not as a part of
processing but as a final destination after the processing.
- Traditional model is not comprehensive in the user-
centric social media environment.
The ‘Second-level’ Gatekeeping
• The “Gated” (Barzilai-Nahon, 2008): users
intervene in gatekeeping mechanism by…
1. participating in producing new information
2. participating in circulating already existing
information
The second-level gatekeeping
Decision-making on what to select over other
alternatives: Processed news products are just one
option among all types of resources on the Web
Reconstructing information by adding the user‟s
own comment
Usually enacted by linking URL to a post
The ‘Second-level’ Gatekeeping
• The “Gated” (Barzilai-Nahon, 2008): users
intervene in gatekeeping mechanism by…
1. participating in producing new information
2. participating in circulating already existing
information
 the second-level gatekeeping
 decision-making on what to select over other
alternatives: processed news products are just one
option among all types of resources on the Web
 reconstructing information by adding the user‟s
own comment
usually enacted by linking URL to a post
Second-level Gatekeepers (SG)vs.
Opinion Leaders (OL)
• Incorporates the “two-step flow” model (Katz, 1957)
into the gatekeeping theory
• OL in two-step flow: receive information from the elite
media and influence on interpersonal networks
• Differences between OL and SG…
1) recipients of vs. participants in news production
2) influence only their social circles vs. including
unknown strangers online
3) verbal conversation vs. textual reporting (editable &
reproducible)
Second-level Gatekeeping in Twitter
does NOT occur in a vacuum
• Affected by the established media dynamics
(Napoli, 2008, p.57)
• Online Realm
- the semblance of openness and lowered entry
barrier.
- not ideally decentralized.
- audience attention clustered around corporatized
online services and the off-to-online presence of
traditional mass media realm.
- “Power-law” distribution
As diverse & decentralized as we
conveniently assume?
• Some critics against the decentralized web…
1. Sunstein (2001): Self-regulation prevents
comprehensive info. adoption.
2. Mitchelstein and Bockzkowski (2010) : No radically
different news consumption habit from offline.
3. Meraz (2009): Elite journalism and celebrity
bloggers hold he blogsophere, leading the unequal
structure, following “power-law” model.
4. Hindman (2009): Political use of the Internet shows
an unequal structure, following “power-law” model.
Hypotheses
H1: Twitter users‟ selection of news contents will
collectively produce a power-law
structure, representing the uneven
representation among the available content
providers.
0
20
40
60
80
100
120
140
160
180
200
0 10 20 30 40 50
P(K)=numberofproviders
ateachk
k = a frequency of being tweeted
Hypotheses
Why unequal structure?
Twitter‟s participatory potential is confined by…
1) The existing web infrastructure
(Hyperlink structure)
H2: The hyperlinks structure configured on the
general Web will be positively associated with
the frequency at which Twitter users select a
particular online content for redistribution.
Hypotheses
2) Traditional media force:
- Item diversity does not necessarily lead to exposure
diversity (Yim, 2003).
- Twitter users will be more likely to choose contents
created by traditional media realm due to their
familiarity to its format and channel royalty, and the
relative mass appeal of the high-budget products
H3: Twitter users‟ content selection will be
concentrated more to the traditional media
realm than other alternative forms of
contents.
Hypotheses
3) Interaction between the two?
- Mass media content may be preferred when the
website gains popularity thus is ranked on top from
the search results.
- Even though search result presents a website in a
higher-order, it may not be considered as the most
relevant if the source site were never heard
previously
H4: Twitter users‟ content selection will be
influenced by the interaction effects between
content types and hyperlinks structure.
Temporal Analysis
• Selection of news contents can also be
contingent on the news lifespan.
• Although a conflict is an instantaneous incident
at the moment when it breaks out, a more
complex political agenda can be unveiled as the
news is progressed.
RQ1: Is there any difference in Twitter news
selection according to the news lifespan?
Retweeting
• Purposive practices
• Facilitates rapid information diffusion within Twitter
• Create collective minds among the users of shared
interests
• Two types of retweeting:
(1) Retweeting external content
(2) Retweeting internally generated content : a special
case of second-level gatekeeping in Twitter
Retweeting
• Purposive practices
• Facilitates rapid information diffusion within Twitter
• Create collective minds among the users of shared
interests
• Two types of retweeting:
(1) Retweeting external content
(2) Retweeting internally generated content : a special
case of second-level gatekeeping in Twitter
RQ2: What types of messages are re-circulated via
retweeting among the internally generated content in
Twitter?
Methods
• Topic: Israel-Gaza Conflict from Dec 27, 2008 to Jan
18, 2009
- one of the representative international conflict news
- active use of social media: called „PR war”
• Data: Tweets made by personal users
- 860 first-hand tweets (only external links)
- 521 retweets (both internal content and external links)
• External sources cleaned including the top two or three
level domain names (http://www.zzz.zzz or
http://www.zzz.zzz.zzz )
• For temporal analysis: the data split into incident periods
▫ Early: Time 1 (Dec 27 – Jan 5)
▫ Late: Time 2 (Jan 6 – Jan 18)
Variables
• DV: a frequency of a content provider‟s website being
selected
• IVs:
(1) Content Types: Traditional media, Commercial social
media, Online journalism, Personal providers, Other org.
/institutional/community websites (Cohen‟s Kappa =
.89)
(2) Hyperlinks: In-coming hyperlinks to a particular
provider‟s website as an indicator of its popularity
(based on a global traffic)
Types Description Examples
Traditional Newswire, broadcasting, and print mass media.
Offline presence
Target mass audiences, wit a broad range of topics
cnn.com
aljazeera.com
guardian.co.uk
Social
Media
Commercial company providing a space for users
to easily create and share contents.
Sometimes, have an automatic aggregation
function.
youtube.com
reddit.com
facebook.com
Online
Journalism
The websites with journalistic writing style yet do
not have offline edition.
Have independent domain names.
alternet.org
huffingtonpost
allvoices.com
Personal Informal websites run by either an individual or a
small number of people.
Do not have formal organizational structure.
polizero.com
andycarvin.com
buzzsuggest.com
Others Any organizational/institutional/community
websites that were not categorized in any of above.
E.g. governmental, corporate, educational,
research, advocacy organizational websites.
gazatalk.com
un.org
arabmediasociety.
com
Descriptive Results
• A total of 256 unique content providers were tweeted
• The average frequency of being tweeted is 3, yet with a
huge variations, ranging from 41 times to 1 times.
• The most frequently tweeted:
Re-plotting after log-transformations
(Test of Power-law distribution)
Highly Selective representation: Majority of
providers (N = 176, 68.8%) selected only by a
single user (R2 = .80, p < .0001) H1 supported
-0.5
0
0.5
1
1.5
2
2.5
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8
logtransformedP(k)
log transformed k
H2~4: Negative Binomial Regression
Models (NBR)
•Regression model with the count DV.
•Content Type is a categorical variable, requiring a
reference level.
(1) „traditional media realm‟ was hypothesized as to be
more influential.
(2) „commercial social media‟ showed the highest mean
frequency among all.
Descriptive Analysis
TIME 1 TIME2
FRQ HYP N FRQ HYP N
Traditional 2.92 9.34 48 2.64 9.27 55
Social
media
3.43 10.74 28 5.75 9.30 22
On Journal 1.84 8.12 25 1.43 8.42 23
Personal 1.05 5.12 21 1.10 5.88 22
Other 1.88 6.66 33 2.47 8.21 35
Total 2.36 8.27 155 2.45 8.14 157
Hypotheses Testing
log(Tweet Frequency) = Intercept + b1(CT=traditional media)
+ b2(CT=online journalism) + b3(CT = personal) + b4(CT
= org/inst/community) + b5Hyperlinks + b6
(CT=traditional media)*Hyperlinks + b7CT=(online
journalism)*Hyperlinks + b8(CT=personal)*Hyperlinks
+ b9(CT=org/inst/community)*Hyperlinks.
• H2 (Hyperlinks effects): Supported on both stages
• H3 (Content Type effects): Not supported
• H4 (Interaction between Hyperlinks and Content
Type): Only supported on the later stage.
Model Effects
TIME 1 TIME 2
Wald df Sig. Wald df Sig.
Intercept 2.13 1 0.144 0.01 1 0.959
Hyperlinks 7.3** 1 0.007 5.09* 1 0.024
CT 2.06 4 0.725 3.79 4 0.436
CT x
Hyperlinks 3.01 4 0.556 10.49* 4 0.033
NOTE: CT = Content Types
Parameter Estimate for Time 2 (social
media as a reference)
B SE C.I. Wald χ2 Exp
(B)Low High
(Intercept)** -0.96 0.74 0.09 1.63 1.69 0.38
(CT =TM) 0.68 1.01 0.27 14.38 0.45 1.97
(CT =OJ) 1.26 1.01 0.49 25.58 1.56 3.53
(CT =Personal) 1.04 0.89 0.50 16.08 1.38 2.83
(CT =Other) 1.74 0.94 0.90 36.15 3.41 5.70
Hyperlinks *** 0.25 0.07 1.12 1.47 12.84 1.28
(CT =TM) x HP -0.12 0.10 0.73 1.08 1.39 0.89
(CT = OJ)x HP* -0.24 0.10 0.64 0.96 5.60 0.79
(CT = Personal) x
HP *
-0.25 0.10 0.65 0.94 6.50 0.78
(CT = other) x
HP**
-0.27 0.10 0.62 0.93 6.85 0.76
TIME 1 TIME 2
blue:
traditional
green:
social media
green:
social media
blue:
traditional
Qualitative Analysis of Retweeting
internal contents (RQ2)
• 45.1% were internally produced tweets.
• News alerts from professional news organization
(BNO: 46 times, AlGaza: 38 times)
• 134 include ordinary users‟
emotional/expressive comments:
(1) tactical information (e.g. where and how to
meet up for protest)
(2) expressive catchphrases (e.g. “War criminal
Tony Blair called the situation Gaza „hell‟”.)
Conclusion & Discussions (1)
• Hyperlinks from general online public influences users‟
information selection process in Twitter.
• CT becomes influential as time goes by, but only when
interacting with Hyperlinks effects: Traditional form of
contents does not necessarily guarantee the successful
„filtering-in‟.
• The popular use of commercial social media among
Twitter users: Smart adaptation of popular web
applications (i.e. aggregator website) requited for less
visible content providers (e.g. Human Rights campaign
delivered by Youtube or CNN I-Report better than by its
own website)
Conclusion & Discussions (2)
• As a collective outcome, user selection reveals a few
prominent information providers and a large
number of less visible providers…any implication
regarding the diversification & decentralization of
online news consumption?
• Retweeting to disseminate not only information but
also emotions and strategic actions.
• Limitations…
- no causal assessment possible
- one specific case: question about generalizability?
- English only
References
Barzilai-Nahon, K. (2008). Toward a theory of network gatekeeping: A framework for exploring
information control. The Journal of the American Society of Information Science and
Technology, 59(9), 1493-1512.
Katz, E. (1957). The two-step flow of communication: An up-to-date report on a hypothesis. The
Public Opinion Quarterly, 21(1), 61-78
Meraz, S. (2009). Is there an elite hold? Traditional media to social media agenda setting influence
in blog networks. Journal of Computer-Mediated Communication, 14, 682-707.
Napoli, P. M. (2008). Hyperlinking and the force of “massification.” In J. Turrow and L. Tsui
(Eds.), The Hyperlinked Society (p.56-69). Ann Arbor, MI: The University of Michigan Press.
Hindman, M. (2008). The Myth of Digital Democracy. Princeton, NJ: Princeton University Press.
McQuail, D. (1994). Mass communication theory: An introduction, 3rd ed., London, UK: Sage.
Mitchelstein, E. & Boczkowski, P. J. (2010). Online news consumption research: An assessment of
past work and an agenda for the future. New Media Society, 12, 1085-1102.
Sunstein, C. (2001). Republic.com. Princeton, NJ: Princeton University Press.
Yim, J. (2003). Audience concentration in the media: Cross-media comparisons and the
introduction of uncertainty measure. Communication Monograph, 70(2), 114-128.
Thanks! Any Questions? Comments?

More Related Content

What's hot

Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Nick Jankowski
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackCOMRADES project
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
How CNN's iReport Works the Research
How CNN's iReport Works the ResearchHow CNN's iReport Works the Research
How CNN's iReport Works the ResearchAmani Channel
 
Measuring User Influence in Twitter
Measuring User Influence in TwitterMeasuring User Influence in Twitter
Measuring User Influence in Twitteraugustodefranco .
 
Jasist11
Jasist11Jasist11
Jasist11svennus
 
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...Shalin Hai-Jew
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...Liliana Bounegru
 
Strategic use of Twitter in Local Government: A Northern Ireland Study
Strategic use of Twitter in Local Government: A Northern Ireland StudyStrategic use of Twitter in Local Government: A Northern Ireland Study
Strategic use of Twitter in Local Government: A Northern Ireland StudyUlster University
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011filippotrevisan
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social JusticeJodi Sperber
 
Datactic, Data with Tactics
Datactic, Data with TacticsDatactic, Data with Tactics
Datactic, Data with TacticsPablo Aragón
 
Redistributing journalism: Journalism as a data public and the politics of qu...
Redistributing journalism: Journalism as a data public and the politics of qu...Redistributing journalism: Journalism as a data public and the politics of qu...
Redistributing journalism: Journalism as a data public and the politics of qu...Liliana Bounegru
 
Doing Social and Political Research in a Digital Age: An Introduction to Digi...
Doing Social and Political Research in a Digital Age: An Introduction to Digi...Doing Social and Political Research in a Digital Age: An Introduction to Digi...
Doing Social and Political Research in a Digital Age: An Introduction to Digi...Liliana Bounegru
 
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOK
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOKPOLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOK
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOKIJwest
 

What's hot (20)

How to Leverage Social Media Communities for Crisis Response Coordination
How to Leverage Social Media Communities for Crisis Response CoordinationHow to Leverage Social Media Communities for Crisis Response Coordination
How to Leverage Social Media Communities for Crisis Response Coordination
 
Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000Jankowski & van selm, promise and practice of public debate, 2000
Jankowski & van selm, promise and practice of public debate, 2000
 
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet HaystackHelping Crisis Responders Find the Informative Needle in the Tweet Haystack
Helping Crisis Responders Find the Informative Needle in the Tweet Haystack
 
C0353015018
C0353015018C0353015018
C0353015018
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
How to get started with Data Journalism
How to get started with Data JournalismHow to get started with Data Journalism
How to get started with Data Journalism
 
How CNN's iReport Works the Research
How CNN's iReport Works the ResearchHow CNN's iReport Works the Research
How CNN's iReport Works the Research
 
Measuring User Influence in Twitter
Measuring User Influence in TwitterMeasuring User Influence in Twitter
Measuring User Influence in Twitter
 
Jasist11
Jasist11Jasist11
Jasist11
 
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods:  Extracting So...
Hashtag Conversations,Eventgraphs, and User Ego Neighborhoods: Extracting So...
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Strategic use of Twitter in Local Government: A Northern Ireland Study
Strategic use of Twitter in Local Government: A Northern Ireland StudyStrategic use of Twitter in Local Government: A Northern Ireland Study
Strategic use of Twitter in Local Government: A Northern Ireland Study
 
2053951715611145
20539517156111452053951715611145
2053951715611145
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
 
Twitter And Social Justice
Twitter And Social JusticeTwitter And Social Justice
Twitter And Social Justice
 
Datactic, Data with Tactics
Datactic, Data with TacticsDatactic, Data with Tactics
Datactic, Data with Tactics
 
Redistributing journalism: Journalism as a data public and the politics of qu...
Redistributing journalism: Journalism as a data public and the politics of qu...Redistributing journalism: Journalism as a data public and the politics of qu...
Redistributing journalism: Journalism as a data public and the politics of qu...
 
Doing Social and Political Research in a Digital Age: An Introduction to Digi...
Doing Social and Political Research in a Digital Age: An Introduction to Digi...Doing Social and Political Research in a Digital Age: An Introduction to Digi...
Doing Social and Political Research in a Digital Age: An Introduction to Digi...
 
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOK
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOKPOLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOK
POLITICAL OPINION ANALYSIS IN SOCIAL NETWORKS: CASE OF TWITTER AND FACEBOOK
 

Similar to Twitter as Social Reporting Tool: Two Studies of Crisis Events

Predicting opinion leadership on twitter
Predicting opinion leadership on twitter   Predicting opinion leadership on twitter
Predicting opinion leadership on twitter Weiai Wayne Xu
 
Leading discussion - Group 7
Leading discussion - Group 7Leading discussion - Group 7
Leading discussion - Group 7Yidan Lin
 
Finding News Curators in Twitter
Finding News Curators in TwitterFinding News Curators in Twitter
Finding News Curators in TwitterGabriela Agustini
 
Assignment #10 (p2): Group coursework presentation of research
Assignment #10 (p2): Group coursework presentation of researchAssignment #10 (p2): Group coursework presentation of research
Assignment #10 (p2): Group coursework presentation of researchmedia_jojo
 
Assignment 10 group coursework presentation of research draft 2 part 1.5
Assignment 10   group coursework presentation of research draft 2 part 1.5Assignment 10   group coursework presentation of research draft 2 part 1.5
Assignment 10 group coursework presentation of research draft 2 part 1.5Abc Abc
 
Presentation
PresentationPresentation
Presentationokunka
 
Presentation
PresentationPresentation
Presentationospinaan
 
Presentation
PresentationPresentation
PresentationSprowlt
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
 
David gauntlett and media 2.0
David gauntlett and media 2.0David gauntlett and media 2.0
David gauntlett and media 2.0Charis Creber
 
11 2-15 twitter and social media
11 2-15 twitter and social media11 2-15 twitter and social media
11 2-15 twitter and social mediaSung Woo Yoo
 
04 05-16 social media and news
04 05-16 social media and news04 05-16 social media and news
04 05-16 social media and newsSung Woo Yoo
 
Sir, rooh ul amin by asmat wazir
Sir, rooh ul amin by asmat wazirSir, rooh ul amin by asmat wazir
Sir, rooh ul amin by asmat wazirAsmat Wazir
 
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...Twitter, Public Communication and the Media Ecology: The Case of the Queensla...
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...Axel Bruns
 

Similar to Twitter as Social Reporting Tool: Two Studies of Crisis Events (20)

Gaza Co-Tweet
Gaza Co-TweetGaza Co-Tweet
Gaza Co-Tweet
 
Predicting opinion leadership on twitter
Predicting opinion leadership on twitter   Predicting opinion leadership on twitter
Predicting opinion leadership on twitter
 
Leading discussion - Group 7
Leading discussion - Group 7Leading discussion - Group 7
Leading discussion - Group 7
 
Finding News Curators in Twitter
Finding News Curators in TwitterFinding News Curators in Twitter
Finding News Curators in Twitter
 
Presentacion defensa marcelo_2018_v01
Presentacion defensa marcelo_2018_v01Presentacion defensa marcelo_2018_v01
Presentacion defensa marcelo_2018_v01
 
Assignment #10 (p2): Group coursework presentation of research
Assignment #10 (p2): Group coursework presentation of researchAssignment #10 (p2): Group coursework presentation of research
Assignment #10 (p2): Group coursework presentation of research
 
Assignment 10 group coursework presentation of research draft 2 part 1.5
Assignment 10   group coursework presentation of research draft 2 part 1.5Assignment 10   group coursework presentation of research draft 2 part 1.5
Assignment 10 group coursework presentation of research draft 2 part 1.5
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Presentation
PresentationPresentation
Presentation
 
David gauntlett and media 2.0
David gauntlett and media 2.0David gauntlett and media 2.0
David gauntlett and media 2.0
 
11 2-15 twitter and social media
11 2-15 twitter and social media11 2-15 twitter and social media
11 2-15 twitter and social media
 
04 05-16 social media and news
04 05-16 social media and news04 05-16 social media and news
04 05-16 social media and news
 
Sir, rooh ul amin by asmat wazir
Sir, rooh ul amin by asmat wazirSir, rooh ul amin by asmat wazir
Sir, rooh ul amin by asmat wazir
 
Summaries 1-4
Summaries 1-4Summaries 1-4
Summaries 1-4
 
A research paper on Twitter_Intrinsic versus image related utility in social ...
A research paper on Twitter_Intrinsic versus image related utility in social ...A research paper on Twitter_Intrinsic versus image related utility in social ...
A research paper on Twitter_Intrinsic versus image related utility in social ...
 
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...Twitter, Public Communication and the Media Ecology: The Case of the Queensla...
Twitter, Public Communication and the Media Ecology: The Case of the Queensla...
 

More from Kyounghee Hazel Kwon

SNA Example : Twitter Conversation
SNA Example : Twitter ConversationSNA Example : Twitter Conversation
SNA Example : Twitter ConversationKyounghee Hazel Kwon
 
Network Exposure Influence on Facebook Behaviors
Network Exposure Influence on Facebook BehaviorsNetwork Exposure Influence on Facebook Behaviors
Network Exposure Influence on Facebook BehaviorsKyounghee Hazel Kwon
 
Protest Communication in Twitter: An Emergent Norm Perspective
Protest Communication in Twitter: An Emergent Norm PerspectiveProtest Communication in Twitter: An Emergent Norm Perspective
Protest Communication in Twitter: An Emergent Norm PerspectiveKyounghee Hazel Kwon
 
Twitter and Jan 25 Egyptian Protest
Twitter and Jan 25 Egyptian ProtestTwitter and Jan 25 Egyptian Protest
Twitter and Jan 25 Egyptian ProtestKyounghee Hazel Kwon
 

More from Kyounghee Hazel Kwon (20)

LIWC: Give It A Try
LIWC: Give It A Try LIWC: Give It A Try
LIWC: Give It A Try
 
SNA Example : Twitter Conversation
SNA Example : Twitter ConversationSNA Example : Twitter Conversation
SNA Example : Twitter Conversation
 
MCO 436 syllabus
MCO 436 syllabus MCO 436 syllabus
MCO 436 syllabus
 
Sentiment analysis example
Sentiment analysis exampleSentiment analysis example
Sentiment analysis example
 
Network Exposure Influence on Facebook Behaviors
Network Exposure Influence on Facebook BehaviorsNetwork Exposure Influence on Facebook Behaviors
Network Exposure Influence on Facebook Behaviors
 
Protest Communication in Twitter: An Emergent Norm Perspective
Protest Communication in Twitter: An Emergent Norm PerspectiveProtest Communication in Twitter: An Emergent Norm Perspective
Protest Communication in Twitter: An Emergent Norm Perspective
 
Twitter and Jan 25 Egyptian Protest
Twitter and Jan 25 Egyptian ProtestTwitter and Jan 25 Egyptian Protest
Twitter and Jan 25 Egyptian Protest
 
SNA clustering
SNA clusteringSNA clustering
SNA clustering
 
COM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypesCOM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypes
 
COM494_SNA metrics
COM494_SNA metricsCOM494_SNA metrics
COM494_SNA metrics
 
SNA & NodeXL Basics
SNA & NodeXL BasicsSNA & NodeXL Basics
SNA & NodeXL Basics
 
Version226
Version226Version226
Version226
 
COM 494 Networked information
COM 494 Networked informationCOM 494 Networked information
COM 494 Networked information
 
Smn networked creators lecture
Smn networked creators lectureSmn networked creators lecture
Smn networked creators lecture
 
COM494_Networked Family
COM494_Networked Family COM494_Networked Family
COM494_Networked Family
 
COM494 Networked Work
COM494 Networked WorkCOM494 Networked Work
COM494 Networked Work
 
COM494_Networked Relationship
COM494_Networked RelationshipCOM494_Networked Relationship
COM494_Networked Relationship
 
COM494 mobile revolution
COM494 mobile revolution COM494 mobile revolution
COM494 mobile revolution
 
COM494 Internet Revolution
COM494 Internet RevolutionCOM494 Internet Revolution
COM494 Internet Revolution
 
COM494 Social Network Revolution
COM494 Social Network RevolutionCOM494 Social Network Revolution
COM494 Social Network Revolution
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Twitter as Social Reporting Tool: Two Studies of Crisis Events

  • 1. Twitter as a Social Reporting Tool under Crisis Events: Two Studies K. Hazel Kwon, PhD Culture and Communication Drexel University
  • 2. Organization of the Presentation 1. Presenting a preceding study “Rumor theory and Twitter during the Haiti Earthquake 2010”: To contextualize how the main research began 2. Presenting the main study “The second-level gatekeeping and content concentration in Twitter: A temporal analysis of Gaza conflict 2009”
  • 3. 2011 Japan earthquake & Tsunami: •8.9 •15,844 • 5,890 •3,451 •A number of nuclear accident QUAKEBOOK: •A Twitter-sourced charity book •Essays about the moment of earthquake •100% profits sent as donation
  • 4. “Day of Revolt 2011” in Egypt •2 millions at Tahrir Square • The downfall of Murabak •The April 6 Youth Movement on Facebook “We use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world.”
  • 5. “Ushahidi Project” •Al-Jazeera collaborated with Ushahidi during Gaza-Israel conflict. •“Networked Journalism” • Citizens use mobile media to report violence, death, protest, international aid, rape etc.
  • 6. What are in Common? • Strategic communication (i.e. goal-oriented, intend to change attitudes or behaviors or mobilize actions). • Communication exchanges on a global scale. • Use mobile media and the Internet. • Use the recent web applications (e.g. Facebook, Twitter, Aggregating web services): Social Media based strategic communication
  • 7. The preceding study: Twitter during Haiti Earthquake 2010 • A project about the use of social media as a social reporting tool under natural disasters. • The Haiti paper looked at the process of ambiguous message exchanges (rumors) developing into strategic communication and social collaboration.
  • 8. The preceding study: Twitter during Haiti Earthquake 2010 • The key finding was … • Rumors are reduced by adding credence to information. • Credible information helps users understand the situation correctly and coordinate actions to solve problems.
  • 10. To reduce rumors… To reduce ambiguity, the process to authenticate information is necessary!
  • 11. 1) Aim of the study To understand the process of information authentication and how it led to the emergence of collaboration in Twitter during Haiti Earthquake. 2) Methods • Tweets from Jan 12th to Jan 21st, 2010. • Search hashtags (#): HaitiEarthquake, HaitiQuake, HaitiHelp. • Contents were categorized into three types of statements: Ambiguous, Authenticating, and Strategic Haiti Earthquake 2010
  • 12. Statement Description Examples Ambiguous •Emotionally charged statements •Questions and comments without supporting materials •“My soul is deeply sad” •“Which relief agencies donate aid to Haiti?” •“I have no idea if it‟s true or not” Authenticati ng •Add credence to what the user says •Citing reputed source or references to self /others as an expert on something •“CNN reporting a further 2 aftershocks in Haiti mag 5.9 and 5.5” Strategic •Statements that suggest a course of action •“Please RT to help the victims of today's earthquake!” Statement Categories
  • 13. Stage 1 Stage 2 Stage 3 Stage 4 Ambiguous Authenticating Haiti Earthquake 2010: Change of Twitter communication over time
  • 14. Stage 1 Stage 2 Stage 3 Stage 4 Ambiguous Authenticating Strategic Haiti Earthquake 2010: Change of Twitter communication over time
  • 15. Stage 1 Stage 4 Pentagon: authenticating words; Triangle: strategic words Haiti Earthquake 2010: Semantic Network Analysis
  • 16. Conclusions from the study… • Information authentication is the most prominent communication process under the crisis event. • It‟s enacted by lending credence to what users say. • Credence is gained by reliable sources such as links to pictures, mainstream media, or well-known organizations. • In other words, by citing external contents outside Twitter. • Sharing external content results in re-circulating/re- distributing existing online contents.
  • 17. Sharing preexisting online content • A significant part of Twitter practice, especially to use the media for strategic communication. • Majority previous studies assume Twitter users as content creators rather than distributors. • Distribution is not merely a passive consumption: the practice is enacted based on users‟ decision making within the established media dynamics.
  • 18. Main Study: A Temporal Analysis of User-Selected Contents in Twitter during the 2009 Gaza Conflict
  • 19. Contributions of the study • Theoretically…  Introduce a concept of “second-level gatekeeping” adapting social media environment (i.e. Twitter).  Understand the distribution pattern of online news contents in social media (i.e. Twitter) • In practice…  Strategic use of Twitter does not occur in a vacuum.  One of the early studies to discuss the utility of social media as a carrier of citizen engagement within the constrains of preexisting media dynamics.
  • 20. Traditional Model of Gatekeeping • “The process by which selections are made in media work, especially decisions whether or not to admit a particular news story to pass through the „gates‟ of a news medium” (McQuail, 1994, p.213) • Traditional model… - A series of filtering mechanisms within the provider‟s system. -The role of receiver was considered not as a part of processing but as a final destination after the processing. - Traditional model is not comprehensive in the user- centric social media environment.
  • 21. The ‘Second-level’ Gatekeeping • The “Gated” (Barzilai-Nahon, 2008): users intervene in gatekeeping mechanism by… 1. participating in producing new information 2. participating in circulating already existing information The second-level gatekeeping Decision-making on what to select over other alternatives: Processed news products are just one option among all types of resources on the Web Reconstructing information by adding the user‟s own comment Usually enacted by linking URL to a post
  • 22. The ‘Second-level’ Gatekeeping • The “Gated” (Barzilai-Nahon, 2008): users intervene in gatekeeping mechanism by… 1. participating in producing new information 2. participating in circulating already existing information  the second-level gatekeeping  decision-making on what to select over other alternatives: processed news products are just one option among all types of resources on the Web  reconstructing information by adding the user‟s own comment usually enacted by linking URL to a post
  • 23.
  • 24. Second-level Gatekeepers (SG)vs. Opinion Leaders (OL) • Incorporates the “two-step flow” model (Katz, 1957) into the gatekeeping theory • OL in two-step flow: receive information from the elite media and influence on interpersonal networks • Differences between OL and SG… 1) recipients of vs. participants in news production 2) influence only their social circles vs. including unknown strangers online 3) verbal conversation vs. textual reporting (editable & reproducible)
  • 25. Second-level Gatekeeping in Twitter does NOT occur in a vacuum • Affected by the established media dynamics (Napoli, 2008, p.57) • Online Realm - the semblance of openness and lowered entry barrier. - not ideally decentralized. - audience attention clustered around corporatized online services and the off-to-online presence of traditional mass media realm. - “Power-law” distribution
  • 26. As diverse & decentralized as we conveniently assume? • Some critics against the decentralized web… 1. Sunstein (2001): Self-regulation prevents comprehensive info. adoption. 2. Mitchelstein and Bockzkowski (2010) : No radically different news consumption habit from offline. 3. Meraz (2009): Elite journalism and celebrity bloggers hold he blogsophere, leading the unequal structure, following “power-law” model. 4. Hindman (2009): Political use of the Internet shows an unequal structure, following “power-law” model.
  • 27. Hypotheses H1: Twitter users‟ selection of news contents will collectively produce a power-law structure, representing the uneven representation among the available content providers. 0 20 40 60 80 100 120 140 160 180 200 0 10 20 30 40 50 P(K)=numberofproviders ateachk k = a frequency of being tweeted
  • 28. Hypotheses Why unequal structure? Twitter‟s participatory potential is confined by… 1) The existing web infrastructure (Hyperlink structure) H2: The hyperlinks structure configured on the general Web will be positively associated with the frequency at which Twitter users select a particular online content for redistribution.
  • 29. Hypotheses 2) Traditional media force: - Item diversity does not necessarily lead to exposure diversity (Yim, 2003). - Twitter users will be more likely to choose contents created by traditional media realm due to their familiarity to its format and channel royalty, and the relative mass appeal of the high-budget products H3: Twitter users‟ content selection will be concentrated more to the traditional media realm than other alternative forms of contents.
  • 30. Hypotheses 3) Interaction between the two? - Mass media content may be preferred when the website gains popularity thus is ranked on top from the search results. - Even though search result presents a website in a higher-order, it may not be considered as the most relevant if the source site were never heard previously H4: Twitter users‟ content selection will be influenced by the interaction effects between content types and hyperlinks structure.
  • 31. Temporal Analysis • Selection of news contents can also be contingent on the news lifespan. • Although a conflict is an instantaneous incident at the moment when it breaks out, a more complex political agenda can be unveiled as the news is progressed. RQ1: Is there any difference in Twitter news selection according to the news lifespan?
  • 32. Retweeting • Purposive practices • Facilitates rapid information diffusion within Twitter • Create collective minds among the users of shared interests • Two types of retweeting: (1) Retweeting external content (2) Retweeting internally generated content : a special case of second-level gatekeeping in Twitter
  • 33. Retweeting • Purposive practices • Facilitates rapid information diffusion within Twitter • Create collective minds among the users of shared interests • Two types of retweeting: (1) Retweeting external content (2) Retweeting internally generated content : a special case of second-level gatekeeping in Twitter RQ2: What types of messages are re-circulated via retweeting among the internally generated content in Twitter?
  • 34. Methods • Topic: Israel-Gaza Conflict from Dec 27, 2008 to Jan 18, 2009 - one of the representative international conflict news - active use of social media: called „PR war” • Data: Tweets made by personal users - 860 first-hand tweets (only external links) - 521 retweets (both internal content and external links) • External sources cleaned including the top two or three level domain names (http://www.zzz.zzz or http://www.zzz.zzz.zzz ) • For temporal analysis: the data split into incident periods ▫ Early: Time 1 (Dec 27 – Jan 5) ▫ Late: Time 2 (Jan 6 – Jan 18)
  • 35. Variables • DV: a frequency of a content provider‟s website being selected • IVs: (1) Content Types: Traditional media, Commercial social media, Online journalism, Personal providers, Other org. /institutional/community websites (Cohen‟s Kappa = .89) (2) Hyperlinks: In-coming hyperlinks to a particular provider‟s website as an indicator of its popularity (based on a global traffic)
  • 36. Types Description Examples Traditional Newswire, broadcasting, and print mass media. Offline presence Target mass audiences, wit a broad range of topics cnn.com aljazeera.com guardian.co.uk Social Media Commercial company providing a space for users to easily create and share contents. Sometimes, have an automatic aggregation function. youtube.com reddit.com facebook.com Online Journalism The websites with journalistic writing style yet do not have offline edition. Have independent domain names. alternet.org huffingtonpost allvoices.com Personal Informal websites run by either an individual or a small number of people. Do not have formal organizational structure. polizero.com andycarvin.com buzzsuggest.com Others Any organizational/institutional/community websites that were not categorized in any of above. E.g. governmental, corporate, educational, research, advocacy organizational websites. gazatalk.com un.org arabmediasociety. com
  • 37. Descriptive Results • A total of 256 unique content providers were tweeted • The average frequency of being tweeted is 3, yet with a huge variations, ranging from 41 times to 1 times. • The most frequently tweeted:
  • 38. Re-plotting after log-transformations (Test of Power-law distribution) Highly Selective representation: Majority of providers (N = 176, 68.8%) selected only by a single user (R2 = .80, p < .0001) H1 supported -0.5 0 0.5 1 1.5 2 2.5 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 logtransformedP(k) log transformed k
  • 39. H2~4: Negative Binomial Regression Models (NBR) •Regression model with the count DV. •Content Type is a categorical variable, requiring a reference level. (1) „traditional media realm‟ was hypothesized as to be more influential. (2) „commercial social media‟ showed the highest mean frequency among all.
  • 40. Descriptive Analysis TIME 1 TIME2 FRQ HYP N FRQ HYP N Traditional 2.92 9.34 48 2.64 9.27 55 Social media 3.43 10.74 28 5.75 9.30 22 On Journal 1.84 8.12 25 1.43 8.42 23 Personal 1.05 5.12 21 1.10 5.88 22 Other 1.88 6.66 33 2.47 8.21 35 Total 2.36 8.27 155 2.45 8.14 157
  • 41. Hypotheses Testing log(Tweet Frequency) = Intercept + b1(CT=traditional media) + b2(CT=online journalism) + b3(CT = personal) + b4(CT = org/inst/community) + b5Hyperlinks + b6 (CT=traditional media)*Hyperlinks + b7CT=(online journalism)*Hyperlinks + b8(CT=personal)*Hyperlinks + b9(CT=org/inst/community)*Hyperlinks. • H2 (Hyperlinks effects): Supported on both stages • H3 (Content Type effects): Not supported • H4 (Interaction between Hyperlinks and Content Type): Only supported on the later stage.
  • 42. Model Effects TIME 1 TIME 2 Wald df Sig. Wald df Sig. Intercept 2.13 1 0.144 0.01 1 0.959 Hyperlinks 7.3** 1 0.007 5.09* 1 0.024 CT 2.06 4 0.725 3.79 4 0.436 CT x Hyperlinks 3.01 4 0.556 10.49* 4 0.033 NOTE: CT = Content Types
  • 43. Parameter Estimate for Time 2 (social media as a reference) B SE C.I. Wald χ2 Exp (B)Low High (Intercept)** -0.96 0.74 0.09 1.63 1.69 0.38 (CT =TM) 0.68 1.01 0.27 14.38 0.45 1.97 (CT =OJ) 1.26 1.01 0.49 25.58 1.56 3.53 (CT =Personal) 1.04 0.89 0.50 16.08 1.38 2.83 (CT =Other) 1.74 0.94 0.90 36.15 3.41 5.70 Hyperlinks *** 0.25 0.07 1.12 1.47 12.84 1.28 (CT =TM) x HP -0.12 0.10 0.73 1.08 1.39 0.89 (CT = OJ)x HP* -0.24 0.10 0.64 0.96 5.60 0.79 (CT = Personal) x HP * -0.25 0.10 0.65 0.94 6.50 0.78 (CT = other) x HP** -0.27 0.10 0.62 0.93 6.85 0.76
  • 44. TIME 1 TIME 2 blue: traditional green: social media green: social media blue: traditional
  • 45. Qualitative Analysis of Retweeting internal contents (RQ2) • 45.1% were internally produced tweets. • News alerts from professional news organization (BNO: 46 times, AlGaza: 38 times) • 134 include ordinary users‟ emotional/expressive comments: (1) tactical information (e.g. where and how to meet up for protest) (2) expressive catchphrases (e.g. “War criminal Tony Blair called the situation Gaza „hell‟”.)
  • 46. Conclusion & Discussions (1) • Hyperlinks from general online public influences users‟ information selection process in Twitter. • CT becomes influential as time goes by, but only when interacting with Hyperlinks effects: Traditional form of contents does not necessarily guarantee the successful „filtering-in‟. • The popular use of commercial social media among Twitter users: Smart adaptation of popular web applications (i.e. aggregator website) requited for less visible content providers (e.g. Human Rights campaign delivered by Youtube or CNN I-Report better than by its own website)
  • 47. Conclusion & Discussions (2) • As a collective outcome, user selection reveals a few prominent information providers and a large number of less visible providers…any implication regarding the diversification & decentralization of online news consumption? • Retweeting to disseminate not only information but also emotions and strategic actions. • Limitations… - no causal assessment possible - one specific case: question about generalizability? - English only
  • 48. References Barzilai-Nahon, K. (2008). Toward a theory of network gatekeeping: A framework for exploring information control. The Journal of the American Society of Information Science and Technology, 59(9), 1493-1512. Katz, E. (1957). The two-step flow of communication: An up-to-date report on a hypothesis. The Public Opinion Quarterly, 21(1), 61-78 Meraz, S. (2009). Is there an elite hold? Traditional media to social media agenda setting influence in blog networks. Journal of Computer-Mediated Communication, 14, 682-707. Napoli, P. M. (2008). Hyperlinking and the force of “massification.” In J. Turrow and L. Tsui (Eds.), The Hyperlinked Society (p.56-69). Ann Arbor, MI: The University of Michigan Press. Hindman, M. (2008). The Myth of Digital Democracy. Princeton, NJ: Princeton University Press. McQuail, D. (1994). Mass communication theory: An introduction, 3rd ed., London, UK: Sage. Mitchelstein, E. & Boczkowski, P. J. (2010). Online news consumption research: An assessment of past work and an agenda for the future. New Media Society, 12, 1085-1102. Sunstein, C. (2001). Republic.com. Princeton, NJ: Princeton University Press. Yim, J. (2003). Audience concentration in the media: Cross-media comparisons and the introduction of uncertainty measure. Communication Monograph, 70(2), 114-128.

Editor's Notes

  1. Before getting into, let’s take a look at three socialphenomena.MagnitudeDeathsInjuredpeople missing
  2. Ambiguous statements DescriptionEmotionally charged statements Questions and comments without supporting materials“My soul is deeply sad” “Which relief agencies donate aid to Haiti?”“I have no idea if it’s true or not” Authenticating :Add credence to what the user saysCiting reputed source or references to self /others as an expert on something“CNN reporting a further 2 aftershocks in Haiti mag 5.9 and 5.5”Strategic:Statements that suggest a course of action “Please RT to help the victims of today&apos;s earthquake!”
  3. Some words belonging to authentication statement category include “blog,” “CNN,” “picture,” “list,” “info,” “report,” and “update” etc. These words represent reliable sources of information to authenticate the veracity of tweets. Therefore, consistent with our statistical findings of the previous section, these words contribute to reduce the level of informational ambiguity in tweet postsStrategic Statements: Exemplary words include “donate,” “help,” “relief,” “adoption,” “aid,” “yele,” “redcross,” “bush-foundation” and “text”Yele is a shortname for Yele Haiti Foundation. During the Haiti earthquake, Yele played central role in raising relief fund to restore Haiti.
  4. Based on these findings and conclusion, we decided to study further about the selection and redistribution process of online content in Twitter under another extreme event situation, which was Gaza-Israel Conflict.
  5. (1) Theory: this study attempts to add the &quot;user parts&quot; in the traditional model of gatekeeping. While Barzilai-nahon previously talked about user contribution on the gatekeeping process, her theory is not specific to social media context, as well as no empirical exploration included. By introducing the concept of &quot;second-level gatekeeping,&quot; this paper embraces the role of users as a regular step of new-making and dissemination in social media environment. This has not been conceptualized or theorized previously. (2) Practice: This study empirically showed how Twitter users&apos; information selection and dissemination integrates a variety of information providers. Given this, we can understand better the use of social media as an effective carrier for citizen engagements by looking at the media&apos;s interplay with other new and old media available on the Web, rather than merely focusing on the specific social media platform of interest. For example, the use of twitter under an extreme event is contributory to fast diffusion of information, but this is not happening only by Twitter itself, but a proper adaptation of Twitter platform within the existing media dynamics that embrace traditional actors, non-social media Internet entities, and/or aggregate websites.
  6. The filtering process in information production is generally defined as a gatekeeping process. Although widely adapted to a variety of communication context, the gatekeeping theory has been particularly well-developed in the context of news industry. McQuail (1994) defines gatekeeping as “the process by which selections are made in media work, especially decisions whether or not to admit a particular news story to pass through the ‘gates’ of a news medium” (p. 213). Traditional gatekeeping has involved a series of filtering mechanisms within information providers’ system before reaching recipients. In other words, the information filtering is only processed by the producers and what are put into the process is the raw information materials usually acquired by professional journalists from governmental resources, other newswire or media organizations, public relation sectors, personal sources, and various types of institutional, research, educational, or corporate organizations. The gatekeeping process is affected by information producers’ preferences, backgrounds, routines, practices, or value systems nurtured in an institution with which producers are affiliated. The daily editorial process in a newsroom is a classic example of gatekeeping that exerts control over message content and audience access to the messageTraditional model excludes the role of recipients from the theoretical consideration. Barzilai-Nahon (2008) points out that the absence of vocabulary that refers to those information recipients subjected to the gatekeeping and proposes to call those subjects as the “gated”  (p. 1496).Social media elevates the relevance of those who Barzilai-Nahon (2008) defines as the gated. Participatory social media embraces amateur online users as information co-developers by harnessing the users’ self-authoring, sharing, and collective intelligence .
  7. There are two ways for users to participate in the gatekeeping mechanism.One way for the users to contribute to the gatekeeping mechanism is to participate in producing alternative information. Another way for the users to take part in the gatekeeping process is by the practice of re-circulation. This is what this paper is interested in.In this case, the role is not to create a new product but to deliver the existing product to unheard audiences. We conceptualize this re-circulation role as a ‘second-level’ gatekeeping, with the traditional processing within the producer’s system as a ‘first-level’ gatekeeping. As a second-level gatekeeper, users’ role is analogous to a film distributor who selects only one or a few movies from many of the available in the market and releases the selected movie(s) to audiences via different channels such as theater, DVD, Blue-Ray, or television. For a user who plays a second-level gatekeeper, the emergent social news and bookmarking sites are adopted as distribution channelsOnce the second-level gatekeeping is included as a part in the production and distribution chain, the content provided by media professionals should not be regarded as the final product anymore. Given the increased accessibility to a variety of sources ranged from governmental official websites to a user-generated social reporting, media professionals are not the exclusive providers any more. Accordingly, professional news content becomes just one option to be selected along with the resources made by other providers. For example, a user has control to adopt whether the processed news article about a policy issue or the raw information directly from the congress website.
  8. There are two ways for users to participate in the gatekeeping mechanism.One way for the users to contribute to the gatekeeping mechanism is to participate in producing alternative information. Another way for the users to take part in the gatekeeping process is by the practice of re-circulation. This is what this paper is interested in.In this case, the role is not to create a new product but to deliver the existing product to unheard audiences. We conceptualize this re-circulation role as a ‘second-level’ gatekeeping, with the traditional processing within the producer’s system as a ‘first-level’ gatekeeping. As a second-level gatekeeper, users’ role is analogous to a film distributor who selects only one or a few movies from many of the available in the market and releases the selected movie(s) to audiences via different channels such as theater, DVD, Blue-Ray, or television. For a user who plays a second-level gatekeeper, the emergent social news and bookmarking sites are adopted as distribution channelsOnce the second-level gatekeeping is included as a part in the production and distribution chain, the content provided by media professionals should not be regarded as the final product anymore. Given the increased accessibility to a variety of sources ranged from governmental official websites to a user-generated social reporting, media professionals are not the exclusive providers any more. Accordingly, professional news content becomes just one option to be selected along with the resources made by other providers. For example, a user has control to adopt whether the processed news article about a policy issue or the raw information directly from the congress website.
  9. Triangles: all kinds of information out there, including the news contents made by traditional media professionalsOften, the second-level getekeeping occurs within the Twitter system: Users often re-tweet other tweets… The retweeting can be understood as “second-hand’ second-level gatekeeping.
  10. The concept of “second-levelgatekeeping” incorporates one of the classical communication model, called the “two-step” flow model, into gatekeeping theory. In two-step flow model, opinion leaders receive information from the elite media then they exert informational influence on the rest of the public. Given that the individual users have also informational influence on his/her own followers, they may also conceived as a kind of opinion leaders. However, a second-level gatekeeper is not an equal concept to opinion leaders defined in the two-step flow model ways. Differences are noted in three major points: First, an opinion leader is still conceptualized as a recipient of information, rather than a participant in news production. However, the concept of second-level gatekeeper in our model considers a user as an agent who affects the traditional providers’ news-making practices as well as other audiences. Second, according to the “two-step” flow model, the opinion leaders have the personal influence on their already known social relationships such as family, close friends, neighbors, or a friend of friends at most. However, the second-level gatekeepers reach beyond their personal relationships, because their follower networks often include strangers who never met offline (This is not exclusive to Twitter case. Other tagging websites, called “metajournalism” for example digg.com, reddit.com, or delicious.com are also subsumed in the second-level gatekeeping model). Therefore, the range of information transmission is much larger than the opinion leaders, more similar to broadcasting than to interpersonal conversation. Lastly, the second-level gatekeepers’ information selection and reconstruction are written and archived, which in turn produces another form “reporting.” The textual format makes the content editable and processable, which is not characteristic to opinion leaders’ personal influence.
  11. The positive role of social media on diversifying public communication process and encouraging user participatory culture is undoubted. What is ignored in general, however, is the extent to which its participatory potential is confined by the existing web infrastructure and traditional media force. As Napoli (2008) discusses, the existing media environment “compels new media technologies along evolutionary lines established by traditional media (p.57)”. Likewise, users’ second-level gatekeeping in Twitter does not occur in a vacuum.
  12. Despite the semblance of openness and lowered entry barrier, scholars found that the Internet is not as ideally decentralized, with audience attention clustered around corporatized online services and the off-to-online presence of traditional mass media realm. Barabasi and Alberto (1999) revealed that the Web follows a power-law distribution, composed of a few highly popular websites and a large number of peripheral sites. This distribution pattern is also called the preferential attachment tendency, indicating that people make choices preferably based on the preexisting popularity. Subsequently, the pattern follows a “rich-get-richer mechanism,” resulting in severe inequality in attention distribution (Easly &amp; Kleinberg, 2010, p.566). This uneven pattern similarly emerges from a subset of online communities. In her study on blogosphere, Meraz (2009) found that, despite the technological affordance of decentralization, the emergent structure shows the inequality with the celebrity status of so-called “A-list” bloggers while the rest become marginalized (p. 685-686). Hindman (2009) also notes that the political use of the Internet shows the uneven traffics among the relevant websites. Therefore, we hypothesize that, as a sub-practice in Websphere, Twitter users’ selection and redistribution of online contents will also reveal a similar pattern such that: H1: Twitter users’ selections of news contents will collectively produce a power-law structure, representing the uneven representation among the available content providers.
  13. The figure is a scatterplot of the tweet frequency distribution; By glance, it is uneven, but needs to do a statistical testing to empirically confirm. It will be performed.
  14. One of the driving forces to the content concentration in Twitter may be the hyperlink structure of the Web. On an individual level, hyperlinking may be simply a computerized referencing practice that “automatically brings the user to a particular point in a cited work” (Halavais, 2008, p.39). On a collective level, however, the hyperlinks network becomes the most fundamental mechanism of online gatekeeping (Zittrain, 2006). Sundar and Nass (2001) point out that the collective audiencebehavior is an important component to evaluate the credibility of online source, given that it is partly “responsible for the content floating around in any given media vehicle” (Sundar &amp; Nass, 2001, p. 59).As Purcell et al. (2010) reports, the majority online public agree that the vastness of online contents is an overwhelming experience. Therefore, they inevitably rely on search engine results to select a manageable number of content from the clutter. Therefore, an important determinant of second-level gatekeeping is search engine mechanism, which de facto operates under the algorithms based upon the hyperlinks network structures, for instance Google’s PageRank system (Finkelstein, 2008). Accordingly, the link structure configured in the gamut of the Web is likely to affect Twitter users’ content selection.
  15. Another force to content concentration may be habitual and risk-aversive audience behaviors. The previous literature in media economics has shown that, ironically, the passivity inherent in audience behaviors leads to greater imbalance of viewership when more abundant contents are available. Specifically, Yim (2003) found that, “item diversity” does not necessarily lead to “exposure diversity” (p.126). In contrast, the abundance in choices actually resulted in even greater audience concentration to a handful of items (Yim, 2003). The audience attention is concentrated because an individual’s content repertoire – a subset of items that an individual regularly visits - is not randomly constructed. For example, the major broadcasting network channels are almost always included in an individual’s cable channel repertoire. The systematic constitution of repertoires is attributed to audience’s behavioral tendency: According to Webster and Lin (2002), audiences tend to adopt a familiar content formats and types than to take a risk for a novel one and show a channel royalty. Also, they tend to presume that the high production budgets are the “manifestation of quality” though not perfect (Napoli, 2008, p. 58). If the same logic is applied to cyberspace where the infinite diversity is possible in theory, this passivity will similarly influence users’ online content selection processes, so does in Twitter. Speaking differently, Twitter users will be more likely to choose contents created by traditional media realm due to their familiarity to its format and channel royalty, and the relative mass appeal of the high-budget products. If this is true, the potential of new technologies, widely discussed as an altering agency against the elitism and corporatization immersed in traditional media realm (McChesney, 2001), may be worth of revisit. On the other hand, if users frequently select contents alternative to mass media origins, the result may encourage the discussion in line with the Internet’s contribution to democratization and diversification of news regime (Kellner, 2004). Based on this, our third hypothesis is posited:
  16. Lastly, there is a noteworthy practice in Twitter: Retweeting. In their study with a large scale of 75 millions tweets, Suh et al. (2010) found that a tweet is more likely to be retweeted if it contains hash tags. Their finding implies that retweeting is often a purposive behavior accompanied by the intentional information searching about a specific topic. Moreover, the computerized sharing process makes the redistribution enacted much more conveniently, allowing certain content to be diffused more rapidly over others within Twitter and facilitates to generate collective mindsets among the users who share similar topical interests. While the retweets of external content will be explored from the hypotheses and research questions proposed above, it is also a special case of Twitter gatekeeping to redistribute tweets that are internally produced by other personal users. These tweets do not include an external online content but consist of user-generated textual messages only. We additionally propose a qualitative look at what kinds of internal textual messages are particularly selected for retweeting.
  17. Lastly, there is a noteworthy practice in Twitter: Retweeting. In their study with a large scale of 75 millions tweets, Suh et al. (2010) found that a tweet is more likely to be retweeted if it contains hash tags. Their finding implies that retweeting is often a purposive behavior accompanied by the intentional information searching about a specific topic. Moreover, the computerized sharing process makes the redistribution enacted much more conveniently, allowing certain content to be diffused more rapidly over others within Twitter and facilitates to generate collective mindsets among the users who share similar topical interests. While the retweets of external content will be explored from the hypotheses and research questions proposed above, it is also a special case of Twitter gatekeeping to redistribute tweets that are internally produced by other personal users. These tweets do not include an external online content but consist of user-generated textual messages only. We additionally propose a qualitative look at what kinds of internal textual messages are particularly selected for retweeting.
  18. Gaza Air Strike (98), Gaza Attack (840), Gaza ceasefire (1146), Gaza Clash (62), Gaza Conflict (954), Gaza Emergency (164), Gaza Massacre (480), Gaza Violence (648), and Gaza War (2447). Early half of incident period
  19. Dependent variable: frequency of an information provider selected. We consider that the extent of information source being tweeted is a proxy for the degree of attention the source receivesfrom tweeps. Each domain name pertaining to the information provider was counted using the content-analysis software, Automap (Carley, 2010). This resulted in a total of 256 unique providers were identified.Provider Types. First, we studied the tweeted websites by studying the contents, formats, and self-descriptions and heuristically categorized the providers into five distinguishable types:(1) Mass media (both broadcasting and print): This category subsumes newswire agencies, electronic and print mass media whose headquarters are located offline and run by media corporations or public broadcasting networks. The websites under this category target mass audiences by presenting a broad range of topics for examples politics, culture, society, travel, technology, entertainment, etc. (2) User-generated content websites: Certain sources were identified with a general domain name whose website offers a space to users for self-authoring and/or sharing. Such websites often automatically aggregate individually created contents and facilitate sharing processes. Examples are wordpress.com, google.com, facebook.com, yahoo.com, blogger.com, dig.com, reddit.com, etc. Twitter itself is also categorized in this type. (3) Online journalism: Chang (2005) identifies three different types of online journalism: first, traditional media that use electronic means to transmit messages; second, online newspapers that adhere to journalistic writing and formatting, but do not have an offline edition; third, online communities where ordinary users participate in information exchanges such as newsgroup and bulletin boards. In our study, the first type is categorized as ‘mass media’ and the third type overlaps with other categories. Therefore, the category ‘online journalism’ only includes the second type. (4) Personal providers: This type of website has its own domain name and run by either an individual or a small number of people. The websites are informal and do not show formal organizational characteristics. (5) Other organizational or institutional websites: This type includes governmental, non-governmental, educational, research, advocacy organizational websites.
  20. Youtube, blospot, friendfeed (online sharing site) are categorized as commercialized social media
  21. Mass Media set as a reference because it has been the most long-lasting and traditional form of news/journalism producers.
  22. TM = traditional mediaSM = social mediaOJ = online journalismPS = Personal Other: Organization, Gov, NGO, Community service websiteWhen two time periods of news dissemination were compared, the highest mean frequency was resulted from ‘commercial social media’ in both periods. Especially, the frequency increased much more as time passed by: on the early stage, the mean frequency of social media was 3.43, while it was 5.75 on the later stage. Also, the mean frequency increased for ‘organizational, institutional, and community websites’ from 1.88 to 2.45 as the news evolved.
  23. In both incident stage, the more hyperlinks you have, the more likely you’re tweeted.
  24. Table description of the hypotheses testing. CT = Content type
  25. This table shows the parameter estimates for TIME 2. As seen here, three of the interaction effects are significant. Reference is social media. (With Mass Media as a reference, parameters were not significant except hyperlinks)The table tells us more specifically where the interaction effects were significant.The interaction effect results suggest that, when the hyperlinks moderated the relationship between content types and tweet frequency, ‘online journalism,’ ‘personal contents,’ and ‘organizational/institutional/community websites’ were tweeted significantly less frequently than ‘commercial social media’: The change of one unit increase in tweet frequency of ‘online journalism’ was 0.79 times compared to social media, B = -. .24, Exp(B) = .79, p &lt;.05; 0.78 times for ‘personal contents’, B = -. .25, Exp(B) = .78, p &lt;.05; and 0.79 times for ‘organizational/institutional/community websites’, B = -. .27, Exp(B) = .76, p &lt;.01. On the other hand, there was no significant difference between ‘traditional media realm’ and ‘social media’, implying that much of user attention was concentrated to these two types along with the progress of news event , but the concentration holds true only when hyperlinks effect was put into consideration.
  26. This is the graphical visualization how the two independent variables interact with each other to determine the tweet frequency of certain content. The content selection pattern observed from personal users’ practices (the left column) is distinctive from when all types of tweets, made not only by personal users but also media organizations and computer-automated bots, were included (the right column). When all tweets were put into consideration, ‘traditional media realm’ and ‘social media’ are the most prominently distributed contents even from the beginning. Moreover, the discrepancy between these types and the rest of contents increased more greatly over time. However, when only personal users’ tweets were considered, Twitter users’ selections were not much concentrated to a particular type of content during the early stage of news breakout. Instead, their choices were largely determined based on the extent a website receives in-links from general online public. This pattern changes as the news lifespan is extended, however. On the later stage, personal users’ selection is concentrated to social media-based contents, followed by the traditional forms of news outlets.
  27. the largest portion (46 times) was news alerts made by a professional new wire organization, BreakingNewsOn (BNO). BNO is distinguishable from other traditional wire services such as Reuters or AP in that it was launched in 2007 on the social media basis, not offline. Although it has been providing wire services to offline media organizations since 2009, the primary platform of BNO is still social media, particularly Twitter, whose service is direct to end-users. In addition, another prevalent internal content for retweeting was from the AlGaza Rapid Reports, an ad-hoc Twitter account dedicated to the information about Gaza conflict updated by Aljazeera (38 times). BNO and AlGaza together accounted for 35.7% of the retweets containing internal sources. They were fact-oriented briefings of news updates
  28. Why we studied it on earth? We were interested in looking at how Twitter users participate in news dissemination when there is a breakout news outside the community.While many of the literature on the use of social media discuss its utility within the particular platform that is studied, we thought that social media is a part of a larger media dynamics, including all sorts of information actors such as traditional mass media actors, organizational or institutionalized information providers, personal sources, and non-social media based alternative outlet, such as online journalism.This study is to show how Twitter, as a channel to amplify the scope of information diffusion, interplays with other information sources.Why are we using Gaza? This study is interested in looking at the users’ participation in information processing about the breakout news that happened beyond the immediate community. Mediated information, in this case, is the only way to understand the situation and participate.Gaza-Israel conflict 2009 is a representative of this sort of news: It was an international breakout news about one of the most well known international geo-politics. This particular event was a breakout, the better understanding about the issue is possible when situated in a historical context. It is not covered in this presentation, but we are developing this paper by putting the temporal aspect, how this breakout (or so-called “episodic”) news is developed into a more investigative (or so-called “thematic”) news. Note: about using English