This document discusses a study on broadcasting and listening practices on Twitter during the Egyptian protests in 2011. It examines how networked gatekeeping and framing occurred through prominent users and hashtags. The researchers analyzed over 1.5 million tweets to understand how gatekeeping and framing were negotiated through conversational markers like retweets, mentions, and hashtags. They also looked at how affect, ambience, and conversational practices created an always-on environment that sustained the movement. The study explores how gatekeeping and framing were crowdsourced and networked through Twitter to give prominence to certain actors, problem definitions, and interpretations during the real-world events in Egypt.
The Rosslyn-Ballston Corridor in Arlington, Virginia saw massive redevelopment between the 1970s and today, transforming from a low-density area into a high-density, mixed-use transit corridor centered around 5 Metro stations. Redevelopment resulted in over 4 times as many jobs and over 4 times as much office space, along with a large increase in housing units. The corridor generates half of Arlington County's property tax revenue while comprising only 11% of the land area, funding parks, schools, and other services. Transit usage along the corridor is high, with over 45,000 daily Metro boardings and most residents walking, biking or taking transit to stations rather than driving.
Three studies examined social media use and its effects on social relationships and social capital. Study 1 found that Facebook use allowed for flexible "social multitasking" but also public displays of privacy. Study 2 analyzed Facebook photo galleries and found they demonstrated close friend groups, events, awareness of the camera, and comments reinforcing group bonds. Study 3 explored how social media architecture balances public and private spheres, allowing performances of identity in publicly private spaces.
The rhythms of news storytelling on Twitter:Affective news streams, hybridit...Zizi Papacharissi
The document discusses how Twitter was used as a mechanism for both reporting and sharing news during the 2011 Egyptian uprising. It analyzes over 1.5 million tweets to understand the news values and rhythms of storytelling on Twitter. Traditional news values of recency, drama, and relevance were found, but Twitter also enabled new values like crowdsourced reporting, constant updates, and expressions of solidarity and emotion. The blending of facts, opinions, and affect on Twitter represented a hybrid form of news that was both oral and written in nature.
Este documento presenta una introducción a los requerimientos de software. Habla sobre los requerimientos de software, la presentación y la introducción a los mismos.
affective news streams and networked publics: mediality and engagement on #egyptZizi Papacharissi
The document discusses how news values and storytelling took place on Twitter during the 2011 Egyptian uprising. It finds that:
1) Established news values like immediacy and relevance guided Twitter use, but new values like ambient news environments and collective production also emerged.
2) News storytelling on Twitter combined oral and print traditions, with a rhythmic and affective style where facts, drama, and emotions blended together instantly.
3) The form of news on Twitter challenges traditional distinctions between media and audiences, as collaborative and leaderless networks collectively framed the events in real-time.
This document discusses the changing nature of civic engagement in contemporary democracies. It argues that civic participation is developing across privately public and publicly private spaces enabled by convergent media and technologies. This suggests newer modes of citizenship defined by a plasticity of public and private boundaries, with political and other expression emanating from within a networked, civic, and private "cocoon" that emphasizes connection over struggle. The private sphere serves as a metaphor to describe and explain the mechanisms enabling civic connections in modern democracies.
the rhythms of occupy: broadcasting and listening practices on #owsZizi Papacharissi
This document discusses research on the use of Twitter during Occupy Wall Street protests. It examines how Twitter was used for reporting, sharing information, and discussing the protests (RQ1). It analyzes which users were most prominent based on mentions and retweets (RQ2). It also looks at how hashtags shaped discussions and frames around the issues (RQ3). The researchers conducted a content analysis of tweets using #ows from 2011-2012 to understand rhythms of content, prominent users, and framing effects. Discourse analysis of peaks in activity revealed how conversations were affective, performative, and open while also containing contention. The conclusions discuss further analyzing framing and gatekeeping over time as well as the digital
The document summarizes research on the emerging sociabilities and social behaviors on social network sites. Three key studies are discussed. Study 1 found that social network sites allow for a flexible form of sociability through social multitasking and a reflexive understanding of privacy. Study 2 examined the visual rhetoric of Facebook photo galleries and found they demonstrate awareness of the camera and are used to reinforce close group membership. Study 3 explored how the architecture of social networks balances public and private self-presentation through spaces that are publicly private and privately public. The implications are that online sociabilities are networked, remixed and fluid as boundaries between public and private become more complex.
The Rosslyn-Ballston Corridor in Arlington, Virginia saw massive redevelopment between the 1970s and today, transforming from a low-density area into a high-density, mixed-use transit corridor centered around 5 Metro stations. Redevelopment resulted in over 4 times as many jobs and over 4 times as much office space, along with a large increase in housing units. The corridor generates half of Arlington County's property tax revenue while comprising only 11% of the land area, funding parks, schools, and other services. Transit usage along the corridor is high, with over 45,000 daily Metro boardings and most residents walking, biking or taking transit to stations rather than driving.
Three studies examined social media use and its effects on social relationships and social capital. Study 1 found that Facebook use allowed for flexible "social multitasking" but also public displays of privacy. Study 2 analyzed Facebook photo galleries and found they demonstrated close friend groups, events, awareness of the camera, and comments reinforcing group bonds. Study 3 explored how social media architecture balances public and private spheres, allowing performances of identity in publicly private spaces.
The rhythms of news storytelling on Twitter:Affective news streams, hybridit...Zizi Papacharissi
The document discusses how Twitter was used as a mechanism for both reporting and sharing news during the 2011 Egyptian uprising. It analyzes over 1.5 million tweets to understand the news values and rhythms of storytelling on Twitter. Traditional news values of recency, drama, and relevance were found, but Twitter also enabled new values like crowdsourced reporting, constant updates, and expressions of solidarity and emotion. The blending of facts, opinions, and affect on Twitter represented a hybrid form of news that was both oral and written in nature.
Este documento presenta una introducción a los requerimientos de software. Habla sobre los requerimientos de software, la presentación y la introducción a los mismos.
affective news streams and networked publics: mediality and engagement on #egyptZizi Papacharissi
The document discusses how news values and storytelling took place on Twitter during the 2011 Egyptian uprising. It finds that:
1) Established news values like immediacy and relevance guided Twitter use, but new values like ambient news environments and collective production also emerged.
2) News storytelling on Twitter combined oral and print traditions, with a rhythmic and affective style where facts, drama, and emotions blended together instantly.
3) The form of news on Twitter challenges traditional distinctions between media and audiences, as collaborative and leaderless networks collectively framed the events in real-time.
This document discusses the changing nature of civic engagement in contemporary democracies. It argues that civic participation is developing across privately public and publicly private spaces enabled by convergent media and technologies. This suggests newer modes of citizenship defined by a plasticity of public and private boundaries, with political and other expression emanating from within a networked, civic, and private "cocoon" that emphasizes connection over struggle. The private sphere serves as a metaphor to describe and explain the mechanisms enabling civic connections in modern democracies.
the rhythms of occupy: broadcasting and listening practices on #owsZizi Papacharissi
This document discusses research on the use of Twitter during Occupy Wall Street protests. It examines how Twitter was used for reporting, sharing information, and discussing the protests (RQ1). It analyzes which users were most prominent based on mentions and retweets (RQ2). It also looks at how hashtags shaped discussions and frames around the issues (RQ3). The researchers conducted a content analysis of tweets using #ows from 2011-2012 to understand rhythms of content, prominent users, and framing effects. Discourse analysis of peaks in activity revealed how conversations were affective, performative, and open while also containing contention. The conclusions discuss further analyzing framing and gatekeeping over time as well as the digital
The document summarizes research on the emerging sociabilities and social behaviors on social network sites. Three key studies are discussed. Study 1 found that social network sites allow for a flexible form of sociability through social multitasking and a reflexive understanding of privacy. Study 2 examined the visual rhetoric of Facebook photo galleries and found they demonstrate awareness of the camera and are used to reinforce close group membership. Study 3 explored how the architecture of social networks balances public and private self-presentation through spaces that are publicly private and privately public. The implications are that online sociabilities are networked, remixed and fluid as boundaries between public and private become more complex.
This document summarizes a study analyzing tweets from the 2011 UK riots. It collected 2.6 million tweets using hashtags related to the riots from 700,000 accounts. It developed tools to analyze information flows and conducted content analysis to understand how Twitter was used. Key findings included that rumors spread quickly on Twitter but were often dispelled, social media was used more for organizing cleanups than the riots, and mainstream media and journalists tweeted the most about the riots. Future work focused on developing an analysis workbench.
The document discusses internet marketing strategies and why traditional marketing methods are less effective. It outlines challenges with print flyers, direct mail, television, radio and newspaper advertising. It then discusses new marketing approaches using the internet, including websites, search engine optimization, pay-per-click advertising, social media platforms like Facebook, YouTube, Twitter and Pinterest. The document emphasizes that internet marketing allows for better measurement of results and provides statistics on internet and social media usage in Australia.
A presentation for the students at ITS Ghaziabad getting ready for their management careers and using Social Media as an essential part of their businesses
This document summarizes statistics about major social media platforms as of 2012. Facebook had over 845 million monthly active users worldwide. Twitter had over 500 million users and saw 340 million tweets sent daily. LinkedIn had over 161 million members across 200 countries. Google+ had over 90 million users. Instagram was growing rapidly, seeing one new user join every second and approximately 58 photos uploaded each second. Pinterest was becoming increasingly popular, with 11.7 million monthly active users, many of whom were women. The document provides additional statistics on user demographics, mobile usage, and growth trends for these and other emerging platforms like Foursquare.
The web of where: How location is being woven into the webKevin Anderson
The presentation from my keynote at the SpotOn locative media conference, organised by Finnish public broadcaster YLE at Aalto University in Helsinki. I talked about why delivering relevant content is a key to success in today's crowded media environment and how location can be one way to deliver relevant content to audiences.
We Are Social's Guide to Social, Digital, and Mobile in China, Dec 2011We Are Social Singapore
This is the December 2011 edition of We Are Social Singapore’s guide to Social, Digital and Mobile in China. You can find more of these Asia reports at http://wearesocial.sg
The document discusses several key concepts relating to media in the online age:
- It outlines the theory of "the long tail" developed by Chris Anderson, which describes how the internet has changed economics by allowing niche products and markets to flourish.
- It also discusses the theory of "Wikinomics" developed by Don Tapscott and Anthony Williams, which centers around ideas like peer production, free sharing of content, and democratization of media through user-generated content online.
- Examples of new forms of online media discussed include internet TV services like the BBC iPlayer, as well as the rise of user-driven websites and platforms characterized as "Web 2.0."
This document discusses rethinking the traditional press release model. It notes that the traditional news media landscape is shrinking while online audiences are growing. Press releases can now serve as online destinations rather than just sources for journalists. The document provides several case studies of press releases that drove significant online traffic. It offers recommendations for press releases, including adding social media buttons, writing tweetable headlines, including images and links, and measuring online engagement. Finally, it discusses some ideas for the future, such as profiling more researchers and adding commenting functionality.
The document summarizes a discussion on the impact of social media on public affairs in mainland China. It provides an overview of the social media landscape in China, including popular sites and platforms. It also shares the results of a survey conducted with public affairs professionals on their use of social media and their views on its influence. The majority see social media as important to their strategies and believe it influences public policy, though many are still evaluating its impact.
This document discusses several theories related to media in the online age, including the Long Tail theory, Wikinomics, and Web 2.0. The Long Tail theory suggests that the internet has expanded markets for niche products. Wikinomics describes how the internet has empowered individuals and reduced barriers through ideas like sharing, free creativity, and democratized media. Web 2.0 refers to websites that allow users to interact, collaborate and generate their own content through features like social media, blogs and videos.
The Epic of Gilgamesh follows the journey of Gilgamesh from arrogant ruler to introspective man. Initially, Gilgamesh oppresses his people through sexual and physical aggression. The gods send Enkidu to curb Gilgamesh's behavior. The two fight but come to respect each other. Their friendship causes Gilgamesh to become less tyrannical and more thoughtful about his purpose in life.
Twitter 101: 140 characters. Don't be a douche.Alison Gianotto
The document provides an overview of Twitter, including what it is, how it works, usage statistics, and ways it can be used both online and offline. It describes Twitter as a microblogging platform that allows users to post short updates called tweets. Key details include that tweets are limited to 140 characters, users follow accounts to receive their tweets, and hashtags help organize topics and make tweets more discoverable.
This document summarizes a presentation by Jesse Desjardins on Tourism Australia's social media strategy. Some key points include:
- Tourism Australia has over 3 million Facebook fans and uses social media like Facebook, Twitter, and Instagram to promote travel to Australia through visual storytelling and user generated content.
- The focus is on empowering other people like travelers to share their stories rather than one-way storytelling from Tourism Australia.
- Social media involves building relationships over time through many lightweight interactions as opposed to one-off campaigns.
Recruiting headlines and social recruitingJason Buss
The document discusses recruiting secrets overheard in a dark alley. It summarizes recent social media and job search statistics, and questions how effective social recruiting truly is. The presentation recommends focusing on personal networks and referrals over automated social media outreach, and introduces tools like Hachi, Job Change Alerts, CardMunch and Rapportive that can aid recruiting.
The document discusses leveraging new and social media for current affairs reporting. It defines new media as digital technologies like the internet and defines social media as transforming broadcast media into two-way dialogues through user-generated content. Some examples of new media platforms discussed include blogs, social networks, mobile phones, and citizen journalism sites. The document also contrasts traditional media models with new media models that engage citizens as producers.
What is Social Media? Is it a phrase that is tossed around these days or is it the future of communication or a platform that increase and enhance the sharing of information? A presentation by Missing Link about how social media is changing the face of media, marketing and advertising .
Connect with me
Twitter - https://twitter.com/manveermalhi
Facebook - https://www.facebook.com/manveermalhi
Linkedin - http://in.linkedin.com/in/manveermalhi
Website - http://manveermalhi.com/
What is Social Media? Is it a phrase that is tossed around these days or is it the future of communication or a platform that increase and enhance the sharing of information?
A presentation by Missing Link about how social media is changing the face of media, marketing and advertising .
Website : www.missinglink.co.in
Facebook : http://www.facebook.com/MissingLinkIndia
Twitter : http://twitter.com/missing_link_in
1) Online usage in the UK has grown dramatically from 26% of households in 2000 to over 72% in 2007. 2) Younger generations are heavily engaged with social media - 70% of 16-24 year olds use social networking sites. 3) Brands must think carefully about how they behave in the digital space and provide value to users to avoid being seen as intrusive. They should be useful, honest, and inclusive.
The document discusses social media analysis and summarizes key findings from analyzing tweets related to UK politicians. It finds that abuse towards politicians on Twitter was more common in 2017 than 2015, and that a small number of prominent MPs received most abuse in 2015. While men received more abuse than women in 2015, the targets of abuse changed in the 2017 analysis.
This document summarizes Zizi Papacharissi's research on affective news streams and news storytelling on Twitter. Some key findings include:
- News values that prioritize recent, sudden events also guide Twitter use, along with values of instantaneity and ambient news environments.
- Analysis of 1.5 million tweets about the 2011 Egyptian uprising found both traditional news values and new values like crowdsourced elites and solidarity were prevalent.
- News storytelling on Twitter during events takes the form of affective news, blending facts, drama, opinion and emotion in an instant, repetitive rhythm.
- Affective news streams expose tensions between live tweeting and traditional news reporting and
More Related Content
Similar to Networked framing and networked gatekeeping on #Egypt
This document summarizes a study analyzing tweets from the 2011 UK riots. It collected 2.6 million tweets using hashtags related to the riots from 700,000 accounts. It developed tools to analyze information flows and conducted content analysis to understand how Twitter was used. Key findings included that rumors spread quickly on Twitter but were often dispelled, social media was used more for organizing cleanups than the riots, and mainstream media and journalists tweeted the most about the riots. Future work focused on developing an analysis workbench.
The document discusses internet marketing strategies and why traditional marketing methods are less effective. It outlines challenges with print flyers, direct mail, television, radio and newspaper advertising. It then discusses new marketing approaches using the internet, including websites, search engine optimization, pay-per-click advertising, social media platforms like Facebook, YouTube, Twitter and Pinterest. The document emphasizes that internet marketing allows for better measurement of results and provides statistics on internet and social media usage in Australia.
A presentation for the students at ITS Ghaziabad getting ready for their management careers and using Social Media as an essential part of their businesses
This document summarizes statistics about major social media platforms as of 2012. Facebook had over 845 million monthly active users worldwide. Twitter had over 500 million users and saw 340 million tweets sent daily. LinkedIn had over 161 million members across 200 countries. Google+ had over 90 million users. Instagram was growing rapidly, seeing one new user join every second and approximately 58 photos uploaded each second. Pinterest was becoming increasingly popular, with 11.7 million monthly active users, many of whom were women. The document provides additional statistics on user demographics, mobile usage, and growth trends for these and other emerging platforms like Foursquare.
The web of where: How location is being woven into the webKevin Anderson
The presentation from my keynote at the SpotOn locative media conference, organised by Finnish public broadcaster YLE at Aalto University in Helsinki. I talked about why delivering relevant content is a key to success in today's crowded media environment and how location can be one way to deliver relevant content to audiences.
We Are Social's Guide to Social, Digital, and Mobile in China, Dec 2011We Are Social Singapore
This is the December 2011 edition of We Are Social Singapore’s guide to Social, Digital and Mobile in China. You can find more of these Asia reports at http://wearesocial.sg
The document discusses several key concepts relating to media in the online age:
- It outlines the theory of "the long tail" developed by Chris Anderson, which describes how the internet has changed economics by allowing niche products and markets to flourish.
- It also discusses the theory of "Wikinomics" developed by Don Tapscott and Anthony Williams, which centers around ideas like peer production, free sharing of content, and democratization of media through user-generated content online.
- Examples of new forms of online media discussed include internet TV services like the BBC iPlayer, as well as the rise of user-driven websites and platforms characterized as "Web 2.0."
This document discusses rethinking the traditional press release model. It notes that the traditional news media landscape is shrinking while online audiences are growing. Press releases can now serve as online destinations rather than just sources for journalists. The document provides several case studies of press releases that drove significant online traffic. It offers recommendations for press releases, including adding social media buttons, writing tweetable headlines, including images and links, and measuring online engagement. Finally, it discusses some ideas for the future, such as profiling more researchers and adding commenting functionality.
The document summarizes a discussion on the impact of social media on public affairs in mainland China. It provides an overview of the social media landscape in China, including popular sites and platforms. It also shares the results of a survey conducted with public affairs professionals on their use of social media and their views on its influence. The majority see social media as important to their strategies and believe it influences public policy, though many are still evaluating its impact.
This document discusses several theories related to media in the online age, including the Long Tail theory, Wikinomics, and Web 2.0. The Long Tail theory suggests that the internet has expanded markets for niche products. Wikinomics describes how the internet has empowered individuals and reduced barriers through ideas like sharing, free creativity, and democratized media. Web 2.0 refers to websites that allow users to interact, collaborate and generate their own content through features like social media, blogs and videos.
The Epic of Gilgamesh follows the journey of Gilgamesh from arrogant ruler to introspective man. Initially, Gilgamesh oppresses his people through sexual and physical aggression. The gods send Enkidu to curb Gilgamesh's behavior. The two fight but come to respect each other. Their friendship causes Gilgamesh to become less tyrannical and more thoughtful about his purpose in life.
Twitter 101: 140 characters. Don't be a douche.Alison Gianotto
The document provides an overview of Twitter, including what it is, how it works, usage statistics, and ways it can be used both online and offline. It describes Twitter as a microblogging platform that allows users to post short updates called tweets. Key details include that tweets are limited to 140 characters, users follow accounts to receive their tweets, and hashtags help organize topics and make tweets more discoverable.
This document summarizes a presentation by Jesse Desjardins on Tourism Australia's social media strategy. Some key points include:
- Tourism Australia has over 3 million Facebook fans and uses social media like Facebook, Twitter, and Instagram to promote travel to Australia through visual storytelling and user generated content.
- The focus is on empowering other people like travelers to share their stories rather than one-way storytelling from Tourism Australia.
- Social media involves building relationships over time through many lightweight interactions as opposed to one-off campaigns.
Recruiting headlines and social recruitingJason Buss
The document discusses recruiting secrets overheard in a dark alley. It summarizes recent social media and job search statistics, and questions how effective social recruiting truly is. The presentation recommends focusing on personal networks and referrals over automated social media outreach, and introduces tools like Hachi, Job Change Alerts, CardMunch and Rapportive that can aid recruiting.
The document discusses leveraging new and social media for current affairs reporting. It defines new media as digital technologies like the internet and defines social media as transforming broadcast media into two-way dialogues through user-generated content. Some examples of new media platforms discussed include blogs, social networks, mobile phones, and citizen journalism sites. The document also contrasts traditional media models with new media models that engage citizens as producers.
What is Social Media? Is it a phrase that is tossed around these days or is it the future of communication or a platform that increase and enhance the sharing of information? A presentation by Missing Link about how social media is changing the face of media, marketing and advertising .
Connect with me
Twitter - https://twitter.com/manveermalhi
Facebook - https://www.facebook.com/manveermalhi
Linkedin - http://in.linkedin.com/in/manveermalhi
Website - http://manveermalhi.com/
What is Social Media? Is it a phrase that is tossed around these days or is it the future of communication or a platform that increase and enhance the sharing of information?
A presentation by Missing Link about how social media is changing the face of media, marketing and advertising .
Website : www.missinglink.co.in
Facebook : http://www.facebook.com/MissingLinkIndia
Twitter : http://twitter.com/missing_link_in
1) Online usage in the UK has grown dramatically from 26% of households in 2000 to over 72% in 2007. 2) Younger generations are heavily engaged with social media - 70% of 16-24 year olds use social networking sites. 3) Brands must think carefully about how they behave in the digital space and provide value to users to avoid being seen as intrusive. They should be useful, honest, and inclusive.
The document discusses social media analysis and summarizes key findings from analyzing tweets related to UK politicians. It finds that abuse towards politicians on Twitter was more common in 2017 than 2015, and that a small number of prominent MPs received most abuse in 2015. While men received more abuse than women in 2015, the targets of abuse changed in the 2017 analysis.
This document summarizes Zizi Papacharissi's research on affective news streams and news storytelling on Twitter. Some key findings include:
- News values that prioritize recent, sudden events also guide Twitter use, along with values of instantaneity and ambient news environments.
- Analysis of 1.5 million tweets about the 2011 Egyptian uprising found both traditional news values and new values like crowdsourced elites and solidarity were prevalent.
- News storytelling on Twitter during events takes the form of affective news, blending facts, drama, opinion and emotion in an instant, repetitive rhythm.
- Affective news streams expose tensions between live tweeting and traditional news reporting and
This document discusses the concept of "affective news" and "electronic elsewheres" in the context of networked social systems. It defines affective news as collaboratively constructed news that blends facts, opinions, and sentiments in ambient online environments. These affective news streams can sustain "electronic elsewheres" that allow disconnected citizens and journalists to reconnect digitally. The document also discusses how mobile and liminal spaces influence affective news and digital storytelling on networked systems.
This document discusses research on how news is reported and shared on Twitter. It addresses two main topics:
1. News values on #Egypt - A frequency analysis of 1.5 million tweets found that established news values like recency and relevance guided Twitter use. Events were instantly turned into stories through affective storytelling practices.
2. Form of news on Twitter - News, facts, drama, opinions and emotions blended together into "affective news". Collaborative news feeds exposed tensions between live tweeting and traditional reporting. Affect and storytelling, as well as affect and mobilization, shaped information dissemination.
This document discusses research on how news is reported and shared on Twitter. It addresses two main topics:
1. News values on #Egypt - A frequency analysis of 1.5 million tweets found that established news values like recency and relevance guided Twitter use. Events were instantly turned into stories through affective storytelling practices.
2. Form of news on Twitter - News, facts, drama, opinions and emotions blended together into "affective news". Collaborative news feeds exposed tensions between live tweeting and traditional reporting. Affect and storytelling, as well as affect and mobilization, shaped information dissemination.
Without you I'm nothing: Performances of the self on TwitterZizi Papacharissi
The document analyzes how individuals perform their identities on Twitter. Through content and discourse analysis of 1798 tweets, it finds that performances on Twitter center the self, involve play through strategies like reordering and exaggeration, and resemble "public dreaming." These performances balance needs for publicity, privacy, and sociality, and involve theatrical acts, tagging, and storytelling to curate authentic networked identities.
The document discusses how Twitter was used as a mechanism for both reporting and sharing news during the 2011 Egyptian uprising. It analyzes over 1.5 million tweets to understand the news values and rhythms of storytelling on Twitter. Traditional news values of recency, drama, and relevance were found, but Twitter also introduced new values like instantaneity, crowdsourced reporting, and creating an ambient news environment. The blending of news, opinions, facts and emotions on Twitter represented a hybrid form of affective and collaborative news storytelling.
The document discusses how democracy is changing in the digital age. It explores how political activity is migrating to online spaces through the convergence of technologies, spaces, and practices. This results in a more flexible form of citizenship centered around expressions of self and connection with others through privately public spaces online.
This document summarizes three studies on social media use and sociality. Study 1 found that Facebook is used for flexible socializing ("social multitasking") and that users have a reflexive understanding of privacy risks. Study 2 examined Facebook photo galleries and found they depict friends in mundane social events, with exhibitionist self-portraits and comments reinforcing social bonds. Study 3 analyzed how social networks balance public and private through performances of identity in spaces that are publicly private and privately public. The overarching finding is that identity and sociability are networked and mediated through social media.
Convergent Supersurfaces: Notes toward Theorizing the Relationship between Convergence and the (new) Political. Association of Internet Researchers, Gothenburg, October 2010.
The document discusses the role of citizen media in cities and contemporary democracies. It notes that while blogs, Twitter, and news aggregators can pluralize viewpoints and dissent, they do not inherently democratize. Citizen media like blogs, microblogs, YouTube, and news aggregators can tell untold stories, connect communities through expression, and promote alternative perspectives. However, they are not substitutes for journalism and do not fix problems or create communities on their own.
1. The document discusses how technology and digital media are blurring the lines between public and private spheres and spaces. This convergence allows for new forms of civic engagement and political participation to take place.
2. Old models of representative democracy are declining as citizens engage in more personalized and private forms of political expression online. Citizens can publicly engage in political activism from private spaces through social media.
3. This represents a shift towards more fluid, flexible notions of citizenship as political activity migrates to digital spaces and architectures online.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Networked framing and networked gatekeeping on #Egypt
1. BROADCASTING AND LISTENING PRACTICES ON #EGYPT:
NETWORKED GATEKEEPING AND FRAMING ON TWITTER
Sharon Meraz, PhD Zizi Papacharissi @zizip
Assistant Professor, Communication Professor and Head, Communication
University of Illinois at Chicago University of Illinois at Chicago
2. premise
• Twitter and news storytelling
• Collectively prodused news feeds and the news economy
• Twitter as alternative/primary channel for information
3. previous research
• Twitter as news reporting mechanism
• Established news values guide use of Twitter
• News breaking/premediation/instantaneity
• Homophily, peripheral awareness and ambient news environments,
hybridity
• Twitter as news sharing mechanism during uprisings
• Electronic word of mouth
• Broadcasting and ‘listening in’ on uprisings
• Homophily and group identity +++JOC theme issue
4. research design
• Networked Gatekeeping
• Networked Framing
RQ1: Who were the prominent users and how was their prominence negotiated
across the different conversational markers?
RQ2: To what extent did prominent users forge connections to other users based
on the users’ levels of prominence across the different addressivity markers?
RQ3: To what extent does the usage of hashtags reflect an organic level framing
to the real world events occurring during the Egyptian protests?
RQ4: What types of conversational practices support processes of gatekeeping
and framing negotiation?
• METHOD
Frequency analysis (R), 1.5 mil multi-lingual tweets, network analysis (SQL
queries), discourse analysis
9. conversational affordances and practices
• Affect and ambience
• Conversational practices mix of news, opinion, emotion reflecting
movement toward the not yet, retweets as conversational
refrains/chorus, affective gestures support contagion and
rhythm, state that conveys impression of constant movement
• Always on environment with a life cycle and pulse of its
own, sustaining movement even when nothing new is going on
• Networked gatekeeping and framing
• Conversational tendencies
• Cosmopolitanism/fluency in (multi) cultural context
• Directly conversational, become embedded via offline and online
activities
10. Practices of broadcasting / listening / redacting
• Networked Gatekeeping
Process through which actors crowdsourced to prominence through the use
of addressivity markers and conversational practices
• Networked Framing
Process through which a particular problem definition, causal
interpretation, moral evaluation, and/or treatment recommendation attain
prominence through crowdsourcing practices
• Affect and ambience
support always on space - electronic elsewheres - that treated this
movement as a revolution well before it had actually become a revolution
Thank you! @zizip uic.edu/~zizi
Editor's Notes
As it emerged as key platform for newsstorytelling of the egyptian uprisings that led to regime reversal
Research has shown that Twitter is quickly emerging as a medium for news storytelling, sometimes involving collaborative storywriting, more frequently involving collaborative filtering / curating of news2. Collectively prodused news feeds by citizens committing acts of journalism substitute or complement mainstream media coverage, especially during times economic constraints force media companies to curtail or cut down on international news bureaus3. At times when access to mainstream media is blocked, restricted, or otherwise controlled, twitter quickly emerges as …. (Iran, occupy, Arab Spring, Anti Glob movment)
1 – Delivers same news, over different platform - contributes/cultivates culture of instantaneity2. Who says what to whom – more important than that, who is able to listen, as platform affords visibility to little covered issues.- replies between like minded people strengthen group identity, replies between people who disagree strengthen in group and out group affiliation. (hybridity in power structures +routines) (local topics, endogenous categories foster greater social connectivity, group cohesion)
Who said what to whom and howUsed gatekeeping for who said what to whom, and framing to focus on what and how
Explain who is whoFraming: hashtag as organic frame – users select - topically frame, express solidarity: 2 dominant trends: something that is going on within Egypt but should have consequences beyond Egypt, and revolutionRQ1: Who were the prominent users and how was their prominence negotiated across the different conversational markers? Prominent users more likely to be independent journalists, activists, and mass media entitiesMass media entities were more likely to be prominent across via indicatorProminence did vary across conversational markers; yet, a few users were able to capture authoritative ranking across all indicators on a day by day basis (mention users such as Mona, Dima, Wael, Democracy Now journalists such as Andy Carvin, Ben Wederman from CNN, Al Jazeera English, and regular users such as Zenoibia). Can show table 2 for this part.RQ3: To what extent does the usage of hashtags reflect an organic level framing to the real world events occurring during the Egyptian protests?A series of hashtags emerged as contagious or sticky, suggesting an organic level of framing that arose to characterize or describe the revolution. These tended to be time related (25-Jan), place related (Egypt), and person centered (Mubarak). Framing by folksonomy and crowdsourcing (see table on hashtags)Hashtags represented events as they unfolded in Egypt (#Egypt, #tahrir, #mubarakHashtags captured the spread of the protests across the region to the Arab Spring (#sidibouzid to Tunesia, #Algeria, #Iran, #Libya, #Bahrain)
Popular (retweeted) not necessarily the most valued – overall density of ties among core actors low - ties long, strength of weak ties – figure examines this moreExplain how this looks in the discourse analysis - prominent actors not talking amongst themselves, talking to the people --- figure 2 and dicourse analysis confirms thisFigUtilizinga smaller subsample of the top 100 prominent actors across each individual addressivity marker, social network analytic methodologies were employed to derive a series of network visualizations of these chief opinion leaders or influentials. Consolidating the top 100 prominent actors across each addressivity marker yielded 201 unique nodes or actors, with 91 actors copresent in more than one marker. Figure 1 provides a network visualization of the unique 201 nodes in all three connectivity scenarios. In the visualization, larger nodes represent those actors with high indegree connections (addressivity markers that point to them). The visualization is laid out by the graph theoretic layout of principle components and colored based on the cores of connectivity occurring in this network of 201 unique prominent nodes across the addessivity markers. In this scenario, red nodes represent those actors that are more strongly interconnected and connected as a whole within the network. Density (0.037) and general reciprocity measures (0.0890) among core prominent actors reveal a network with a low level of connectivity among prominent actors. Further inspection of the network visualization in Figure 1 results in some interesting conclusions about how the networked effect of the Twitter platform crowdsources individuals into significance. Elite mass media actors in the offline world were less able to transfer their prominence to other prominent actors. Disconnected individuals, termed isolates (nodes appearing on the left side with no ties or lines to other nodes), include such elite offline actors as Bloomberg News, The London Telegraph, the Jerusalem Post, and the London Review. Other connected elite nodes are part of a core of less connected individuals, and these nodes include such actors as the New York Times, CNN, the Washington Post, and NPR, or elite international news outlets like the Guardian or the BBC news. Regional specific news outlets like Al Jazeera English are more highly connected than US centric media outlets. Even popular blogs like the Huffington Post, TechCrunch, and Global Voices gain less centrality among the top core of prominent actors. This data reveals that though many of these aforementioned nodes were popular in an overall sense in the network, the value of these nodes to more prominent nodes was less significant.ure 1
Figure 2 visualizes this low level of interconnectivity: the red lines reveal reciprocal connections, which is confined to a core group of actors. This low degree of interconnectivity among all prominent actors suggests that overall prominence of the majority of these central actors was facilitated by the lower level linkages of the long tail of the Twittersphere. Dense interconnections among prominent actors exist among select nodes, with the majority of the prominent nodes disconnected or weakly connected to each other.What did these people do to merit these recognition, how did they talk to othersFigure 2RQ2: To what extent did prominent users forge connections to other users based on the users’ levels of prominence across the different addressivity markers?Prominent users were no more likely to link to themselves as opposed to linking to others (suggest usage of the twitter platform to engage)Yet, prominent users in each addressivity marker were more likely to link to other prominent users (with prominence defined as top 10%) Among the most influential base of prominent users (defined as top 100 users across each addressivity marker resulting in 200+ unique nodes), there was low density ((0.037) and reciprocity ((0.0890) measures, suggesting very few network connections among most prominent users (result indicates that the crowd plays a strong role in buoying up nodes to significance, a strong filtering role)Most prominent users (those with high degree and betweeness centrality) were more likely to be mass media journalists and activist and less likely to be general mass media twitter accountsYou can show the two network diagrams. One shows the division of the prominent nodes in clusters of connectivity (called kcores, first network diagram), the next shows the low levels of connectivity among prominent nodes (second network diagram). Basically these findings show that the crowd was responsible for enabling some prominent nodes to become prominent, and that among these most prominent nodes, traditional media twitter accounts was less valuable or influential
that led to regime reversal. Affect and ambience helped sustain and drive the collective imagination of what might happen, before it happened