SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Key points
• Introduction and purpose
• Concepts
• Research Questions
• Methodology
• Results
• conclusions
Introduction
• Paper introduction:
• Boyden (2012) proclaims, “Social-media networks have resulted in
the over sharing of information.” (p. 39). He continues with the
harsh reality that individuals share all sorts of personal information
without considering the lack of privacy on the Internet. “These
people need to be reminded that there are rules about how much
information must be shared, and with whom—rules that served a
prior generation just fine and continue to govern the Internet, even
if they seem old-fashioned.” (p.1) eight or nine years ago, over
sharing hardly happened as youth utilized social media sites such as
Myspace to simply share their music taste and possibly post a
picture. As a digital age approached, more content became
permitted on the internet and a vast portion of it is violent.
Purpose
• The purpose of my paper was to evaluate and measure violence in
social media; to evaluate the growing “Black Twitter” and its
relevance and popularity; and to access what is “violent content” in
social media.
• Agarwal (2012) found, “Another source of exposure to violence is
the Internet and video games” (p. 39).
• There has always been a debate about if violence on the Internet
stimulates violent behavior, but now we need to discuss why so
much violent content is so easily accessible in the first place.
• The bystander effect has not gone away but simply evolved. People
not only stand back when violence is occurring, but they record it
and post it on the internet.
• This has its positive and its negative, and the research I conducted
for this paper evaluates both.
Concepts
• Black Twitter – where it came from, why it’s so
popular, what is it all about?
• Sexual Content – it’s not exactly violence, but it is
comparable to violent content. It’s completely
unnecessary and needs to be evaluated. I didn’t
go in depth with this but it is mentioned.
• Violent content – how do you define what’s
violent? How are criminals benefitting? How law
enforcement is utilizing social media to catch
criminals.
Research questions
• #1 - how do social networks become
functional for criminal behavior?
• #2 - what types of violent content exists within
social media?
• #3 - is black twitter giving more attention to
violence in social media?
Methodology
• I had to narrow my research down to be very specific. Its
hard to measure violent content when the definition of
violence varies.
• I used Black Twitter as my main source for research.
• Research tools: Academic Search Complete, TweetReach
(black twitter), Topsy, Twazzup, Social Mention, NodeXL,
and my own personal research (I looked up black twitter on
Twitter, Instagram and Facebook.
• I also found interesting articles: The truth about Black
Twitter, No one is safe from black twitter; not even black
people, and articles that discuss oversharing on social
networks.
Results (1)
• I found that Black Twitter is very successful.
– It had 55,000 impressions and has reached 43,000 accounts.
There has been 86,000 tweets concerning black twitter in the
past 30 days. This is pretty good for a topic that’s been
trending for awhile.
– Some of the top contributors were interesting. Most weren’t
black, and the top contributor was an art collector.
– Most of the content isn’t violent. It may give awareness to
violence in trying to begin a social movement, but most of the
content is either uplifting or humorous. (Mike Brown, Black
Celebs be like)
– Black Twitter is not limited to the black community. A Pew
Internet study showed that blacks are less likely than whites
to use the Internet.
Results (2)
• Criminals use other criminals to become a better criminal.
– Armengol and Zenou (2003) says, “We develop a model in which delinquents
compete with each other in criminal activities but may benefit from being friends
with other criminals by learning and acquiring proper know-how on the crime
business.”
– Gang members especially use social media to spread violence. They have their
own social structure and social connections. Post a video towards your target and
you can bet it will spread to them.
• Defining violent content depends on the person. Violence is defined as exertion of
physical force so as to injure or abuse. Violent content on the internet can include
physical fights, threats to other users or Bullying. But yet again, its complicated and
hard to define.
• I came to the conclusion that violent content on social media has its positives and
negatives.
– It benefits law enforcement because it helps them catch criminals, but it’s sad
that social media is the platform for the violent content.
Conclusions
• The best thing any individual who uses the internet can do is be
cautious and respectful when sharing content.
• Due to the fact that “violent content” varies, there are many
limitations to this kind of research.
• Despite these limitations, each social media platform needs to do
a better job of monitoring the violent or sexual content it allows.
• In regards to Black Twitter, I don’t think its going anywhere. The
black community has felt unheard and ignored for awhile. I do
believe the network should change its name to something less
intimidating, but with its success on social media it should
continue.
• I would like to believe that the Internet will have a clean sweep
and all of the violent/ sexual content will disappear, but sadly it
will probably get worse. As technology advances, the content shall
too.

Weitere ähnliche Inhalte

Was ist angesagt?

NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentSamara Williams
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internetno0orcom
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...Liliana Bounegru
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorshipomid abbasi
 
Social techno-graphics profile about your customers
Social techno-graphics profile about your customersSocial techno-graphics profile about your customers
Social techno-graphics profile about your customersLi Li
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...Farida Vis
 
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...Toronto Metropolitan University
 
GitHub as Transparency Device in Data Journalism, Open Data and Data Activism
GitHub as Transparency Device in  Data Journalism, Open Data and Data ActivismGitHub as Transparency Device in  Data Journalism, Open Data and Data Activism
GitHub as Transparency Device in Data Journalism, Open Data and Data ActivismLiliana Bounegru
 
Research Paper
Research PaperResearch Paper
Research Papermdhughley
 
Greek independent media and the antifascist movement
Greek independent media and the antifascist movementGreek independent media and the antifascist movement
Greek independent media and the antifascist movementTim Highfield
 
Collective Intelligence
Collective IntelligenceCollective Intelligence
Collective IntelligenceSonia Ghera
 
Doing Digital Methods: Some Recent Highlights from Winter and Summer Schools
Doing Digital Methods: Some Recent Highlights from Winter and Summer SchoolsDoing Digital Methods: Some Recent Highlights from Winter and Summer Schools
Doing Digital Methods: Some Recent Highlights from Winter and Summer SchoolsLiliana Bounegru
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paperChirine Hamdan
 

Was ist angesagt? (20)

NETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassmentNETS5003 Policy Primer: Cyber harassment
NETS5003 Policy Primer: Cyber harassment
 
Censorship on the Internet
Censorship on the InternetCensorship on the Internet
Censorship on the Internet
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Social techno-graphics profile about your customers
Social techno-graphics profile about your customersSocial techno-graphics profile about your customers
Social techno-graphics profile about your customers
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
ESRC Research Methods Festival - From Flickr to Snapchat: The challenge of an...
 
Ethics In New Media
Ethics In New MediaEthics In New Media
Ethics In New Media
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...
From 13 Reasons Why to Suicide Watch: Reddit Discussions about the Controvers...
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
GitHub as Transparency Device in Data Journalism, Open Data and Data Activism
GitHub as Transparency Device in  Data Journalism, Open Data and Data ActivismGitHub as Transparency Device in  Data Journalism, Open Data and Data Activism
GitHub as Transparency Device in Data Journalism, Open Data and Data Activism
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Greek independent media and the antifascist movement
Greek independent media and the antifascist movementGreek independent media and the antifascist movement
Greek independent media and the antifascist movement
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Collective Intelligence
Collective IntelligenceCollective Intelligence
Collective Intelligence
 
Doing Digital Methods: Some Recent Highlights from Winter and Summer Schools
Doing Digital Methods: Some Recent Highlights from Winter and Summer SchoolsDoing Digital Methods: Some Recent Highlights from Winter and Summer Schools
Doing Digital Methods: Some Recent Highlights from Winter and Summer Schools
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paper
 

Andere mochten auch

DebraDixon_Capstone_Assignment Unit 9
DebraDixon_Capstone_Assignment Unit 9DebraDixon_Capstone_Assignment Unit 9
DebraDixon_Capstone_Assignment Unit 9Debbie Dixon
 
Книжная выставка
Книжная выставкаКнижная выставка
Книжная выставкаLaunc
 
участники ВОВ 6а класса
участники ВОВ 6а классаучастники ВОВ 6а класса
участники ВОВ 6а классаLera_ku2
 
Angela Marrs HR OS Resume (8-4-15a)
Angela Marrs  HR OS Resume (8-4-15a)Angela Marrs  HR OS Resume (8-4-15a)
Angela Marrs HR OS Resume (8-4-15a)Angela Marrs
 
Alternative fuels final presentation
Alternative fuels final presentationAlternative fuels final presentation
Alternative fuels final presentationkodie
 
Herramientas para realizar diagnósticos
Herramientas  para realizar diagnósticosHerramientas  para realizar diagnósticos
Herramientas para realizar diagnósticosptardilaq
 
Bedömning föräldrainfo
Bedömning föräldrainfoBedömning föräldrainfo
Bedömning föräldrainfoKarstorpskolan
 

Andere mochten auch (13)

Denton Resume
Denton ResumeDenton Resume
Denton Resume
 
DebraDixon_Capstone_Assignment Unit 9
DebraDixon_Capstone_Assignment Unit 9DebraDixon_Capstone_Assignment Unit 9
DebraDixon_Capstone_Assignment Unit 9
 
Книжная выставка
Книжная выставкаКнижная выставка
Книжная выставка
 
участники ВОВ 6а класса
участники ВОВ 6а классаучастники ВОВ 6а класса
участники ВОВ 6а класса
 
Web en joomla
Web en joomlaWeb en joomla
Web en joomla
 
Andy Morrison cv
Andy Morrison cvAndy Morrison cv
Andy Morrison cv
 
mercadotecnia V
mercadotecnia Vmercadotecnia V
mercadotecnia V
 
Angela Marrs HR OS Resume (8-4-15a)
Angela Marrs  HR OS Resume (8-4-15a)Angela Marrs  HR OS Resume (8-4-15a)
Angela Marrs HR OS Resume (8-4-15a)
 
Alternative fuels final presentation
Alternative fuels final presentationAlternative fuels final presentation
Alternative fuels final presentation
 
Сервис "Лучшие врачи нашего города"
Сервис "Лучшие врачи нашего города"Сервис "Лучшие врачи нашего города"
Сервис "Лучшие врачи нашего города"
 
Diagnostico Estrategico
Diagnostico EstrategicoDiagnostico Estrategico
Diagnostico Estrategico
 
Herramientas para realizar diagnósticos
Herramientas  para realizar diagnósticosHerramientas  para realizar diagnósticos
Herramientas para realizar diagnósticos
 
Bedömning föräldrainfo
Bedömning föräldrainfoBedömning föräldrainfo
Bedömning föräldrainfo
 

Ähnlich wie Measuring Violence in Social Media

Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque Lewis
 
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...miladkhazani
 
Final edit of cap stone power point
Final edit of cap stone power pointFinal edit of cap stone power point
Final edit of cap stone power pointSteven Pereira
 
Computational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social MediaComputational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social MediaToronto Metropolitan University
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics PresentationPalmRyan
 
Web Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From HereWeb Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From HereShireen Mitchell
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation courtneyjohnson105
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slidesAmnaIqbal80
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
Assignment 7
Assignment 7Assignment 7
Assignment 7Rosiezein
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & ImpactGaurav Wadhwa
 
Social Media for Legal Faculty & Professionals
Social Media for Legal Faculty & ProfessionalsSocial Media for Legal Faculty & Professionals
Social Media for Legal Faculty & ProfessionalsKristen Grennan
 
Journalism and society term 2 week 4
Journalism and society term 2 week 4Journalism and society term 2 week 4
Journalism and society term 2 week 4Fatima B
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!mediaplaylab
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymousccastronovo
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 

Ähnlich wie Measuring Violence in Social Media (20)

Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...
Algorithms_of_Oppression_How_Search_Engines_Reinfo..._----_(1._A_Society_Sear...
 
Final edit of cap stone power point
Final edit of cap stone power pointFinal edit of cap stone power point
Final edit of cap stone power point
 
Computational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social MediaComputational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social Media
 
Are you ‘in’ or have you
Are you ‘in’ or have youAre you ‘in’ or have you
Are you ‘in’ or have you
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics Presentation
 
Web Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From HereWeb Utopia Lost: Where Do We Go From Here
Web Utopia Lost: Where Do We Go From Here
 
Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation Social and Ethical Issues in the Digital Era Presentation
Social and Ethical Issues in the Digital Era Presentation
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slides
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
AoIR 2019
AoIR 2019AoIR 2019
AoIR 2019
 
Assignment 7
Assignment 7Assignment 7
Assignment 7
 
Social Networking: Use & Impact
Social Networking: Use & ImpactSocial Networking: Use & Impact
Social Networking: Use & Impact
 
Social Media for Legal Faculty & Professionals
Social Media for Legal Faculty & ProfessionalsSocial Media for Legal Faculty & Professionals
Social Media for Legal Faculty & Professionals
 
Journalism and society term 2 week 4
Journalism and society term 2 week 4Journalism and society term 2 week 4
Journalism and society term 2 week 4
 
Character Development, for students, by students!
Character Development, for students, by students!Character Development, for students, by students!
Character Development, for students, by students!
 
Cyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group AnonymousCyberbullying Final Project by Group Anonymous
Cyberbullying Final Project by Group Anonymous
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 

Kürzlich hochgeladen

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 

Kürzlich hochgeladen (11)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 

Measuring Violence in Social Media

  • 1.
  • 2. Key points • Introduction and purpose • Concepts • Research Questions • Methodology • Results • conclusions
  • 3. Introduction • Paper introduction: • Boyden (2012) proclaims, “Social-media networks have resulted in the over sharing of information.” (p. 39). He continues with the harsh reality that individuals share all sorts of personal information without considering the lack of privacy on the Internet. “These people need to be reminded that there are rules about how much information must be shared, and with whom—rules that served a prior generation just fine and continue to govern the Internet, even if they seem old-fashioned.” (p.1) eight or nine years ago, over sharing hardly happened as youth utilized social media sites such as Myspace to simply share their music taste and possibly post a picture. As a digital age approached, more content became permitted on the internet and a vast portion of it is violent.
  • 4. Purpose • The purpose of my paper was to evaluate and measure violence in social media; to evaluate the growing “Black Twitter” and its relevance and popularity; and to access what is “violent content” in social media. • Agarwal (2012) found, “Another source of exposure to violence is the Internet and video games” (p. 39). • There has always been a debate about if violence on the Internet stimulates violent behavior, but now we need to discuss why so much violent content is so easily accessible in the first place. • The bystander effect has not gone away but simply evolved. People not only stand back when violence is occurring, but they record it and post it on the internet. • This has its positive and its negative, and the research I conducted for this paper evaluates both.
  • 5. Concepts • Black Twitter – where it came from, why it’s so popular, what is it all about? • Sexual Content – it’s not exactly violence, but it is comparable to violent content. It’s completely unnecessary and needs to be evaluated. I didn’t go in depth with this but it is mentioned. • Violent content – how do you define what’s violent? How are criminals benefitting? How law enforcement is utilizing social media to catch criminals.
  • 6. Research questions • #1 - how do social networks become functional for criminal behavior? • #2 - what types of violent content exists within social media? • #3 - is black twitter giving more attention to violence in social media?
  • 7. Methodology • I had to narrow my research down to be very specific. Its hard to measure violent content when the definition of violence varies. • I used Black Twitter as my main source for research. • Research tools: Academic Search Complete, TweetReach (black twitter), Topsy, Twazzup, Social Mention, NodeXL, and my own personal research (I looked up black twitter on Twitter, Instagram and Facebook. • I also found interesting articles: The truth about Black Twitter, No one is safe from black twitter; not even black people, and articles that discuss oversharing on social networks.
  • 8. Results (1) • I found that Black Twitter is very successful. – It had 55,000 impressions and has reached 43,000 accounts. There has been 86,000 tweets concerning black twitter in the past 30 days. This is pretty good for a topic that’s been trending for awhile. – Some of the top contributors were interesting. Most weren’t black, and the top contributor was an art collector. – Most of the content isn’t violent. It may give awareness to violence in trying to begin a social movement, but most of the content is either uplifting or humorous. (Mike Brown, Black Celebs be like) – Black Twitter is not limited to the black community. A Pew Internet study showed that blacks are less likely than whites to use the Internet.
  • 9. Results (2) • Criminals use other criminals to become a better criminal. – Armengol and Zenou (2003) says, “We develop a model in which delinquents compete with each other in criminal activities but may benefit from being friends with other criminals by learning and acquiring proper know-how on the crime business.” – Gang members especially use social media to spread violence. They have their own social structure and social connections. Post a video towards your target and you can bet it will spread to them. • Defining violent content depends on the person. Violence is defined as exertion of physical force so as to injure or abuse. Violent content on the internet can include physical fights, threats to other users or Bullying. But yet again, its complicated and hard to define. • I came to the conclusion that violent content on social media has its positives and negatives. – It benefits law enforcement because it helps them catch criminals, but it’s sad that social media is the platform for the violent content.
  • 10. Conclusions • The best thing any individual who uses the internet can do is be cautious and respectful when sharing content. • Due to the fact that “violent content” varies, there are many limitations to this kind of research. • Despite these limitations, each social media platform needs to do a better job of monitoring the violent or sexual content it allows. • In regards to Black Twitter, I don’t think its going anywhere. The black community has felt unheard and ignored for awhile. I do believe the network should change its name to something less intimidating, but with its success on social media it should continue. • I would like to believe that the Internet will have a clean sweep and all of the violent/ sexual content will disappear, but sadly it will probably get worse. As technology advances, the content shall too.