A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Ideological Manipulation in Twitter Communication: A Critical Stylistic Analysis of Donald Trump's Tweets
2022
International Journal of Arabic-English Studies
the resources of language are strategically deployed to influence and ideologically manipulate Trump's followers' experience of reality. ...
Donald Trump's use of Twitter as a modality to defame opponents, antagonize media outlets and even glorify violence is an enduring legacy for political campaigns, presidential rhetoric and argumentative ...
Gibreel Sadeq Alaghbary Department of English, College of Sciences and Arts, Unaizah, Qassim University, Saudi Arabia Taiz University, Yemen ORCID Number: 0000-0002-8531-2913 Email: g.alaghbary@qu.edu.sa ...
doi:10.33806/ijaes2000.22.1.16
fatcat:mxulcsywtza63lfrvcnl4x6ysu
1 The politics of social media manipulation
[chapter]
2020
The Politics of Social Media Manipulation
It discusses how the term has been deployed politically as a barb against the free press when publishing inconvenient truths since the mid-nineteenth century. ...
the question of persuasion. ...
In 2018 the first large-scale global study of computational propaganda was published, examining organized social media manipulation such as the use of fake followers in 48 countries, including the Netherlands ...
doi:10.1515/9789048551675-002
fatcat:zdynhsmrwvbpjn4d4hi56hn3ly
Detecting Pump Dump Stock Market Manipulation from Online Forums
[article]
2023
arXiv
pre-print
We collect a dataset of stocks whose price and volume profiles have the characteristic shape of a pump&dump, and social media posts for those same stocks that match the timing of the initial price rises ...
The intersection of social media, low-cost trading platforms, and naive investors has created an ideal situation for information-based market manipulations, especially pump&dumps. ...
[23] looked specifically at forecasting P&Ds by combining the information from Twitter and Telegram. ...
arXiv:2301.11403v1
fatcat:o5r25apehnh2vdwcqbuwxqpx44
Challenges and Opportunities in Information Manipulation Detection: An Examination of Wartime Russian Media
[article]
2022
arXiv
pre-print
We release a new dataset, VoynaSlov, containing 38M+ posts from Russian media outlets on Twitter and VKontakte, as well as public activity and responses, immediately preceding and during the 2022 Russia-Ukraine ...
Our examination of these media effects and extensive discussion of current approaches' limitations encourage further development of NLP models for understanding information manipulation in emerging crises ...
thereof. 21 We acknowledge that there is a discrepancy in amount of available information between our models and the human annotator. ...
arXiv:2205.12382v2
fatcat:gl4cmjl6fndtfovaf5zafvstzu
Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations
[article]
2020
arXiv
pre-print
Lastly, we introduce an approach to detect the fraud in real time that outperforms the current state of the art, so to help investors stay out of the market when a pump and dump scheme is in action. ...
However, many cryptocurrencies have low liquidity and therefore they are highly prone to market manipulation schemes. ...
The security was the RCA Corporation, the manufacturer of the first all electric phonograph. At that time, one of the hottest pieces of technology. ...
arXiv:2005.06610v1
fatcat:vqa5hzy2cvhoxam5tsf5nz6llq
IDENTITY RESHAPING AND MANIPULATION IN CYBERSPACE
2020
Anthropological Researches and Studies
Becoming a part of the virtual reality, sets the stage for the opportunity of others who are more or less familiar to us in the real world. Material and methods. ...
These features are to be taken into consideration before and after carrying out a research of the online activity. Conclusions. ...
Behavioural observations inside a metaverse are even more difficult to grasp in terms of validity. ...
doi:10.26758/10.1.18
fatcat:zbb5my45xvdghpgozv6ms2za7u
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations
2022
ACM Transactions on Internet Technology
Then, we move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflates the price of the GameStop stocks (GME) by over 1,900% on Wall Street ...
We leverage our unique dataset of the verified pump and dumps to build a machine learning model able to detect a pump and dump in 25 seconds from the moment it starts, achieving the results of 94.5% of ...
ACKNOWLEDGMENTS This work was supported in part by the MIUR under grant łDipartimenti di eccellenza 2018-2022" of the Department of Computer Science of Sapienza University. ...
doi:10.1145/3561300
fatcat:jf7tzihgdzc4hpzp2iex7nqxr4
A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment
2019
Robotics
Examples of adversarial activities on Twitter that were discovered after observing Arabic trending hashtags are discussed in detail. ...
Thus, this paper surveys the attacks against Twitter spam detectors in an adversarial environment, and a general taxonomy of potential adversarial attacks is presented using common frameworks from the ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/robotics8030050
fatcat:weuiiwblrbfbvg26ycwbyxpk4i
Digital Disinformation & Domestic Disturbance: Hostile Cyber-Enabled Information Operations to Exploit Domestic Issues on Twitter
2021
IPRI Journal
in the context of the growing role of social media in modern warfare. ...
It also tries to address the role of belligerent state actors in shaping the psychological makeup of democratic population. ...
This research provides analysis into the worldwide influence operations and their role in international politics. It also provides ...
doi:10.31945/iprij.210204
fatcat:7w4tcrbl3za37da35mnfzu3coa
Web 2.0 user knowledge and the limits of individual and collective power
2016
First Monday
“Data reveals that ‘occupying’ Twitter trending topics is harder than it looks!” ...
accusing Twitter of censorship because of a misunderstanding about “Trending Topics.” ...
doi:10.5210/fm.v21i6.6793
fatcat:h6j4qseka5f2pefvh7g2gncpl4
Understanding the Twitter User Networks of Viruses and Ransomware Attacks
2018
Italian Conference on Cybersecurity
Investigating the quality of the information on Twitter about malware we saw a great quality and the possibility to use this information as automatic classification of new attacks. * Corresponding author ...
A detailed analysis on the data allowed us to better understand the role of the major technical web sites in diffusing the news of each new epidemic, while a study of the social media response reveal how ...
RDN acknowledges the support of the FilieraSicura project. ...
dblp:conf/itasec/PuligaCCN18
fatcat:bpxzen5h7jfnzgkvr34zleogdy
Program Committee
2006
2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation
Including the papers on embeddings, there were 15 rejections: the acceptance rate for full papers was 58% a sign of the consistently high quality of papers submitted to the conference. ...
of Hamburg) and Using a Grammar Implementation to Teach Writing Skills by Dan Flickinger (Stanford). ...
Acknowledgments We wish to thank Georgia Sanna for the first joint analysis about the possibility of creating a wordnet for the Sardinian language. ...
doi:10.1109/scam.2006.23
dblp:conf/scam/X06c
fatcat:2dhsf7loj5hlffu2jxpmlo2qcq
Don't Trust Your Eyes: Image Manipulation in the Age of DeepFakes
2021
Frontiers in Communication
We review the phenomenon of deepfakes, a novel technology enabling inexpensive manipulation of video material through the use of artificial intelligence, in the context of today's wider discussion on fake ...
We discuss the foundation as well as recent developments of the technology, as well as the differences from earlier manipulation techniques and investigate technical countermeasures. ...
Insider, 2017). ...
doi:10.3389/fcomm.2021.632317
fatcat:urdc563kenh2pmrsk6doxwwfs4
Lively for Qt
2009
Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility '09
In this paper we introduce Lively for Qt -a practical JavaScript application platform that supports the development of highly interactive mobile web applications and mashups that run both in the web browser ...
At the same time, the JavaScript language has become the de facto programming language of the Web. ...
The first timer called changeTagsTimer handles the downloading of image tags from Twitter using Qt's QNetworkAccessManager class. ...
doi:10.1145/1710035.1710059
dblp:conf/mobility/MikkonenTT09
fatcat:cow4h2w4grc27fhokehcxnnbfi
R̶e̶s̶i̶s̶t̶a̶n̶c̶e̶ censorship is futile
2014
First Monday
“Internet censorship in Iran: A first look,” paper presented at the Third USENIX Workshop on Free and Open Communications on the Internet, at https://www.usenix.org/conference/foci13/internet-censorship-iran-first-look ...
To this end, we use data from Google Trends as a metric to gauge the popularity of restricted content. We first examine data from Pakistan followed by Turkey. ...
doi:10.5210/fm.v19i11.5525
fatcat:bpjrk3nurfaibd3msbja276zpm
« Previous
Showing results 1 — 15 out of 6,611 results