Twitter trends

Last updated

Countries and cities with local trending topics in Twitter Twitter TT.PNG
Countries and cities with local trending topics in Twitter

On X, commonly referred to by its former name Twitter, a word, phrase, or topic that is mentioned at a greater rate than others is said to be a "trending topic" or simply a "trend". Trending topics become popular either through a concerted effort by users or because of an event that prompts people to talk about a specific topic. [1]

Contents

Trending topics are sometimes the result of concerted efforts and manipulations by fans of certain celebrities or cultural phenomena. Twitter has altered the trend algorithm in the past to prevent manipulation of this type with limited success. [2]

Impact

Examples of high-impact topics include the wildfires in San Diego, [3] the earthquake in Japan, [4] popular sporting events, [5] and political uprisings in Iran [6] and Egypt. [7]

Controversies

Twitter often censors trending hashtags that are claimed to be abusive or offensive. Twitter censored the #Thatsafrican [8] and #thingsdarkiessay hashtags after users complained that they found the hashtags offensive. [9] There are allegations that Twitter removed #NaMOinHyd from the trending list and added an Indian National Congress-sponsored hashtag. [10]

In 2019, 20% of the global trends were found to be fake, created automatically using fake and compromised accounts originating from Turkey. It is reported that 108,000 accounts were employed since 2015 to push 19,000 keywords such as advertisements and political campaigns, to top trends in Turkey by bulk tweeting. [11]

See also

Related Research Articles

<span class="mw-page-title-main">WIMP (computing)</span> Style of human-computer interaction

In human–computer interaction, WIMP stands for "windows, icons, menus, pointer", denoting a style of interaction using these elements of the user interface. Other expansions are sometimes used, such as substituting "mouse" and "mice" for menus, or "pull-down menu" and "pointing" for pointer.

A recommender system, or a recommendation system, is a subclass of information filtering system that provides suggestions for items that are most pertinent to a particular user. Recommender systems are particularly useful when an individual needs to choose an item from a potentially overwhelming number of items that a service may offer.

<span class="mw-page-title-main">Ben Shneiderman</span> American computer scientist

Ben Shneiderman is an American computer scientist, a Distinguished University Professor in the University of Maryland Department of Computer Science, which is part of the University of Maryland College of Computer, Mathematical, and Natural Sciences at the University of Maryland, College Park, and the founding director (1983-2000) of the University of Maryland Human-Computer Interaction Lab. He conducted fundamental research in the field of human–computer interaction, developing new ideas, methods, and tools such as the direct manipulation interface, and his eight rules of design.

Backchannel is the use of networked computers to maintain a real-time online conversation alongside the primary group activity or live spoken remarks. The term was coined from the linguistics term to describe listeners' behaviours during verbal communication.

End-user development (EUD) or end-user programming (EUP) refers to activities and tools that allow end-users – people who are not professional software developers – to program computers. People who are not professional developers can use EUD tools to create or modify software artifacts and complex data objects without significant knowledge of a programming language. In 2005 it was estimated that by 2012 there would be more than 55 million end-user developers in the United States, compared with fewer than 3 million professional programmers. Various EUD approaches exist, and it is an active research topic within the field of computer science and human-computer interaction. Examples include natural language programming, spreadsheets, scripting languages, visual programming, trigger-action programming and programming by example.

<span class="mw-page-title-main">Hashtag</span> Metadata tag prefixed with #

A hashtag is a metadata tag that is prefaced by the hash symbol, #. On social media, hashtags are used on microblogging and photo-sharing services such as X or Tumblr as a form of user-generated tagging that enables cross-referencing of content by topic or theme. It is still sometimes known as the pound sign. For example, a search within Instagram for the hashtag #bluesky returns all posts that have been tagged with that term. After the initial hash symbol, a hashtag may include letters, numerals, or underscores.

Reblogging is the mechanism in blogging which allows users to repost the content of another user's post with an indication that the source of the post is another user.

Shadow banning, also called stealth banning, hellbanning, ghost banning, and comment ghosting, is the practice of blocking or partially blocking a user or the user's content from some areas of an online community in such a way that the ban is not readily apparent to the user, regardless of whether the action is taken by an individual or an algorithm. For example, shadow-banned comments posted to a blog or media website would be visible to the sender, but not to other users accessing the site.

Social spam is unwanted spam content appearing on social networking services, social bookmarking sites, and any website with user-generated content. It can be manifested in many ways, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.

The term twitter bomb or tweet bomb refers to posting numerous Tweets with the same hashtags and other similar content, including @messages, from multiple accounts, with the goal of advertising a certain meme, usually by filling people's Tweet feeds with the same message, and making it a "trending topic" on X. This may be done by individual users, fake accounts, or both.

An X bot, formerly known as Twitter bot, is a type of software bot that controls an X account via the X API. The social bot software may autonomously perform actions such as posting, reposting, liking, following, unfollowing, or direct messaging other accounts. The automation of X accounts is governed by a set of automation rules that outline proper and improper uses of automation. Proper usage includes broadcasting helpful information, automatically generating interesting or creative content, and automatically replying to users via direct message. Improper usage includes circumventing API rate limits, violating user privacy, spamming, and sockpuppeting. Twitter bots may be part of a larger botnet. They can be used to influence elections and in misinformation campaigns.

In web analytics, a session, or visit is a unit of measurement of a user's actions taken within a period of time or with regard to completion of a task. Sessions are also used in operational analytics and provision of user-specific recommendations. There are two primary methods used to define a session: time-oriented approaches based on continuity in user activity and navigation-based approaches based on continuity in a chain of requested pages.

<span class="mw-page-title-main">Filippo Menczer</span> American and Italian computer scientist

Filippo Menczer is an American and Italian academic. He is a University Distinguished Professor and the Luddy Professor of Informatics and Computer Science at the Luddy School of Informatics, Computing, and Engineering, Indiana University. Menczer is the Director of the Observatory on Social Media, a research center where data scientists and journalists study the role of media and technology in society and build tools to analyze and counter disinformation and manipulation on social media. Menczer holds courtesy appointments in Cognitive Science and Physics, is a founding member and advisory council member of the IU Network Science Institute, a former director the Center for Complex Networks and Systems Research, a senior research fellow of the Kinsey Institute, a fellow of the Center for Computer-Mediated Communication, and a former fellow of the Institute for Scientific Interchange in Turin, Italy. In 2020 he was named a Fellow of the ACM.

Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract actionable patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research. The term is an analogy to the resource extraction process of mining for rare minerals. Resource extraction mining requires mining companies to shift through vast quantities of raw ore to find the precious minerals; likewise, social media mining requires human data analysts and automated software programs to shift through massive amounts of raw social media data in order to discern patterns and trends relating to social media usage, online behaviours, sharing of content, connections between individuals, online buying behaviour, and more. These patterns and trends are of interest to companies, governments and not-for-profit organizations, as these organizations can use these patterns and trends to design their strategies or introduce new programs, new products, processes or services.

RIPE Atlas is a global, open, distributed Internet measurement platform, consisting of thousands of measurement devices that measure Internet connectivity in real time.

A social bot, also described as a social AI or social algorithm, is a software agent that communicates autonomously on social media. The messages it distributes can be simple and operate in groups and various configurations with partial human control (hybrid) via algorithm. Social bots can also use artificial intelligence and machine learning to express messages in more natural human dialogue.

Animal–computer interaction (ACI) is a field of research for the design and use of technology with, for and by animals covering different kinds of animals from wildlife, zoo and domesticated animals in different roles. It emerged from, and was heavily influenced by, the discipline of Human–computer interaction (HCI). As the field expanded, it has become increasingly multi-disciplinary, incorporating techniques and research from disciplines such as artificial intelligence (AI), requirements engineering (RE), and veterinary science.

<span class="mw-page-title-main">Ingmar Weber</span> German computer scientist (born 1978)

Ingmar Weber is a German computer scientist known for his research on Computational Social Science in which he uses online data to study population behavior. He was the Research Director for Social Computing at the Qatar Computing Research Institute, and is a Professor at Saarland University. He serves as editor-in-chief for EPJ Data Science. Previously, he served as editor-in-chief for the International Conference on Web and Social Media. Weber is also an ACM Distinguished Member, as well as an ACM Distinguished Speaker. Weber's research has been widely covered in the media.

<span class="mw-page-title-main">Moustafa Youssef</span> Egyptian computer scientist

Moustafa Youssef is an Egyptian computer scientist who was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2019 for contributions to wireless location tracking technologies and a Fellow of the Association for Computing Machinery (ACM) in 2019 for contributions to location tracking algorithms. He is the first and only ACM Fellow in the Middle East and Africa.

References

  1. "Bloggers back media against youth league". Archived from the original on July 18, 2011. Retrieved April 3, 2010.
  2. Vicky Woollaston. "Justin Bieber fans beat Twitter 'block' | Web User magazine". Webuser.co.uk. Archived from the original on November 22, 2012. Retrieved January 20, 2012.
  3. Wang, Zheye; Ye, Xinyue; Tsou, Ming-Hsiang (August 1, 2016). "Spatial, temporal, and content analysis of Twitter for wildfire hazards". Natural Hazards. 83 (1): 523–540. doi:10.1007/s11069-016-2329-6. ISSN   1573-0840. S2CID   130442050.
  4. Sakaki, Takeshi; Okazaki, Makoto; Matsuo, Yutaka (2010). "Earthquake shakes Twitter users". Proceedings of the 19th international conference on World wide web. WWW '10. New York, NY, US: ACM. pp. 851–860. doi:10.1145/1772690.1772777. ISBN   9781605587998. S2CID   15953846.
  5. Nichols, Jeffrey; Mahmud, Jalal; Drews, Clemens (2012). "Summarizing sporting events using twitter". Proceedings of the 2012 ACM international conference on Intelligent User Interfaces. IUI '12. New York, NY, US: ACM. pp. 189–198. doi:10.1145/2166966.2166999. ISBN   9781450310482. S2CID   15696890.
  6. Burns, Alex; Eltham, Ben (November 24, 2009). "Twitter Free Iran: an Evaluation of Twitter's Role in Public Diplomacy and Information Operations in Iran's 2009 Election Crisis" (PDF). University of Technology, Sydney: 322–334.{{cite journal}}: Cite journal requires |journal= (help)
  7. Choudhary, Alok; Hendrix, William; Lee, Kathy; Palsetia, Diana; Liao, Wei-Keng (May 1, 2012). "Social media evolution of the Egyptian revolution". Communications of the ACM. 55 (5): 74. doi:10.1145/2160718.2160736. S2CID   41959904.
  8. Weiner, David (June 21, 2009). "#Thatsafrican – When Twitter Went Racist?". Huffington Post. Retrieved April 3, 2010.
  9. "Thingsdarkiessay causes a Twitter storm". Independent Online . South Africa. November 5, 2009. Retrieved January 11, 2012.
  10. Gupta, Kanchan (August 13, 2013). "Role of Twitter in trending wars". NITI Central. Archived from the original on August 16, 2013. Retrieved August 14, 2013.
  11. Elmas, Tuğrulcan; Overdorf, Rebekah; Özkalay, Ahmed Furkan; Aberer, Karl (2021). "Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends". 6th IEEE European Symposium on Security and Privacy. Virtual: IEEE. arXiv: 1910.07783 .