Twitter Bots 2015


Notes:

A socialbot is a type of bot that controls a social media account.

Resources:

Wikipedia:

References:

See also:

100 Best Bhagavad Gita Twitter Bots100 Best Earthquake Twitter Bots100 Best GitHub: Twitter-bot100 Best GitHub: Twitterbot100 Best GoogleCode: Twitter-bot100 Best Twitter Bot Videos100 Best Twitter BotsTwitter Bots 2013Twitter Bots 2014


Speculative method and Twitter: Bots, energy and three conceptual characters A Wilkie, M Michael… – The sociological …, 2015 – Wiley Online Library Abstract This paper aims to contribute to recent innovations in social scientific methodology that aspire to address the complex, iterative and performative dimensions of method. In particular, we focus on the becoming-with character of social events, and propose a … Cited by 19 Related articles All 5 versions

Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency Z Tufekci – J. on Telecomm. & High Tech. L., 2015 – HeinOnline … from libel to violence. What are the rules around automated code that posts to Twitter accounts (Twitter “bots”)? Can a Twitter bot make a death threat?” Can it buy illegal drugs or break the law? These questions have already … Cited by 13 Related articles All 4 versions

NEED4Tweet: a Twitterbot for tweets named entity extraction and disambiguation MB Habib, M van Keulen – 2015 – eprints.eemcs.utwente.nl Abstract In this demo paper, we present NEED4Tweet, a Twitterbot for named entity extraction (NEE) and disambiguation (NED) for Tweets. The straightforward application of state-of-the-art extraction and disambiguation approaches on informal text widely used in … Related articles All 10 versions

Twitter Bot Tutorial M Cook – Artificial and Computational Intelligence in Games: … – pdfs.semanticscholar.org In this session participants were invited to set up their workstations for the development of Twitter bots, small programs that run at regular intervals usually on external web servers. Bots normally produce some kind of content when they run, which they post to Twitter … All 8 versions

Love Notes and Intimate Circuits HJ Burgess – 2015 – hyperrhiz.io … Once you have your brand new twitterbot account, go to apps.twitter.com and click on “create new app.” The interface will look like … you; he provides very comprehensive instructions on his web page here (http://www.zachwhalen.net/posts/how-to-make-a-twitter-bot-with-google …

Digital Library Content in the Social Web: Resource Usage and Content Injection C Seifert, N Witt, S Bayerl, M Granitzer – IEEE STCN Newsletter, 2015 – stcsn.ieee.net … Table 2. Statistics for the two deployed Twitter bots. Complete statistics only available for RecoRobot2. Table 2 provides an overview of the statistics for the two deployed versions of the Twitter bot. … Also the TwitterBot was able to gather four followers in this period. … Cited by 1 Related articles

#geiger : Radiation Monitoring Twitter Bots for Nuclear Post-Accident Situations Antonin Segault I Roxin – iscram2015.uia.no Page 1. Segault et al. #geiger : Radiation Monitoring Twitter Bots for Nuclear Post-Accident Situations Short Paper – Social … Hughes, eds. #geiger : Radiation Monitoring Twitter Bots for Nuclear Post-Accident Situations Antonin … Related articles

The power of Twitter: Building an innovation radar using social media O Mohout, I Fiegenbaum – ISPIM Conference Proceedings, 2015 – search.proquest.com … For the purpose of reinforcing and measuring the stream of data from and about startups, for every country a Twitterbot is set-up. A Twitterbot … keywords). The Twitterbot is the innovation pulse of the local startup landscape. Interested … Related articles All 2 versions

TheRiddlerBot: A next step on the ladder towards creative Twitter bots Rafael Pérez y Pérez5 1Universidad Nacional Autónoma de México, DF, México 2CLiPS Research Center, University of Antwerp, Belgium 3Universitat Pompeu … I Guerrero, B Verhoeven… – Proceedings of the …, 2015 – computationalcreativity.net … We describe different Twitter bots as examples of the state of the art. … We present an implementation of our model in a Twitter bot named ‘TheRiddlerBot’. … A brief history of the future of twitterbots. Presented at the PROSECCO Code Camp on Computational Creativity. … Related articles All 9 versions

Make something that makes something: A report on the first procedural generation jam M Cook – International Conference on Computational Creativity, 2015 – axon.cs.byu.edu … also been mirrored by a surge in the aes- thetic of generative software in art, web culture (such as Twitterbots) and other … of game jams are extremely valuable, and make the game jam format ideal for engaging communities of programmers such as Twitterbot writers, programmer … Cited by 4 Related articles All 4 versions

Twitter: The best of bot worlds for automated wit T Veale, A Valitutti, G Li – International Conference on Distributed, Ambient …, 2015 – Springer … More and more, however, the texts that are so anointed by successive re-tweeting are not the texts of human writers but of artificial content-producers called Twitterbots. A Twitterbot is an autonomous software system (a bot) that generates and tweets messages of its own design … Cited by 5 Related articles All 6 versions

Automated credibility assessment on twitter K Lorek, J Suehiro-Wici?ski… – Computer …, 2015 – journals.bg.agh.edu.pl … As an addition, we propose practical implementation of TwitterBOT, a tool which is able to score submitted tweets while working in the native Twitter interface. Keywords Twitter, credibility, Machine Learning Algorithms … Figure 1. Example of TwitterBOT communication interface. … Related articles All 4 versions

Twitter and Public Scholarship A Johnson – Anthropology Now, 2015 – Taylor & Francis … And even though you don’t know much about programming, you’ve heard you can stick a Twitter bot together with messy code and … code together—some- thing that your friend wrote for another project, something that a stranger included in a blog post about building Twitter bots. … Related articles All 2 versions

Finding the hidden hands: a case study of detecting organized posters and promoters in SINA weibo W Xiang, Z Zhilin, Y Xiang, J Yan, Z Bin… – China …, 2015 – ieeexplore.ieee.org … They are different from Twitter bot [2] which is a program used to produce automated posts or to automatically follow Twitter users. As they can also be human beings which are more covert and complex than Twitter bot. Third, organized posters are more covert than spammers. … Cited by 1 Related articles All 4 versions

Tracery: An Author-Focused Generative Text Tool K Compton, B Kybartas, M Mateas – International Conference on …, 2015 – Springer … Copyright information. Abstract. New communities of generative text practitioners are flourishing in novel expressive mediums like Twitterbots and Twine as well as the existing practices of Interactive Fiction. … 4), serving Tracery server-side to run Twitterbots. … Cited by 1 Related articles

Detecting Internet Hidden Paid Posters Based on Group and Individual Characteristics X Wang, B Zhou, Y Jia, S Li – International Conference on Web Information …, 2015 – Springer … They are different from Twitter bot [9] which is a program used to produce automated posts or to automatically follow Twitter users. As they can also be human beings which are more covert and complex than Twitter bot. Fourth, paid posters are more covert than spammers. … Related articles

Analysis of Blogs, Forums, and Social Networks TV Ignatova, VA Ivichev… – Problems of Economic …, 2015 – Taylor & Francis … of user activity. The main distinction between a botnet and other computer programs in social media (eg, Twitter bots that post weather forecasts) is the fact that it is capable of impersonating a human being. For example, the … Related articles

Time maps: A tool for visualizing many discrete events across multiple timescales MC Watson – Big Data (Big Data), 2015 IEEE International …, 2015 – ieeexplore.ieee.org … C. Twitterbot The final, richest example is the Twitterbot @oliviataters. Twitterbots are programs that can tweet, follow users, and perform all of the same tasks available to humans on Twitter. @oliviataters not only writes unprovoked, “normal” tweets. … Cited by 1 Related articles All 2 versions

More Library Mashups: Exploring New Ways to Deliver Library Data K Hill – Australian Academic & Research Libraries, 2015 – Taylor & Francis … This includes searching library databases to research questions using Twitterbot, presenting library information from the catalog on a map, and using Wikipedia to search for library books, finding top stories and delivering them with the library holdings information. …

Game of Tropes: Exploring the Placebo Effect in Computational Creativity T Veale – Proceedings of the Sixth International Conference on …, 2015 – axon.cs.byu.edu … This paper evaluates one such system, a Twitterbot named @MetaphorMagnet that packages its own metaphors and ironic observations as pithy tweets. Moreover, we use @MetaphorMagnet, and the idea of Twitterbots more generally, to explore the relationship of linguistic … Cited by 4 Related articles All 6 versions

Unnatural Selection: Seeing Human Intelligence in Artificial Creations T Veale – Journal of Artificial General Intelligence, 2015 – degruyter.com … After conducting a survey of first-generation bots in section 2, and a review of computational approaches to metaphor in section 3, we introduce our metaphor- generating Twitterbot, @MetaphorMagnet, in section 4. We consider what Twitterbots of the first and next generations … Cited by 1 Related articles All 4 versions

Behind the mask: machine morality K Miller, MJ Wolf, F Grodzinsky – Journal of Experimental & …, 2015 – Taylor & Francis … Note that in each of these cases, it is the deployment action that is called in to question; it is not the act of developing such a robot. The Twitter bot developed by Nanis et al. … As a trivial example, consider a Twitter user following the Twitter bot described in Section 5.1. … Cited by 5 Related articles All 6 versions

Unweaving The Lexical Rainbow: Grounding Linguistic Creativity in Perceptual Semantics T Veale, K Alnajjar – … of the Sixth International Conference on …, 2015 – axon.cs.byu.edu … A Twitterbot named @HueHueBot has been constructed (by the second author) to showcase the perceptually- anchored creativity of this readymade-based … But this inventory of colour stereotypes and their RGB codes can be reused by other Twitterbots that exhibit their own … Cited by 2 Related articles All 6 versions

Artificial and Computational Intelligence in Games: Integration (Dagstuhl Seminar 15051) SM Lucas, M Mateas, M Preuss, P Spronck… – Dagstuhl …, 2015 – drops.dagstuhl.de … The 11 abstracts on practical sessions cover the Planet Wars competition; the automatic generation of games, mazes, and text; Twitter bots; sonification of character reasoning; MCTS and representation learning for procedural content … 232 Twitter Bot Tutorial Michael Cook … Cited by 1 All 9 versions

Unfair and Deceptive Robots W Hartzog – Maryland Law Review, 2015 – papers.ssrn.com … 35. See Lee Mathews, Police Respond to Twitter Bot Sending Death Threat to Another Twitter Bot, GEEK (Feb. 11, 2015), http://www.geek.com/apps/police-respond-to-twitter- bot- sending-death-threat-to-another-twitter-bot-1615550/. Page 12. … Cited by 11 Related articles All 6 versions

APIs and Researchers: The Emperor’s New Clothes? J Edmond, V Garnett – International Journal of Digital Curation, 2015 – ijdc.net … These apps can be used for academic purposes (for example the Library Observatory7 app from Harvard) or simply to amuse (such as the ‘Historical Cats’ Twitterbot8). The British Library (McGregor, 2013) has taken a different route to opening up its data for reuse. … Cited by 2 Related articles All 5 versions

Making the most of tweet-inherent features for social spam detection on Twitter B Wang, A Zubiaga, M Liakata, R Procter – arXiv preprint arXiv:1503.07405, 2015 – arxiv.org … 1https://support.twitter.com/articles/18311-the-twitter- rules 2http://www.newyorker.com/tech/ elements/the-rise-of- twitter-bots arXiv:1503.07405v1 [cs.IR] 25 Mar 2015 Page 2. … [5] used tweet-level sentiment as part of their feature set for the purpose of de- tecting Twitter bots. … Cited by 5 Related articles All 11 versions

Inducing an ironic effect in automated tweets A Valitutti, T Veale – Affective Computing and Intelligent …, 2015 – ieeexplore.ieee.org … of irony. Keywords—automated irony; valence shifting; twitterbot I. INTRODUCTION Verbal irony is a powerful communicative device. It can be used to express sentiments and opinions in a surprising and subtle way. When a … Cited by 1 Related articles All 6 versions

The EMSC tools used to detect and diagnose the impact of global earthquakes from direct and indirect eyewitnesses’ contributions R Bossu, G Mazet-Roux, F Roussel… – … Systems for Crisis …, 2015 – researchgate.net … We will illustrate these points by summarizing the main functions and performances of LastQuake which is the name of our smartphone application, a Twitterbot -in this case, it is also called a QuakeBot, ie a program that produces automatic tweets on earthquakes- and web … Cited by 1 Related articles All 3 versions

Visual Arts Creation Assisted by BICASSO: Brain-Inspired Computationally Aesthetic Selective Savant & Observer F Lemarchand – isea2015.org … than in an open problem. For example, twitterbots which generate random sentences or images, are only appreciated by their audience when some context is added by media or history. Talking about contexts, a fundamental … Related articles

Vitriolic voices: political candidates and the incivility gender gap online AM Cardona – 2015 – utexas-ir.tdl.org … incivility is now commonplace, and can often be emotional taxing and democratically harmful (Megarry, 2014; Mutz & Reeves, 2005). Even a Twitterbot named @AvoidComments was created to remind followers not to read the comments. Such a bot … Related articles All 3 versions

Collaborative Composition with Creative Systems: Reflections on the First Musebot Ensemble A Eigenfeldt, O Bown, B Carey – Proceedings of the Sixth …, 2015 – researchgate.net … framework for further software development. Charnley et al. (2014), for example, has proposed a cloud-based col- laborative creativity tool, supported by a web interface, that allows the rapid creation of text-based, domain specif- ic, creative agents such as Twitter bots. … Cited by 9 Related articles All 5 versions

Russia’s Hybrid Warfare K Giles – researchgate.net … Seite 3/5 for organisation. A large array of pre-positioned Twitterbots, and sporadic but highly targeted DDoS at- tacks, were combined with old-fashioned dirty tricks against opposition leadership figures to attempt to defuse and discredit the protest movement. … Cited by 2

Bots or journalists? News sharing on Twitter AO Larsson, M Hallvard – 2015 – degruyter.com … On services like Twitter, bots can be utilized to boost statistics regarding the number of followers of a specific user (Messias, Schmidt, Oliveira and Benevenuto 2013) – practices that have been discussed in branches of society like the entertainment industry or in politics (eg, Null … Cited by 6 Related articles All 7 versions

Fighting Words and Antagonistic Worlds T Veale – NAACL HLT 2015, 2015 – anthology.aclweb.org … as Twitter. This point is worth stressing, as the above tweets were generated by an automated Twitterbot, named@ MetaphorMagnet, whose an- tagonism-stoking generative processes are the sub- ject of this paper. If metaphor … Cited by 1 Related articles All 14 versions

Presentation at the United Nations Convention on Certain Conventional Weapons P Scharre – Lecture, The Convention on Certain Conventional …, 2015 – unog.ch Page 1. 1 Presentation at the United Nations Convention on Certain Conventional Weapons Paul Scharre April 13, 2015 Autonomy is playing a bigger role in many industries and aspects of our lives, from self-driving cars to autonomous Twitter bots. … Cited by 2 Related articles All 3 versions

Dialog act annotation for Twitter conversations E Zarisheva, T Scheffler – Proceedings of the 16th Annual Meeting of the …, 2015 – aclweb.org … In addition, dialog act annotations are useful for further research on Twitter dialogs, as well as for applications dealing with this kind of data, eg, automatic analyses of conversations on different types of topics, or simulated conversation partic- ipants (Twitter bots). … Cited by 1 Related articles All 9 versions

Security analysis of malicious socialbots on the web Y Boshmaf – 2015 – open.library.ubc.ca Learning, knowledge, research, insight: welcome to the world of UBC Library, the second-largest academic research library in Canada. Cited by 2 Related articles All 5 versions

Covert Botnet Command and Control Using Twitter N Pantic, MI Husain – Proceedings of the 31st Annual Computer Security …, 2015 – dl.acm.org … Twitter bots are not a new phenomenon, and in fact several bots were created that successfully convinced other users that they were real people [2]. Additionally, chat bots exist, such as Cleverbot4 which are reason- ably successful [3]. However, aside from competent English … Related articles

Moving beyond counts: A method for surveying Twitter users JP Alperin – 2015 – altmetrics.org … were extracted from data provided by Altmetric.com. Second, a Twitter bot, a program to automatically post and interact with Twitter, must be set up to conduct the actual survey. A short research question (within Twitter’s 140 … Cited by 1 Related articles All 2 versions

Categorizing and Discovering Social Bots MC Karlsrud – 2015 – repository.asu.edu

Who Regulates the Robots M Kaminski – Jotwell: J. Things We Like, 2015 – HeinOnline … this. From the robot vacuum that ate its owner’s hair, to flirtatious Twitter bots, to a dying Roomba pleading for a software upgrade, to the “Internet of Things Inside Our Body,” Hartzog’s examples are visceral and compelling. The … Related articles

Algorithmic Trading of Cryptocurrency Based on Twitter Sentiment Analysis S Colianni, S Rosales, M Signorotti – cs229.stanford.edu … The first step is to remove all non-alphabetic characters. The second step is to remove duplicates. The reason for doing this is because of the prevalence of Twitter bots, many of which instantaneously disseminate tweets containing particular keywords. … Related articles All 2 versions

[BOOK] Backbone.js Essentials J Walker – 2015 – books.google.com … js since npm. You can follow his Grunt npm-twitter-bot feed at @gruntweekly. Page 8. Jeff Smith is a web developer with about three and a half years of focusing on AngularJS, Backbone, Ember, and Node.js. He has served … All 2 versions

News Bots: Automating news and information dissemination on Twitter T Lokot, N Diakopoulos – Digital Journalism, 2015 – Taylor & Francis … We collected our initial purposive sample of accounts using search engine results from Google for searches of “bot,” “twitter bot,” “news bot,” “automated twitter account,” such as articles and blog posts about Twitter bots, as well as the accounts themselves found directly through … Cited by 5 Related articles All 6 versions

Data and discrimination: Collected essays EBYSP GANGADHARAN, V Eubanks… – New America …, 2015 – rws511.pbworks.com Page 1. OPEN TECHNOLOGY INSTITUTE | NEW AMERICA | @NEWAMERICA DATA AND DISCRIMINATION: COLLECTED ESSAYS NEW AMERICA OPEN TECHNOLOGY INSTITUTE EDITED BY SEETA PEÑA GANGADHARAN … Cited by 2 Related articles All 7 versions

Editorial: Computational Creativity, Concept Invention, and General Intelligence TR Besold, KU Kühnberger, T Veale – Journal of Artificial General …, 2015 – degruyter.com … Tony Veale assesses the role of creativity in generative systems, having a closer look at Twitterbots (ie, automatic text generators on the online social networking service Twitter) as point of intersection between human expectations and current technological feasibility regarding … Related articles All 3 versions

Teacherbot: interventions in automated teaching S Bayne – Teaching in Higher Education, 2015 – Taylor & Francis … We wanted to develop a Twitterbot which ‘coded in’ something of the teacher function to the MOOC, using it as a way of researching some creative and critical futures for a MOOC pedagogy in which the ‘teacher function’ might become less a question of living teacher presence … Cited by 8 Related articles All 4 versions

NRC: Infused Phrase Vectors for Named Entity Recognition in Twitter C Cherry, H Guo, C Dai – ACL-IJCNLP 2015, 2015 – anthology.aclweb.org … We do not believe so, for at least two reasons: time overlap and Twitter bots. … Twitter bots: bots are common in both dev 2015 and test, but much less prominent in train and dev, perhaps reflecting an overall change in twitter traf- fic between 2010 and 2015. … Related articles All 13 versions

Digital Counterinsurgency J Cohen – Foreign Aff., 2015 – HeinOnline … its message. On Twitter, for example, so-called Twitter bots automatically flood the digital space with retweets of terrorist messages; countless online tutorials explain how to write these relatively simple pro- grams. In comment … Cited by 4 Related articles All 5 versions

Bot Spammer Detection In Twitter Using Tweet Similarity And Time Interval Entropy RS Perdana, TH Muliawati… – Jurnal Ilmu Komputer dan …, 2015 – jiki.cs.ui.ac.id … by bot. Therefore bot spammer detection can reduce the number of spam messages in Twitter significantly. However, to the best of our knowledge, few researches have focused in detecting Twitter bot spammer. Thus, this paper … Related articles

Design and implementation of a projection seeking robot MR Stewart – 2015 – dspace.mit.edu Page 1. Design and Implementation of a Projection Seeking Robot by Morgan R. Stewart Submitted to the Department of Mechanical Engineering in Partial Fulfillment of the Requirements for the Degree of ARCHIVES MASSACHU.ETTS INSTITUTE OF rECHNOLOLGY …

On-the-fly spam-detection on Twitter M Sen – 2015 – mourjo.me Page 1. On-the-fly spam-detection on Twitter Mourjo Sen sen.mourjo [at] gmail.com Under the guidance of Arnaud Legout, Maksym Gabielkov 1arnaud.legout, maksym.gabielkovl [at] inria.fr Master Thesis Ubinet Master of Computer Science Department of Computer Science … Related articles

Master Slave Autonomous Surveillance Bot For Military Applications RK MP, NN Bhonsle, NR Hugar – esatjournals.net … functioning of the bot. 4.2 Social Network Social Networking site, Twitter provides an API to make Twitter-bots, which would enable the master bot to tweet updates or the data it receives from the slave bot. Tweepy is the library … Related articles All 2 versions

Reverse engineering socialbot infiltration strategies in twitter C Freitas, F Benevenuto, S Ghosh… – Proceedings of the 2015 …, 2015 – dl.acm.org … A. Creation of socialbots We created a set of 120 socialbot accounts on Twitter. The so- cialbots were implemented based on the open-source Realboy project which is an experimental effort to create ‘believable’ Twitter bots [15]. … Cited by 18 Related articles All 13 versions

Catching Earworms on Twitter LA Liikkanen, K Jakubowski… – Music Perception: An …, 2015 – mp.ucpress.edu … The registered username implies that the name belongs to a unique individual, however this is not necessarily the case, as one person or an organization may administer several user accounts, or artificial intel- ligence known as Twitter bots may generate tweets. … Cited by 2 Related articles All 3 versions

The Perfect Face T Sherratt – discontents, 2015 – discontents.com.au … While services like Face++ have APIs that take your face and pull it apart, mine just gives you random faces from the past. That’s all. Most recently, I used my collection of faces to create a Twitter bot called the Vintage Face Depot. …

[BOOK] Future Casting Influence Capability in Online Social Networks M Duncan – 2015 – cradpdf.drdc-rddc.gc.ca Page 1. Future Casting Influence Capability in Online Social Networks Fake Accounts and the Evolution of the Shadow Economy Matthew Duncan DRDC Toronto Research Centre Defence Research and Development Canada Scientific Report DRDC-RDDC-2015-R148 … Related articles

Rationalizing sociality: an unfinished script for socialbots M Bakardjieva – The Information Society, 2015 – Taylor & Francis … What makes a socialbot different from self-declared bots (eg, Twitter bots that post up-to-date weather forecasts) and spambots is … http://dx.doi.org/10.1145/2090150.2090161 [CrossRef] View all references their approach in creating an effective Twitter bot that has managed to … Cited by 2 Related articles All 4 versions

Designing Networked Publics for Communicative Action S Benthall – Interface, 2015 – commons.pacificu.edu … [4] for networked publics. [5] For the sake of concreteness, I present @TheTweetserve, an open source Twitter bot I built based on these principles. … algorithmic structures of networked publics for political purposes. As a demonstration of this, I have developed a Twitter bot, @ … Related articles All 2 versions

The Opportunity and Challenge of Autonomous Systems PD Scharre – Issues for Defence Policymakers – academia.edu … artificial intelligences.(2)’Learning’ thermostats monitor your behaviour and adjust household temperature accord- ingly.(3) And an estimated 61% of internet traffic is generated by automated and intelligent software called ‘bots’, from so-called Twitter bots that impersonate 1 … Related articles All 3 versions

Ngram Frequencies for Dutch Twitter Data G Bouma – clinjournal.org … some of these might be considered original (ie especially one word tweets like morgen (tomorrow) or slapen (sleep), the majority of these are to be considered as retweets (ie copies of a tweet that went viral, popular sayings, quotes from songs, messages from twitter bots, etc.). … Related articles All 4 versions

Twitter as a transport layer platform D Namiot – Artificial Intelligence and Natural Language and …, 2015 – ieeexplore.ieee.org … It lets you compose a tweet-length Wolfram Language program and tweet it to @WolframTaP account. Their Twitter bot will run your program in the Wolfram Cloud and tweet back the result. It is illustrated in Fig. 3.: Fig. 3. Tweet-a-Program and its response [18] … Cited by 3 Related articles All 6 versions

Building a social machine: Co-designing a TimeBank for inclusive research CJ Hooper, M Nind, S Parsons, A Power… – Proceedings of the ACM …, 2015 – dl.acm.org … of Social Machines are typically ones wherein people collaborate to produce content (ie Wikipedia and Galaxy Zoo), but Social Machines also include tools and counter-tools (ie spam networks and reCAPTCHA [1]) and subsets of social networks such as Twitter bots [33]. … Cited by 3 Related articles All 5 versions

[BOOK] Advances in Intelligent Data Analysis XIV: 14th International Symposium, IDA 2015, Saint Etienne. France, October 22-24, 2015. Proceedings E Fromont, T De Bie, M Van Leeuwen – 2015 – books.google.com … are deemed acceptable to humans. This talk presents and evaluates one such system, a Twitterbot named @MetaphorMagnet that generates, expresses and shares its own playful insights on Twitter. I shall show how @MetaphorMagnets … Related articles

Rsc: Mining and modeling temporal activity in social media A Ferraz Costa, Y Yamaguchi… – Proceedings of the 21th …, 2015 – dl.acm.org … However the plot is not used to automatically test whether users are bot or not. In [6] the authors use the entropy of the histogram of IAT as a feature to detect Twitter bots. Their method differs from ours because we show that it is possible to detect bots using only time- … Cited by 7 Related articles All 6 versions

A Manifesto, With Footnotes. A Review of Miguel Sicart’s “Play Matters” S Deterding – Game Studies, 2015 – gamestudies.org … To make computation truly “human”, we have to realize this potential for expressive appropriation (99), which entails creating computers that “play with us” (99) — with some reference to non-human actants and twitter bots for good measure. … Related articles

Operational and Technological Threats C Pownall – Managing Online Reputation, 2015 – Springer … tackle the pervasive negativity polluting social media feeds and comment threads across the internet” but it hadn’t banked on a blogger at Gawker, having observed a white racist tweet trans- formed into a cute image of a bee, developing @MeinKampf, a Twitter bot that tweeted …

Real-time top-r topic detection on twitter with topic hijack filtering K Hayashi, T Maehara, M Toyoda… – Proceedings of the 21th …, 2015 – dl.acm.org … An outsider is a user who massively posts messages that only relate to a specific theme. Because of the exclusive content, outsiders compose a narrow but peaky topic. Twitter-bots and tool-assisted users [10] are typical examples of outsiders. … Cited by 3 Related articles All 3 versions

Polarized frames on “climate change” and “global warming” across countries and states: evidence from twitter big data SM Jang, PS Hart – Global Environmental Change, 2015 – Elsevier … Topsy provides open access to the Twitter “firehose” of actual tweets and metadata associated with about 100 million active accounts. As our data were free from “spam” tweets (eg, Twitter bots), the searched data used for this study represent active accounts run by real people. … Cited by 22 Related articles All 6 versions

Review of Rob Kitchin’s The Data Revolution D Moats – TCS, 2015 – theoryculturesociety.org … First Monday, 18(10). Wilkie A, Michael M and Plummer-Fernandez M (2015) Speculative method and Twitter: Bots, energy and three conceptual characters. The Sociological Review 63 (1) 79-101. David Moats is an ESRC funded PhD candidate in Sociology at Goldsmiths. … Related articles All 2 versions

Co-evolutionary dynamics in social networks: A case study of Twitter D Antoniades, C Dovrolis – Computational …, 2015 – computationalsocialnetworks. … … suspended by Twitter. This practice has been used by Thomas et al. [33] as “ground truth” for the Twitter bot detection problem. Further, it has been reported that only few bots survive Twitter’s policies for more than a week [34]. In our … Cited by 13 Related articles All 19 versions

Teaching Coding in Journalism Schools: Considerations for a Secure Technological Infrastructure M Broussard – 2015 – cj2015.brown.columbia.edu … Based on conversations with peers teaching data journalism, the outer limit of journalism teaching right now includes teaching students to create Twitter bots, create data visualizations in D3, perform web scraping, develop simple Python scripts, and create small database … Related articles

Twitter-based Election Prediction in the Developing World N Dwi Prasetyo, C Hauff – Proceedings of the 26th ACM Conference on …, 2015 – dl.acm.org … instead of individual users. In contrast, Cook et al. [13] found the rise of Twitter bots [11], which we can consider spam in the election context, to be a significant issue in the 2013 Australian federal elections where many of a candidate’s followers were actually bots. Gaurav et al. … Related articles

Development of Tidy-up Promotion System by Anthropomorphication of Shared Space T Kitamura, T Jin, M Urayama, H Ishii… – … Conference on Human- …, 2015 – Springer … intelligence. J. Ambient Intell. Humanized Comput. 1(1), 43–56 (2010) 5. Rutkin, A.: Twitter bots grow up. New Scientist 223(2980), 20–21 (2014) 6. Dalal, N., Triggs, B.: Histograms of oriented gradients for human detection. In … Related articles

Microbloggers as sensors for public transport breakdowns M Congosto, D Fuentes-Lorenzo… – IEEE Internet …, 2015 – ieeexplore.ieee.org … hoarder tool (http://t-hoarder.com), our online platform that monitors tweets of social relevance. The Twitter bot @metroaverias serves as a means to periodically publish information about the service quality on the railway stations. … Cited by 2 Related articles All 3 versions

Proxy Users, Use By Proxy: Mapping Forms of Intermediary Interaction B Nansen, M Arnold, M Carter, R Wilken… – Proceedings of the …, 2015 – dl.acm.org … networks. Journalist and filmmaker Jon Ronson (2015), for example, wrote about a personal experience where a Twitterbot had been created in his name, and inhabiting his identity began to generate tweets on his behalf. He … Related articles

Documenting the Virtual “Caliphate” C Winter – Quilliam Foundation, 2015 – truevisiontv.com … pursuit. Page 15. 13 these tags in combination with a set of other ‘key’ hashtags to refine the search, as Islamic State supporters do, it is possible to circumnavigate the Twitter bots – computer programs set up to create automated … Cited by 22 Related articles All 5 versions

Using social media to measure foreign policy dynamics An empirical analysis of the Iranian–Israeli confrontation (2012–13) T Zeitzoff, J Kelly, G Lotan – Journal of Peace Research, 2015 – jpr.sagepub.com Advertisement. … Cited by 8 Related articles All 6 versions

Sentiment, emotion, purpose, and style in electoral tweets SM Mohammad, X Zhu, S Kiritchenko… – Information Processing & …, 2015 – Elsevier … voter polarization (Conover et al., 2011). • Impact of fake tweets: Often during elections there is an increase of artificially generated tweets from twitterbots, botnets, and sock-puppets. Understanding the impact of these tweets … Cited by 23 Related articles All 9 versions

The future of jihad T Feakin, B Wilkinson – What next for ISIL and al-Qaeda, 2015 – aspi.org.au … The group also uses ‘twitter bots’ that repeatedly post the same content several times a day along with popular hashtags such as #worldcup2014 to ensure that references to ISIL trend highly, ensuring that its messages—designed to both intimidate and inspire—reach the … Cited by 1 Related articles All 4 versions

Agency Publicity in the Internet Era N Cortez – Available at SSRN 2841285, 2015 – papers.ssrn.com Page 1. Agency Publicity in the Internet Era Administrative Conference of the United States (ACUS) REPORT This report was prepared for the consideration of the Administrative Conference of the United States. The opinions …

Fame for sale: efficient detection of fake Twitter followers S Cresci, R Di Pietro, M Petrocchi, A Spognardi… – Decision Support …, 2015 – Elsevier … 4.2. Stateofsearch.com. Among the several bloggers that propose their golden rules to identify suspicious Twitter accounts, we consider the “7 signals to look out for recognizing Twitter bots”, according to the founder of the social media website stateofsearch.com [11]. … Cited by 9 Related articles All 7 versions

“In reality there are as many religions as there are papers”–First Steps Towards the Generation of Internet Memes D Costa, HG Oliveira, AM Pinto – Proceedings of the Sixth …, 2015 – axon.cs.byu.edu … The work described in this paper lead to the develop- ment of the @memegera Twitterbot that, from time to time: (i) reads the list of current trends in the Portuguese Twitter; (ii) checks if any of them is the name of a known person; if so, (iii) generates a meme on that person and … Related articles All 4 versions

Assessing the carrying capacity of Twitter and online news SM Jang, J Pasek – Mass Communication and Society, 2015 – Taylor & Francis … We restricted both tweets and online traditional media to information from the United States that was published in English. Sysomos also removes “spam” tweets (eg, Twitter bots) so that the tweets searched represent active accounts run by real people. … Cited by 5 Related articles All 2 versions

It is not only about Grievances-Emotional Dynamics in Social Media during the Brazilian Protests JMR Costa, R Rotabi, EL Murnane… – Proceedings of the Ninth …, 2015 – cs.cornell.edu … Given that Twitter bots repeatedly share a large number of tweets, a small number of users sharing posi- tive content could be significantly influencing the overall Page 6. Figure 6: Number of protest-related tweets using the classi- fier of tweets about protests results (?). … Cited by 1 Related articles All 5 versions

Political bots and the manipulation of public opinion in Venezuela MC Forelle, PN Howard… – Available at SSRN …, 2015 – papers.ssrn.com … Propaganda,” TechPresident, 10-Dec-2014. . [4] A. Samuel, “How Bots Took Over Twitter,” Harvard Business Review, 19-Jun-2015. . [5] R. Dubbin, “The Rise of Twitter Bots,” The New Yorker. [6] A. Monroy-Hernández, danah … Cited by 7 Related articles All 6 versions

Identifying Top-k Consistent News-Casters on Twitter S Mazumder, S Mehta, D Patel – … of the 24th ACM International on …, 2015 – dl.acm.org … We have per- formed experiments to evaluate the effectiveness and efficacy of NCFinder and analyzed the discovered top-100 news-casters’ pro- file. However, at present, NCFinder does not address the issue of Twitter Bots. … Related articles

Building a Better Book in the Browser (Using Semantic Web Technologies and HTML5) JA Clark, SWH Young – Code4lib journal, 2015 – journal.code4lib.org … These tags allow Facebook and Twitter bots to fetch content from our pages and display data attractively for users on their platforms (Figure 8), thereby increasing the likelihood of further sharing. Figure 8: SMO-enhanced book content on Twitter. … Cited by 2 Related articles All 3 versions

A semi-automatic approach for labeling large amounts of automated and non-automated social media user accounts C Teljstedt, M Rosell… – … Conference (ENIC), 2015 …, 2015 – ieeexplore.ieee.org Page 1. A Semi-Automatic Approach for Labeling Large Amounts of Automated and Non-Automated Social Media User Accounts Christopher Teljstedt KTH Royal Institute of Technology Stockholm, Sweden Email: chte@kth.se … Cited by 5 Related articles All 2 versions

Follow thy neighbor: Connecting the social and the spatial networks on Twitter M Stephens, A Poorthuis – Computers, Environment and Urban Systems, 2015 – Elsevier This paper compares the social properties of Twitter users’ networks with the spatial proximity of the networks. Using a comprehensive analysis of network den. Cited by 16 Related articles All 7 versions

Exploiting temporal dynamics in Sybil defenses C Liu, P Gao, M Wright, P Mittal – Proceedings of the 22nd ACM SIGSAC …, 2015 – dl.acm.org Page 1. Exploiting Temporal Dynamics in Sybil Defenses Changchang Liu1,2 Peng Gao1,2 Matthew Wright3 Prateek Mittal2 1 Equal contribution joint first authors 2 Department of Electrical Engineering, Princeton University … Cited by 2 Related articles All 6 versions

[BOOK] Production Studies, the Sequel!: Cultural Studies of Global Media Industries M Banks, B Conor, V Mayer – 2015 – books.google.com … digital communities—from prop masters in Germany, Chinese film auteurs, producers of children’s television in Qatar, Italian radio broadcasters, filmmakers in Ethiopia and Nigeria, to seemingly autonomous Twitterbots. … Twitter bots programmatically generate and post tweets. … Related articles All 2 versions

Article and Author Level Measurements AK Das – Open Access for Researchers, Module 4: Research …, 2015 – eprints.rclis.org … article the higher the score. The quality of that attention Y a news story counts for more than a FacebooN post. attention from a researcher counts more than attention from an automated Twitter bot. The altmetric score is useful … Related articles

Qualitative methods 1 Enriching the interview R Dowling, K Lloyd… – Progress in Human …, 2015 – phg.sagepub.com Advertisement. … Cited by 1 Related articles

Fault-Tolerant, Real-Time, Secure Notification System A Railean – railean.net Page 1. FAULT-TOLERANT, REAL-TIME, SECURE NOTIFICATION SYSTEM A. Railean Technical University of Moldova Page 2. Table of Contents 1 Introduction…..6 … Related articles

Newsroom statistics in the digital age T Hartman – 2015 – mospace.umsystem.edu … I can’t wait to find a use for it. The lecturer told a story of how one of his colleagues learned how to use the API in the morning, and by evening he had a twitter bot that automatically wished every senator and congressman a happy birthday via twitter, using …

Copyright for Literate Robots J Grimmelmann – Iowa L. Rev., 2015 – HeinOnline Page 1. Copyright for Literate Robots James Grimmelmann* I. INTRODUCTION ….. 657 II. HUMAN COPYRIGHT ….. 658 III. ROBOTIC COPYRIGHT ….. … Cited by 4 Related articles All 9 versions

Critical making in the digital humanities R Whitson – Introducing criticism in the twenty-first century, 2015 – books.google.com … Consider Nick Montfort’s ‘Taroko Gorge’ (http://nickm. com/poems/taroko_gorge_original. html) and Zach Whalen’s ROM_TXT twitterbot (https://twitter. com/rom_txt) along with an interview where Whalen discusses his work (http://blogs. loc. … Cited by 2

Stifling The Public Sphere: Media And Civil Society In Russia M Snegovaya – Media and Civil Society in Egypt, Russia, and Vietnam – ned.org … 24 Lawrence Alexander,“Social Network Analysis Reveals Full Scale of Kremlin’s Twitter Bot Campaign,” Global Voices, 2 April 2015. 25 Fiona Hill and Clifford Gaddy, Mr. Putin: Operative in the Kremlin (Washington: Brookings Institution Press, 2015), 390. … Related articles All 2 versions

Public opinion on National Security Agency surveillance programs: A multi-method approach CG Reddick, AT Chatfield, PA Jaramillo – Government Information Quarterly, 2015 – Elsevier This paper examines public opinion on National Security Agency (NSA) mass surveillance programs of Americans. A new theory, developed and tested in this paper,. Cited by 7 Related articles All 3 versions

Constructing a Context-aware Recommender System with Web Sessions A BRAMSTÅNG, Y JIN – 2015 – publications.lib.chalmers.se Page 1. Constructing a Context-aware Recommender System with Web Sessions Master of Science Thesis in Computer Science: Algorithms, Languages and Logic ALBIN BRAMSTÅNG YANLING JIN Department of Computer Science & Engineering … Related articles

Exploring Twitter as a game platform; strategies and opportunities for microblogging-based games K Hicks, K Gerling, B Kirman, C Linehan… – Proceedings of the 2015 …, 2015 – dl.acm.org Page 1. Exploring Twitter as a Game Platform; Strategies and Opportunities for Microblogging-based Games Kieran Hicks1, Kathrin Gerling1, Ben Kirman1, Conor Linehan2, Patrick Dickinson1 1University of Lincoln, UK, {khicks … Cited by 1 Related articles All 2 versions

DESPIC: Detecting Early Signatures of Persuasion in Information Cascades A Flammini, F Menczer, Q Mei, S Malinchik – 2015 – DTIC Document … VS Subrahmanian, O Varol, P Shiralkar, E Ferrara, F Menczer, A Flammini, et al. The DARPA Twitter Bot Challenge. IEEE Computer (to appear), 2015. 21. … VS Subrahmanian, O Varol, P Shiralkar, E Ferrara, F Menczer, A Flammini, et al. The DARPA Twitter Bot Challenge. … Related articles All 2 versions

Popular with the Robots: Accusation and Automation in the Argentine Presidential Elections, 2015 T Filer, R Fredheim – Available at SSRN 2700809, 2015 – papers.ssrn.com Page 1. Popular with the Robots: Accusation and Automation in the Argentine Presidential Elections, 2015 Tanya Filer and Rolf Fredheim University of Cambridge, Cambridge, UK. Accusations of dishonourable campaigning … Related articles

Trolling new media: violent extremist groups recruiting through social media MD Chang – 2015 – calhoun.nps.edu Page 1. Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis and Dissertation Collection 2015-12 Trolling new media: violent extremist groups recruiting through social media Chang, Mark D. Monterey, California: Naval Postgraduate School …

Sans duty-making tax visible: Seed fund project report J Duggan, J Lindley – 2015 – eprints.lancs.ac.uk Page 1. authors 1 BRIXTON BRIXTON BRIXTON BRIXTON SEED FUND – PROJECT REPORT “Brixton streets” by Harald Hillemanns is licensed under CC BY-SA 2.0 https://www.flickr.com/ photos/ubi-bene/2593560636/ Dr James Duggan (ESRI, MMU) J.Duggan@mmu.ac.uk & … Related articles All 3 versions

Engaging community with social research: using social research to develop and evaluate local government community engagement initiatives A Hickey, P Reynolds, L McDonald – 2015 – eprints.usq.edu.au Page 1. Engaging Community With Social Research Using Social Research to Develop and Evaluate Local Government Community Engagement Initiatives Associate Professor Andrew Hickey University of Southern Queensland … Related articles

[BOOK] Digital Didactical Designs: Teaching and Learning in CrossActionSpaces I Jahnke – 2015 – books.google.com … Bots did influence, for example, the political opinions and actions of those using Twitter in the Iran election in 2009 and using online communi- ties in the Ukraine crisis in 2014 (read further in “Twitter Bot Influences Real Americans,” NBR, 2011). … Cited by 5 Related articles All 5 versions

[BOOK] Pax Technica: How the Internet of things may set us free or lock us up PN Howard – 2015 – books.google.com Page 1. P. N p H . … . or Lock Us Up May Set Us Free | || | | Page 2. pax technica Page 3. Page 4. philip n. howard pax technica how the internet of things may set us free or lock us up new haven & london Page 5. … Cited by 20 Related articles All 2 versions

Combining quantitative and qualitative methods in digital analyses of literary style JB Herrmann – Antwerp, 8 & 9 June, 2015 – dhbenelux.org Page 49. 24 DHB–A Combining quantitative and qualitative methods in digital analyses of literary style J. Berenike Herrmann German Department Göttingen University bherrma1@ gwdg. de This talk reports on a methodological agenda for digital analyses of literary style. … Related articles All 2 versions

The virtual ‘Caliphate’: understanding Islamic State’s propaganda strategy C Winter – London: Quilliam, 2015 – almendron.com Page 1. By Charlie Winter Foreword by Haras Rafiq The Virtual ‘Caliphate’: Understanding Islamic State’s Propaganda Strategy Page 2. QUILLIAM CHARLIE WINTER 1 Quilliam is the world’s first counter-extremism think tank … Cited by 23 Related articles All 5 versions

Making the most of community energies: Three perspectives on grassroots innovation A Smith, T Hargreaves, S Hielscher… – … and Planning A, 2015 – epn.sagepub.com Page 1. Article Making the most of community energies: Three perspectives on grassroots innovation Adrian Smith University of Sussex, UK Tom Hargreaves University of East Anglia, UK Sabine Hielscher University of Sussex, UK Mari Martiskainen University of Sussex, UK … Cited by 15 Related articles All 6 versions

Applying sentiment analysis for tweets linking to scientific papers N Friedrich – 2015 – content.grin.com Page 1. Natalie Friedrich Applying sentiment analysis for tweets linking to scientific papers Bachelor Thesis Computer Science Page 2. Page 3. Bibliographic information published by the German National Library: The German … Related articles

Social media and management fashions DØ Madsen, K Slåtten – Cogent Business & Management, 2015 – Taylor & Francis Cited by 3 Related articles All 7 versions

Distribution channel for Moroccan artisans Z El Jebbari – 2015 – dspace.mit.edu Page 1. DISTRIBUTION CHANNEL FOR MOROCCAN ARTISANS By Zyad El Jebbari M.Sc. Science and Executive Engineering Ecole des Mines ParisTech, 2010 SUBMITTED TO THE ENGINEERING SYSTEMS DIVISION IN … Related articles All 2 versions

Mapping controversies with social media: The case for symmetry N Marres, D Moats – Social Media+ Society, 2015 – sms.sagepub.com Advertisement. … Cited by 7 Related articles All 6 versions

Digital volunteer supported recovery operations experiment K Kaminska, P Dawe, K Forbes… – … Canada, Centre for …, 2015 – cradpdf.drdc-rddc.gc.ca Page 1. Digital Volunteer Supported Recovery Operations Experiment Kate Kaminska and Philip Dawe DRDC – Centre for Security Science Kelly Forbes, Devin Duncan, and Ian Becking International Safety Research Bjorn Rutten Rhapsody Strategies … Cited by 6 Related articles All 2 versions

A Survey on Botnet Architectures, Detection and Defences. M Mahmoud, M Nir, A Matrawy – IJ Network Security, 2015 – ijns.jalaxy.com.tw Page 1. International Journal of Network Security, Vol.17, No.3, PP.272-289, May 2015 272 A Survey on Botnet Architectures, Detection and Defences Muhammad Mahmoud1, Manjinder Nir2, and Ashraf Matrawy2 (Corresponding author: Muhammad Mahmoud) … Cited by 4 Related articles All 4 versions

[BOOK] Research evaluation metrics AK Das – 2015 – books.google.com Page 1. Research Evaluation Metrics W WW OpenAccess for Researchers Page 2. Research Evaluation Metrics Module 4 Research Evaluation Metrics UNIT 1 Introduction to Research Evaluation Metrics 5 and Related Indicators … Cited by 3 Related articles All 6 versions

Social zombies: modus operandi and countermeasures AM Semkou – 2015 – repository.ihu.edu.gr Page 1. INTERNATIONAL HELLENIC UNIVERSITY SCHOOL OF TECHNOLOGY ICT SYSTEMS DISSERTATION “Social zombies: modus operandi and countermeasures” Supervising Tutor: Katos Vasilios Student: Semkou Athanasia-Maria Page 2. 1 November 2013 Abstract …

Where is an author? E Wyly – City, 2015 – Taylor & Francis Cited by 1 Related articles All 7 versions

[BOOK] Managing Online Reputation: How to Protect Your Company on Social Media C Pownall – 2015 – books.google.com

[BOOK] A New Companion to Digital Humanities S Schreibman, R Siemens, J Unsworth – 2015 – books.google.com Page 1. A NEW COMPANION TO 20IGITAL J%UMANITIES – ED IT ED BY SUSAN SCHREIBMAN, RAY SIEMENS, AND JOHN UNSWORTH WILEY Blackwel Page 2. A NEW COMPANION TO 20IGITAL J%UMANITIES ED IT … Cited by 2