Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6,611 Hits in 8.6 sec

Ideological Manipulation in Twitter Communication: A Critical Stylistic Analysis of Donald Trump's Tweets

2022 International Journal of Arabic-English Studies  
the resources of language are strategically deployed to influence and ideologically manipulate Trump's followers' experience of reality.  ...  Donald Trump's use of Twitter as a modality to defame opponents, antagonize media outlets and even glorify violence is an enduring legacy for political campaigns, presidential rhetoric and argumentative  ...  Gibreel Sadeq Alaghbary Department of English, College of Sciences and Arts, Unaizah, Qassim University, Saudi Arabia Taiz University, Yemen ORCID Number: 0000-0002-8531-2913 Email: g.alaghbary@qu.edu.sa  ... 
doi:10.33806/ijaes2000.22.1.16 fatcat:mxulcsywtza63lfrvcnl4x6ysu

1 The politics of social media manipulation [chapter]

Richard Rogers, Sabine Niederer
2020 The Politics of Social Media Manipulation  
It discusses how the term has been deployed politically as a barb against the free press when publishing inconvenient truths since the mid-nineteenth century.  ...  the question of persuasion.  ...  In 2018 the first large-scale global study of computational propaganda was published, examining organized social media manipulation such as the use of fake followers in 48 countries, including the Netherlands  ... 
doi:10.1515/9789048551675-002 fatcat:zdynhsmrwvbpjn4d4hi56hn3ly

Detecting Pump Dump Stock Market Manipulation from Online Forums [article]

D. Nam, D.B. Skillicorn
2023 arXiv   pre-print
We collect a dataset of stocks whose price and volume profiles have the characteristic shape of a pump&dump, and social media posts for those same stocks that match the timing of the initial price rises  ...  The intersection of social media, low-cost trading platforms, and naive investors has created an ideal situation for information-based market manipulations, especially pump&dumps.  ...  [23] looked specifically at forecasting P&Ds by combining the information from Twitter and Telegram.  ... 
arXiv:2301.11403v1 fatcat:o5r25apehnh2vdwcqbuwxqpx44

Challenges and Opportunities in Information Manipulation Detection: An Examination of Wartime Russian Media [article]

Chan Young Park, Julia Mendelsohn, Anjalie Field, Yulia Tsvetkov
2022 arXiv   pre-print
We release a new dataset, VoynaSlov, containing 38M+ posts from Russian media outlets on Twitter and VKontakte, as well as public activity and responses, immediately preceding and during the 2022 Russia-Ukraine  ...  Our examination of these media effects and extensive discussion of current approaches' limitations encourage further development of NLP models for understanding information manipulation in emerging crises  ...  thereof. 21 We acknowledge that there is a discrepancy in amount of available information between our models and the human annotator.  ... 
arXiv:2205.12382v2 fatcat:gl4cmjl6fndtfovaf5zafvstzu

Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations [article]

Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa
2020 arXiv   pre-print
Lastly, we introduce an approach to detect the fraud in real time that outperforms the current state of the art, so to help investors stay out of the market when a pump and dump scheme is in action.  ...  However, many cryptocurrencies have low liquidity and therefore they are highly prone to market manipulation schemes.  ...  The security was the RCA Corporation, the manufacturer of the first all electric phonograph. At that time, one of the hottest pieces of technology.  ... 
arXiv:2005.06610v1 fatcat:vqa5hzy2cvhoxam5tsf5nz6llq

IDENTITY RESHAPING AND MANIPULATION IN CYBERSPACE

Gabriel STOICIU, Francisc Rainer Institute of Anthropology Romanian Academy
2020 Anthropological Researches and Studies  
Becoming a part of the virtual reality, sets the stage for the opportunity of others who are more or less familiar to us in the real world. Material and methods.  ...  These features are to be taken into consideration before and after carrying out a research of the online activity. Conclusions.  ...  Behavioural observations inside a metaverse are even more difficult to grasp in terms of validity.  ... 
doi:10.26758/10.1.18 fatcat:zbb5my45xvdghpgozv6ms2za7u

The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations

Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa
2022 ACM Transactions on Internet Technology  
Then, we move on to the crowd pump, a new phenomenon that hit the news in the first months of 2021, when a Reddit community inflates the price of the GameStop stocks (GME) by over 1,900% on Wall Street  ...  We leverage our unique dataset of the verified pump and dumps to build a machine learning model able to detect a pump and dump in 25 seconds from the moment it starts, achieving the results of 94.5% of  ...  ACKNOWLEDGMENTS This work was supported in part by the MIUR under grant łDipartimenti di eccellenza 2018-2022" of the Department of Computer Science of Sapienza University.  ... 
doi:10.1145/3561300 fatcat:jf7tzihgdzc4hpzp2iex7nqxr4

A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment

Niddal H. Imam, Vassilios G. Vassilakis
2019 Robotics  
Examples of adversarial activities on Twitter that were discovered after observing Arabic trending hashtags are discussed in detail.  ...  Thus, this paper surveys the attacks against Twitter spam detectors in an adversarial environment, and a general taxonomy of potential adversarial attacks is presented using common frameworks from the  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/robotics8030050 fatcat:weuiiwblrbfbvg26ycwbyxpk4i

Digital Disinformation & Domestic Disturbance: Hostile Cyber-Enabled Information Operations to Exploit Domestic Issues on Twitter

Muhammad Rehan Rasheed, Moazzam Naseer
2021 IPRI Journal  
in the context of the growing role of social media in modern warfare.  ...  It also tries to address the role of belligerent state actors in shaping the psychological makeup of democratic population.  ...  This research provides analysis into the worldwide influence operations and their role in international politics. It also provides  ... 
doi:10.31945/iprij.210204 fatcat:7w4tcrbl3za37da35mnfzu3coa

Web 2.0 user knowledge and the limits of individual and collective power

Nicholas Proferes
2016 First Monday  
“Data reveals that ‘occupying’ Twitter trending topics is harder than it looks!”  ...  accusing Twitter of censorship because of a misunderstanding about “Trending Topics.”  ... 
doi:10.5210/fm.v21i6.6793 fatcat:h6j4qseka5f2pefvh7g2gncpl4

Understanding the Twitter User Networks of Viruses and Ransomware Attacks

Michelangelo Puliga, Guido Caldarelli, Alessandro Chessa, Rocco De Nicola
2018 Italian Conference on Cybersecurity  
Investigating the quality of the information on Twitter about malware we saw a great quality and the possibility to use this information as automatic classification of new attacks. * Corresponding author  ...  A detailed analysis on the data allowed us to better understand the role of the major technical web sites in diffusing the news of each new epidemic, while a study of the social media response reveal how  ...  RDN acknowledges the support of the FilieraSicura project.  ... 
dblp:conf/itasec/PuligaCCN18 fatcat:bpxzen5h7jfnzgkvr34zleogdy

Program Committee

2006 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation  
Including the papers on embeddings, there were 15 rejections: the acceptance rate for full papers was 58% a sign of the consistently high quality of papers submitted to the conference.  ...  of Hamburg) and Using a Grammar Implementation to Teach Writing Skills by Dan Flickinger (Stanford).  ...  Acknowledgments We wish to thank Georgia Sanna for the first joint analysis about the possibility of creating a wordnet for the Sardinian language.  ... 
doi:10.1109/scam.2006.23 dblp:conf/scam/X06c fatcat:2dhsf7loj5hlffu2jxpmlo2qcq

Don't Trust Your Eyes: Image Manipulation in the Age of DeepFakes

Johannes Langguth, Konstantin Pogorelov, Stefan Brenner, Petra Filkuková, Daniel Thilo Schroeder
2021 Frontiers in Communication  
We review the phenomenon of deepfakes, a novel technology enabling inexpensive manipulation of video material through the use of artificial intelligence, in the context of today's wider discussion on fake  ...  We discuss the foundation as well as recent developments of the technology, as well as the differences from earlier manipulation techniques and investigate technical countermeasures.  ...  Insider, 2017).  ... 
doi:10.3389/fcomm.2021.632317 fatcat:urdc563kenh2pmrsk6doxwwfs4

Lively for Qt

Tommi Mikkonen, Antero Taivalsaari, Mikko Terho
2009 Proceedings of the 6th International Conference on Mobile Technology, Application & Systems - Mobility '09  
In this paper we introduce Lively for Qt -a practical JavaScript application platform that supports the development of highly interactive mobile web applications and mashups that run both in the web browser  ...  At the same time, the JavaScript language has become the de facto programming language of the Web.  ...  The first timer called changeTagsTimer handles the downloading of image tags from Twitter using Qt's QNetworkAccessManager class.  ... 
doi:10.1145/1710035.1710059 dblp:conf/mobility/MikkonenTT09 fatcat:cow4h2w4grc27fhokehcxnnbfi

R̶e̶s̶i̶s̶t̶a̶n̶c̶e̶ censorship is futile

Zubair Nabi
2014 First Monday  
“Internet censorship in Iran: A first look,” paper presented at the Third USENIX Workshop on Free and Open Communications on the Internet, at https://www.usenix.org/conference/foci13/internet-censorship-iran-first-look  ...  To this end, we use data from Google Trends as a metric to gauge the popularity of restricted content. We first examine data from Pakistan followed by Turkey.  ... 
doi:10.5210/fm.v19i11.5525 fatcat:bpjrk3nurfaibd3msbja276zpm
« Previous Showing results 1 — 15 out of 6,611 results