social media tech and user data
++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy
Digital Literacy for St. Cloud State University
++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy
Summary This short paper lays out an attempt to measure how much activity from Russian state-operated accounts released in the dataset made available by Twitter in October 2018 was targeted at the United Kingdom. Finding UK-related Tweets is not an easy task. By applying a combination of geographic inference, keyword analysis and classification by algorithm, we identified UK-related Tweets sent by these accounts and subjected them to further qualitative and quantitative analytic techniques.
We find:
There were three phases in Russian influence operations : under-the-radar account building, minor Brexit vote visibility, and larger-scale visibility during the London terror attacks.
Russian influence operations linked to the UK were most visible when discussing Islam . Tweets discussing Islam over the period of terror attacks between March and June 2017 were retweeted 25 times more often than their other messages.
The most widely-followed and visible troll account, @TEN_GOP, shared 109 Tweets related to the UK. Of these, 60 percent were related to Islam .
The topology of tweet activity underlines the vulnerability of social media users to disinformation in the wake of a tragedy or outrage.
Focus on the UK was a minor part of wider influence operations in this data . Of the nine million Tweets released by Twitter, 3.1 million were in English (34 percent). Of these 3.1 million, we estimate 83 thousand were in some way linked to the UK (2.7%). Those Tweets were shared 222 thousand times. It is plausible we are therefore seeing how the UK was caught up in Russian operations against the US .
Influence operations captured in this data show attempts to falsely amplify other news sources and to take part in conversations around Islam , and rarely show attempts to spread ‘fake news’ or influence at an electoral level.
On 17 October 2018, Twitter released data about 9 million tweets from 3,841 blocked accounts affiliated with the Internet Research Agency (IRA) – a Russian organisation founded in 2013 and based in St Petersburg, accused of using social media platforms to push pro-Kremlin propaganda and influence nation states beyond their borders, as well as being tasked with spreading pro-Kremlin messaging in Russia. It is one of the first major datasets linked to state-operated accounts engaging in influence operations released by a social media platform.
Conclusion
This report outlines the ways in which accounts linked to the Russian Internet ResearchAgency (IRA) carried out influence operations on social media and the ways their operationsintersected with the UK.The UK plays a reasonably small part in the wider context of this data. We see two possibleexplanations: either influence operations were primarily targeted at the US and British Twitterusers were impacted as collate, or this dataset is limited to US-focused operations whereevents in the UK were highlighted in an attempt to impact US public, rather than a concertedeffort against the UK. It is plausible that such efforts al so existed but are not reflected inthis dataset.Nevertheless, the data offers a highly useful window into how Russian influence operationsare carried out, as well as highlighting the moments when we might be most vulnerable tothem.Between 2011 and 2016, these state-operated accounts were camouflaged. Through manualand automated methods, they were able to quietly build up the trappings of an active andwell-followed Twitter account before eventually pivoting into attempts to influence the widerTwitter ecosystem. Their methods included engaging in unrelated and innocuous topics ofconversation, often through automated methods, and through sharing and engaging withother, more mainstream sources of news.Although this data shows levels of electoral and party-political influence operations to berelatively low, the day of the Brexit referendum results showed how messaging originatingfrom Russian state-controlled accounts might come to be visible – on June 24th 2016, we believe UK Twitter users discussing the Brexit Vote would have encountered messages originating from these accounts.As early as 2014, however, influence operations began taking part in conversations aroundIslam, and these accounts came to the fore during the three months of terror attacks thattook place between March and June 2017. In the immediate wake of these attacks, messagesrelated to Islam and circulated by Russian state-operated Twitter accounts were widelyshared, and would likely have been visible in the UK.The dataset released by Twitter begins to answer some questions about attempts by a foreignstate to interfere in British affairs online. It is notable that overt political or electoralinterference is poorly represented in this dataset: rather, we see attempts at stirring societaldivision, particularly around Islam in the UK, as the messages that resonated the most overthe period.What is perhaps most interesting about this moment is its portrayal of when we as socialmedia users are most vulnerable to the kinds of messages circulated by those looking toinfluence us. In the immediate aftermath of terror attacks, the data suggests, social mediausers were more receptive to this kind of messaging than at any other time.
+++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
Here’s the real danger that Facebook, Google, and the other tech monopolies pose to our society
Jamie Bartlett, October 1, 2018, https://blog.ed.ted.com/2018/10/01/heres-the-real-danger-that-facebook-google-and-the-other-tech-monopolies-pose-to-our-society/
distributed computing + power encryption = the future of Internet
the Dark Net is going mainstream, liberty, freedom, democracy; neither entirely dark, not entirely light, both things
The threat that tech monopolies pose to democracies is about more than the prices they charge: it’s the concentration of power, data and control over the public space — and their ability to wield this power over a growing number of economic activities, especially in the infrastructure and technologies of the future. The following companies operate as either monopolies or oligopolies in their respective fields: Google, Facebook, Uber, Airbnb, Amazon, Twitter, Instagram, Spotify. Integrated into everything, everywhere, their technology will blanket the world.
cultural hegemony.” That is, where domination can be achieved through controlling the ideas and assumptions available to the public. The idea, associated with philosopher and politician Antonio Gramsci
In 1995, left-wing academics Richard Barbrook and Andy Cameron detailed the philosophy and ideas of the new tech wunderkinds, christening it “The Californian Ideology.” This ideology represented a fusion of the cultural bohemianism of San Francisco and entrepreneurial free market zeal.
All you needed to get to utopia was a belief in “disruption,” the idea that progress is achieved through smashing up old industries and institutions and replacing them with something new and digital.
Money and ideas in Silicon Valley have a very complicated relationship. Silicon Valley runs according to a Faustian pact: money in exchange for world-changing ideas.
Over the years, the big tech firms have very carefully cultivated the Californian Ideology. Even though they are massive multi-billion-dollar corporations with huge PR teams, they pitch themselves as anti-establishment.The worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community.
And to whom do we look in order to solve our collective social problems? It’s no longer the state, but the modern tech-geek superhero.
Total victory for the monopoly is not over economics or politics. It’s over assumptions, ideas and possible futures.
++++++++++++
more on social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media
Tired of hearing all the reasons why you should be using Twitter, Facebook, LinkedIn, and other popular social media tools? Perhaps it’s time to explore social media tools in a supportive and engaging environment with a keen eye toward using those tools more effectively in your work.
Join us and social media guru and innovator Paul Signorelli in this four-week, highly-interactive eCourse as he explores a variety of social media tools in terms of how they can be used to organize information and communities. Together, you will survey and use a variety of social media tools, such as Delicious, Diigo, Facebook, Goodreads, Google Hangouts, LibraryThing, Pinterest, Twitter, and more! You will also explore how social media tools can be used to organize and disseminate information and how they can be used to foster and sustain communities of learning.
After participating in this eCourse, you will have an:
Part 1: Using Social Media Tools to Organize and Provide Access to Information
Delicious, Diigo, Goodreads, LibraryThing, and other tagging sites
Part 2: Organizing, Marketing, and Running Programs
Facebook, Pinterest, and other tools for engagement
Part 3: Expanding and Analyzing Community Impact
Twitter, Storify, and other microblogging resources
Part 4: Sustaining Engagement with Community Partners
Coordinating your presence and interactions across a variety of social media tools
trainer-instructional designer-presenter-consultant. Much of his work involves fostering community and collaboration face-to-face and online through libraries, other learning organizations, and large-scale community-based projects including San Francisco’s Hidden Garden Steps project, which has its origins in a conversation that took place within a local branch library. He remains active on New Media Consortium Horizon Report advisory boards/expert panels, in the Association for Talent Development (ATD–formerly the American Society for Training & Development), and with the American Library Association; adores blended learning; and remains a firm advocate of developing sustainable onsite and online community partnerships that meet all partners’ needs. He is co-author of Workplace Learning & Leadership with Lori Reed and author of the upcoming Change the World Using Social Media (Rowman & Littlefield, Autumn 2018).
++++++++++++
more on social media in libraries
https://blog.stcloudstate.edu/ims?s=social+media+library
https://www.theguardian.com/commentisfree/2018/apr/06/phone-camera-microphone-spying
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
++++++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance
+++++++++++++++++++++++++++
more about Twitter in this IMS blog
+++++++++++++++++++++
more on collaboration in education in this IMS blog:
https://blog.stcloudstate.edu/ims?s=collaboration+tools
LinkedIn: your college portfolio for future employmentApril 28, 1:30 – 2:30PM at Miller Center 205 April 30, 3 – 4PM at Miller Center 205 |
||
Right before students graduate from SCSU, Andrew Ditlevson (apditlevson@stcloudstate.edu) from Career Services (https://www.stcloudstate.edu/careerservices/) will offer an excellent workshop on how to use LinkedIn (https://www.linkedin.com/) to network and search for a job.However, your work on building a robust electronic portfolio can start much earlier. LinkedIn is famous for its networking and job search, but it can help you orient yourself in your future profession. | ||
Come to our informal discussion on what LinkedIn is and what LinkedIn does to share knowledge and experience about LinkedIn and similar social media (e.g. Coffee, Twitter), which can help you with your college studies and future profession.Further information available on the IMS blog: https://blog.stcloudstate.edu/ims/?s=linkedin |