scholarly journals Endogenetic structure of filter bubble in social networks

2019 ◽  
Vol 6 (11) ◽  
pp. 190868
Author(s):  
Yong Min ◽  
Tingjun Jiang ◽  
Cheng Jin ◽  
Qu Li ◽  
Xiaogang Jin

The filter bubble is an intermediate structure to provoke polarization and echo chambers in social networks, and it has become one of today's most urgent issues for social media. Previous studies usually equated filter bubbles with community structures and emphasized this exogenous isolation effect, but there is a lack of full discussion of the internal organization of filter bubbles. Here, we design an experiment for analysing filter bubbles taking advantage of social bots. We deployed 128 bots to Weibo (the largest microblogging network in China), and each bot consumed a specific topic (entertainment or sci-tech) and ran for at least two months. In total, we recorded about 1.3 million messages exposed to these bots and their social networks. By analysing the text received by the bots and motifs in their social networks, we found that a filter bubble is not only a dense community of users with the same preferences but also presents an endogenetic unidirectional star-like structure. The structure could spontaneously exclude non-preferred information and cause polarization. Moreover, our work proved that the felicitous use of artificial intelligence technology could provide a useful experimental approach that combines privacy protection and controllability in studying social media.

Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


2019 ◽  
pp. 228-247 ◽  
Author(s):  
William H. Dutton ◽  
Bianca C. Reisdorf ◽  
Grant Blank ◽  
Elizabeth Dubois ◽  
Laleah Fernandez

Concern over filter bubbles, echo chambers, and misinformation on the Internet are not new. However, as noted by Howard and Bradshaw (Chapter 12), events around the 2016 US presidential election and the UK’s Brexit referendum brought these concerns up again to near-panic levels, raising questions about the political implications of the algorithms that drive search engines and social media. To address these issues, the authors conducted an extensive survey of Internet users in Britain, France, Germany, Italy, Poland, Spain, and the US, asking respondents how they use search, social media, and other media for getting information about politics, and what difference these media have made for them. Their findings demonstrate that search is one among many media gateways and outlets deployed by those interested in politics, and that Internet users with an interest in politics and search skills are unlikely to be trapped in a filter bubble, or cocooned in a political echo chamber.


Author(s):  
Rob Grace ◽  
Jess Kropczynski ◽  
Scott Pezanowski ◽  
Shane Halse ◽  
Prasanna Umar ◽  
...  

Local social media users share and access critical information before, during, and after emergencies. However, existing methods can identify local social media users only after an emergency has occurred, and only then discover a small proportion of users sharing information in a geographic area. To address these limitations, we introduce the method of Social Triangulation to identify local social media users who access community information before an emergency in order to develop emergency communications strategies that contribute to community resilience. Social Triangulation identifies local users vis-à-vis the community organizations they curate within their social networks and, as a result, helps reveal the information infrastructure of a community. Consequently, social triangulation can inform emergency communications planning by identifying “filter bubbles” among social media users loosely embedded in an information infrastructure, as well as community influencers who are well-positioned to redistribute official information during an emergency.


Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


2020 ◽  
pp. 5-17
Author(s):  
Maria Teresa Cuomo ◽  
Francesca Ceruti ◽  
Alice Mazzucchelli ◽  
Alex Giordano ◽  
Debora Tortora

The actual omnichannel customer uses indifferently both online and offline channels to express himself through consumption, which increasingly blends personal, cultural and social dimensions. In this perspective social media and social networks are able to assist e-retailers in their effort of creating a total e-customer experience, especially in the tourism industry, trying to satisfy their clients from the relational and commercial point of view. By means of an empirical analysis where managers were interviewed on the topic and its degree of application in the firms, the paper underlines how from the managerial point of view, that represents a new prospect on the topic, the expected shift from e-commerce to social commerce paradigm, facilitating the selling and buying of products and services by using various internet features, is nowadays not completely understood and realized.


Author(s):  
Sanjay Chhataru Gupta

Popularity of the social media and the amount of importance given by an individual to social media has significantly increased in last few years. As more and more people become part of the social networks like Twitter, Facebook, information which flows through the social network, can potentially give us good understanding about what is happening around in our locality, state, nation or even in the world. The conceptual motive behind the project is to develop a system which analyses about a topic searched on Twitter. It is designed to assist Information Analysts in understanding and exploring complex events as they unfold in the world. The system tracks changes in emotions over events, signalling possible flashpoints or abatement. For each trending topic, the system also shows a sentiment graph showing how positive and negative sentiments are trending as the topic is getting trended.


2020 ◽  
Vol 19 (12) ◽  
pp. 2225-2252
Author(s):  
E.V. Popov ◽  
V.L. Simonova ◽  
O.V. Komarova ◽  
S.S. Kaigorodova

Subject. The emergence of new ways of interaction between sellers and buyers, the formation of new sales channels and product promotion based on the use of digital economy tools is at the heart of improving the business processes. Social networks became a tool for development; their rapid growth necessitates theoretical understanding and identification of potential application in enterprise's business process digitalization. Objectives. We explore the role of social media in the digitalization of business processes, systematize the impact of social networks on business processes of enterprises in the digital economy. Methods. The theoretical and methodological analysis of social networks as a tool for digitalization of company's business processes rests on the content analysis of domestic and foreign scientific studies, comparison, generalization and systematization. Results. We highlight the key effects of the impact of social networks on the business processes of the company; show that the digitalization of business processes should be considered in the context of a value-based approach, aimed at creating a value through the algorithmization of company operations. We determine that social networks are one of the most important tools for digitalization of company's business processes, as they have a high organizational and management potential. We also systematize the effects of social media on company's business processes. Conclusions. We present theoretical provisions of the impact of social networks on business processes of enterprises, which will enable to model and organize ideas about the development of digital ecosystems and the formation of business models.


MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


Law and World ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 19-26

Sharing child’s visual materials online for purely personal purposes by parents, family members or close relatives is a widespread practice, especially, where the availability of internet services is provided, which therefore, poses challenges to privacy protection of the child. Children, as one of the most vulnerable members of society, need special attention with regard of protection of fundamental rights, where privacy a crucial one. This article reviews the implications of child’s privacy on social media with the emphasis on sharing minor’s visual materials.


Sign in / Sign up

Export Citation Format

Share Document