دعوة للمشاركة في دراسة بحثية عن الخصوصية في وسائل التواصل الاجتماعي‎


السلام عليكم ورحمة الله وبركاته

أرجو التعاون معي في اجاد من هم رغبين في المشاركه من الشباب والشابات السعوديين في بحث عن الخصوصية في وسائل التواصل الاجتماعيه. هذا البحث يعتبر الأول من نوعه في مجال التفاعل الإنساني الحاسوبي (HCI) لفهم تأثير عادات و تقاليد المستخدمين العرب (السعودين بالذات) على هذه التقنيات وتأثيرها علينا و على عاداتنا كمستخدمين. الرجاء من من هم جادين التواصل معي عبر البريد الالكتروني.

————-
هل تستخدم شبكات الإعلام الاجتماعي؟ هل قمت بالدراسة لبعض الوقت في الولايات المتحدة أو كندا أو تخطط للقيام بذلك؟ هل أنت على استعداد للحديث عن آرائك وعاداتك فيما يتعلق بوسائل الإعلام الاجتماعية؟  في حال الإجابة بنعم، سأكون بغاية الامتنان إذا  أعطيتني حوالي ساعة ونصف من وقتك.

اسمي نورا أبو خضير وأنا سعودية مرشحة لنيل درجة الدكتوراه من جامعة واشنطن في سياتل، وفي بحثي أسعى لمعرفة ماذا تعني “الخصوصية” للشابات والشباب السعوديين في عصر الإعلام الاجتماعي. المشاركون المستهدفون في الدراسة هم السعوديون الشباب الذين درسوا لبعض الوقت في الولايات المتحدة أو كندا، أو الذين يخططون للقيام بذلك في أي من البلدين، ويستخدمون تطبيقات الإعلام .Instagram و Snapchatالاجتماعي مثل فيسبوك و

إجراءات المقابلة: سأمضي ساعة ونصف (قد تكون متواصلة أو موزعة على جلسات) مع كل مشارك (بشكل فردي) للتحدث عن استخدام الإعلام الاجتماعي والمشاغل المرتبطة به. يمكن إجراء المقابلة بالعربية أو الإنكليزية – بأي لغة تفضل.

 خلال المقابلة سينخرط المشاركون في نشاط قصير يتضمن إنشاء صورة مجمعة من عدة صور وكلمات (كولاج ) و لا يتطلب  مهارة في التصميم أو الفن للقيام بذلك.

لن أقوم بجمع أي معلومات شخصية. وقد تلقيت موافقة من قسم موضوع الدراسة البشري في جامعة واشنطن كباحثة لمتابعة هذا البحث بشرط السرية الكاملة.

يرجى إعلامي إذا في حال الرغبة بالمشاركة. كما يرجى تمرير هذه الرسالة لأي أشخاص آخرين قد تهمهم المشاركة.

شكراً!
———————-

My Experience at the Internet Research 15 Doctoral Colloquium

I just got back from Korea where I was attending IR15: Boundaries and Intersections (AoIR ’15). The main focus of this years conference was on studies and workshops that are engaging with complexities arising from points of intersection within and beyond the digital world. So, submissions included topic on the interface between the techno- and the –social and digital mobilities between and through spaces. Many other topics were discussed (please refer to the call for proposals for more information on IR15.) During my time in the conference I had an opportunity to discuss my work with great mentors and Ph.D. students from different countries, such as Australia, France, and England. It was really interesting to talk with other people about the different methods and theories they work with, and to get their feedback on mine.

It was my great pleasure to have been officially selected to attend the conference’s Doctoral Colloquium which was organized this year with the help of Microsoft Research Social Media Collective lab in New England. The full-day pre-conference workshop was divided into 4 sessions and organized in a way to allow us to breakout in a smaller group and discuss and then come together to state the highlights of our discussion to the larger group. The first session was about introducing our current work. In this session we discussed our work with our assigned mentor and receive critical feedback and comments on our topic and state of our research. My mentor for this session was Christian Sandvig, who is an Associate Professor at the University of Michigan. Christian, gave me great and practical feedback on the framing of my work and narrowing it down to a manageable dissertation. The Second session was about knowing our audience, where we discussed ways to navigate disciplinary intersections with our mentor. My mentor for this session was Sharif Mowlabocus, who is a Senior Lecturer (Assoc. Prof.) in Digital Media at the University of Sussex, UK. My time with Sharif was very useful, as he helped me navigate the different disciplines of my research and the interesting intersections between privacy, transnationalisim and social media. The third session was about become a teacher and a researcher at the same time. My mentor for this session was Sun Sun Lim, who is Assistant Dean for Research at the Faculty of Arts and Social Sciences and Associate Professor at the Department of Communications and New Media, National University of Singapore. Sun sun, had such great advice on teaching and managing time. She told me that one thing I need to keep in mind ==> not showing fear or lack of self-confidence in the classroom because “students smell fear” and they are there to learn from someone they assume know something more than them #truth #teachingwisdom. The forth session was about the professional life after the Ph.D. My mentor for this session was Airi Lampinen, who is a social scientist with an eye out for the everyday efforts needed to regulate interpersonal boundaries in the context of networked communication technologies. Airi, was great in giving me practical advice on how to approach the job market, especially that I am looking for an internship this year and she’s got a great experience with hiring committees. Finally, we had a closing discussion session as a full group to reflect on the day and the takeaways.

I really encourage every Ph.D. student (who passed their qualifiers or not yet ) to consider IR16: Digital Imaginaries, which will be held in Phoenix, AZ, USA, 21-24 October, 2014. Please feel free to send me any questions regarding the conference or my work.

cropped-aoir-website-header-png

Facebook Posts Scraper (Tool) (It is up again!)

I am sure many of you would like some help scraping – scraping is a technique of extracting information from websites – the posts of a specific Facebook group. For example, when I was working on one of my early projects entitled Youth, ICTs, and Democracy in Egypt with the Technology & Social Change Group (TASCHA) at the UW – Information School, we needed to undergo a qualitative coding exercise for approximately 700 Facebook posts from the April Youth Movement Facebook group.  However, at the time of data collection, Facebook’s format did not enable users to browse through old posts. Additionally, the number of daily posts was immense; manual collection would have been prohibitively time-consuming. Therefore, I quickly realized the need for an application to save me  time while collecting Facebook posts. In order to collect Facebook posts, we developed an application using the Facebook Graph application programming interface (API), which is a way for developers to access Facebook data and build applications. 

This is the link to the application http://groupbrowser.azurewebsites.net/

How to Use the Application: 

1. At the beginning Log in with your Facebook account.

Screen Shot 2014-01-20 at 12.01.48 PM

2. After logging in, add the name of the Facebook group that you want to extract the posts from  ( I recommend copying it from Facebook)
3. Add the start Date of the posts you want to display
4. Add the end Date of the posts you want to display
5. Add the Number of posts
6. Click Submit

Screen Shot 2014-01-20 at 12.06.16 PM

The results are going to show in a bulleted list for readability and ease of use.

I really hope you could benefit from using this free application and feel free to ping me if you had any questions or concerns. Also, I would like to hear from you, what do you think of the App ? Would it be beneficial for you ?

Update: I just published a new post for the Facebook Page Scrapper!

On the article: The Rise of Twitter Bots : The New Yorker

I spent some time reading the article The Rise of Twitter Bots published in the New Yorker. I very much recommend reading it if the word BotNet is new to you. The author – Bob Dubbin –  spends sometime briefing the reader on what Twitter bots are and includes some anecdotes on different twitter bots and how they were developed ( This is especially  important for me because of my work with Twitter bots and the lack of academic writing on social bots) . It was eye-opening for me to learn how some of these Twitter bots get developed and then sent into the wild to spam users. In the article, Exosaurs , (which is a bot created on Twitter) was given as an example of such bots. However, there are a lot more (e.g. @everyunicode) out there that were developed to spam users by integrating available datasets. Personally, the most interesting example shown in this article was the twitter bot that praises Fox new  and includes the #PraiseFox: RealHumanPraise. The bot gained 31,000 followers in no time by real account.

It is important to realize that when bots like these might not be very harmful – other than spamming your twitter feed with a random tweet every 2 min – it could still harm or impact public opinion when used by governments in political unrest (e.g. Syrian Civil war) . Also, Bot creators are now becoming very good at developing extremely sophisticated  Bots in a way that would make the tweets sound human-like.

I am excited that the Twitter bots are being brought to surface because I am sure with the rise of twitter bots we will encounter different ways in which these Bots will be employed in non traditional ways (e.g. marketing, politics ). As I mentioned earlier, this article  is  important to me and to other researchers working in this field because of the lake of reporting in this relatively new phenomenon. Currently, I am working on what we assume to be a Political  Twitter BotNet with my team at the University of Washington.

I would like to hear from you, what did you think of the article?

 

Discovering the Twitter Botnet

In my last  blog post, I discussed our data preparation and collection. In this blog post I will start talking about 1- a brief of some of our preliminary findings 2- The discovery of the botnet in our dataset.

To recap my last two blog posts, I want to remind you that we first, collected tweets from twitter to analyze tweets from the Syrian civil war. We did that by selecting 3 violent and 3 nonviolent events, after that we conducted 2 different kinds of analyses: log analysis (from the most re-tweeted tweets based on content) and network analysis (from the high account influence on a network diagram) on the re-tweeted tweets. In the last step, we compared the top retweeted accounts (twitter handles) from the log analysis and the network analysis then we conducted a comparative analysis between the top re-tweeted accounts across the different event types (3 violent and 3 nonviolent events).

The results from these 2 different analyses were:

1- In the nonviolent events data set, people were not tweeting about the salient events we selected (3 violent and 3 nonviolent events). For example, Angelina Jolie’s visit to the Syrian refugees’ camp in Jordan on September 11, 2012, wasn’t discussed in the tweets, however, people were tweeting about war-related issues (e.g., chemical bombs), comparing 9/11 and Syria Civil War.

2- From the salient violent events, we picked Houla Massacre that occurred on 5/25/2012 and compared the authors of top most retweeted tweets from the Log Analysis and the top retweeting accounts (we identified these by looking at the node size a.k.a node centrality) in the Network Analysis. The results of our analysis showed that they were totally different (Top retweeting authors’ ≠ Top retweeting nodes)

3- We compared our findings with the Influence Matrix (Source: Klout.com) Just to better understand our results. We found that we were interested in 3 different types of Twitter users: Curators, Celebrity, and Activist.

Picture23

We were curious to know if we could find any celebrity type in the data set, someone who has both high content influence and high account influence. So we compared top retweeted nodes to the entire log analysis (450 posts), searching for any overlapping cases. We found one such user account: @g1. 

We wanted to learn more about this user’s attributes however, the account was suspended. Therefore, we started browsing the name associated to the bot, both in English and Arabic, on the Internet. We found some interesting information, however, none was related to the war. We suspected that this person might be the human user behind @g1. However, she did not have much of an online presence, which made us suspect that she is the one running her account (at that time we started suspecting that we might be dealing with a fake account of a celebrity)

In the network graph, @g1 was clustered with 19 other users, 17 of whom were suspended. Wondering what might be the reason behind this large number of account suspensions, we started following @g1 across different events in the data set.

Content Analysis

To better understand what might be the reason for suspending @g1 account we conducted a high-level content analysis on her tweets archived during the period of April to December 2012. We found that the account had stopped posting (therefore, presumably had been suspended) on November 20, 2012. Also, from our high level content analysis we discovered that most of tweets are highly political, so this wasn’t the reason for suspension by twitter.

From there, we started conducting the same analyses on the accounts clustered with @g1 across all of the six events. As a result, we identified 42 Twitter handles that had stopped posting on November 20, 2012. Interestingly, we found that the majority of these accounts got suspended on the same date, November 20, 2012. Moreover, we found that all of their last tweets were around 6:30 AM UTC indicating a systemic ban. Lastly, we discovered that they all shared the same last tweet.

Additional analyses on the data set and we discovered

  1.  21 additional accounts that had stopped posting at that time, (thus 63 accounts in total).
  2. All of the accounts were retweeting, specifically with RT, the one unique account: @h1
  3. All shared the same last retweet content.
  4. All stopped tweeting almost at the same time around 6:30 AM UTC, November 20, 2012.
  5. Each user was tweeting  continuously round the clock.

Why is this network a botnet?

What made us suspect that this might be a botnet were the following indicators:

  1. The links attached to tweets
  2. The links attached to RT
  3. The frequency of tweeting
  4. Tweet text (The 3 letter random hashtag)

An example is this tweet: “RT @h1: #سوريا #Syria لوهان ستمثّل في أغنية مصوّرة لليدي غاغا http://t.co/uv2e3OGV #xmy” (English translation: RT @h1: Lindsay Lohn to appear on Lady Gaga’s next music video #Syria ##سوريا http://t.co/uv2e3OGV #xmy).

When we searched for the sentence “Lindsay Lohan to appear on Lady Gaga’s next music video” in Arabic, we found a news headline on the website http://www.elnashrafan.com with the exact text. However, when clicking on the link, we got redirected to http://alwatan.sy.

Another example is: “#سوريا #Syria بدء امتحانات الفصل الثاني للمرحلة الجامعية الأولى في جامعة #دمشق http://t.co/OTUpaarW #dmq” (English translation: The second midterms starts for University of # Damascus #Syria #سوريا http://t.co/OTUpaarW #dmq).

The botnet was using a random 3 letter hashtag in all it’s tweets #xmy #dmq . Why were they adding this hashtag is something we still don’t know. We are assuming that this is their tracking method or reach testing technique.

Lastly, clicking on the link embedded in this tweet redirects to an article on the a new website,  which is an Arabic independent news forum.

These are the two examples of many similar incidents. Most of the tweets that were randomly tested lead to one of three websites.

Currently, we are still conducting content and network analyses to understand this botnet behavior and the motives behind its creation. One of the things we are pretty confident about is the botnet tweets were all in support of Alasad’s government and that it was followed by real people, who also supports the current Syrian regime. We asked ourselves: Was this twitter botnet created at the time when the majority of tweets on the Syrian civil war were against the regime to influence the public opinion and to amplify the voices of the people who are pro-regime, maybe?

In the meantime, stay tuned for further results of this project.

*The following and follower data was collected on March 18, 2013, not on the date of the event. For the top RT nodes, we only used data for 3 accounts because 17 accounts were suspended.)

** This project is in collaboration with Daisy Yoo and David McDonald from the iSchool at the University of Washington. Please don’t make copies of the content until you contact the blog admin.

***The twitter handles used in the post are not real they are pseudonyms created by the team.

[1]http://www.elcinema.com/person/pr1104200/

Political Bots: Who is Re-tweeting the Syrian Civil War?

syria2

This is a project that I am currently working on with David McDonald and Daisy Yoo, they are both from the iSchool. The project started last year (2012) and the main objective of the project was to understand the role of Twitter in the ongoing conflict in Syria. Moreover, we were aiming on understanding how people use the retweet function to amplify their voices during protracted political conflicts such as war. In this study, we use two metrics to measure influence: (1) content influence — the number of retweets that a piece of content is receiving; and (2) account influence — the number of retweets that an account is receiving.

That said, we had an initial hypothesis about the types of influential voices on the RT network: (a) activists, people with an idea or a cause, who have high content influence but low account influence; and (b) celebrities, who have both high content influence and high account influence. Furthermore, we assumed that activists’ influence would be based on proactive networking ability (two-way communication) while celebrities’ influence would be based on individual fame and authority (one-way communication).

Syria1

However, the findings from our data reveled other interesting findings that neither of our hypotheses explained. For example, the image below is a network analysis of all retweets (From our dataset 1) November 10, 2012 – Syrian National Council Election, and in the image you will notice that there are nodes with high centrality and low centrality on the left of the digram. You will also notice that the edges have varied thickness, compared to the right small cluster (Purple color) . The right cluster looks like they were RTing each other equally and not only on this date, but in many others.

bot net

To know more about the right cluster and what were they tweeting, please stay tuned for the next blog post where I am going to explain what we found and our next steps.

1: Preparing the Dataset will be discussed in the coming post