Twitter bomb explained

The term twitter bomb or tweet bomb (also spelled as one word) refers to posting numerous (pejoratively, "spamming") Tweets with the same hashtags and other similar content, including @messages, from multiple accounts, with the goal of advertising a certain meme, usually by filling people's Tweet feeds with the same message, and making it a "trending topic" on Twitter.[1] [2] [3] This may be done by individual users, fake accounts, or both.[4]

Advertising

Twitter bombing may be used for commercial advertising. An early example from referred to advertising a YouTube video series Ask a Ninja.

Politics

Twitter bombing is one of the tools used in Internet activism, both by mainstream politicians like Barack Obama and by groups like Anonymous.[5] [6]

The earliest recorded usage of the Twitter bomb is from August 2008, when it was used by bloggers Liza Sabater and Kenneth Quinnell in response to Republican use of the #dontgo hashtag relating to offshore oil drilling.[7] The term was used for other purposes in 2008, but the other meanings have since disappeared.[2]

An example of a Twitter bomb was the campaign organized by online activists in response to a July 31, 2009 Washington Post article on Hillary Clinton that was deemed sexist.[8]

In 2011, it was used extensively by Barack Obama's campaign staff to encourage his followers to contact Congress and encourage them to reach a compromise during the United States debt-ceiling crisis of 2011. Shortly thereafter, @BarackObama lost about 37,000 followers.

Positive impacts

Twitter bombing/spamming can provide exposure to current events that are not being exposed enough from mainstream media. Dhiraj Murthy writes:

Twitter has received significant media attention in its use to disseminate information during disasters, including the 2008 Mumbai bomb blasts (Dolnick, 2005) and the January 2005 crash of US Airways flight 1549 (Beaumont, 2009).[9]

Linking this with the use of hashtag, see hashtag activism, news and information can be spread around the internet at a rapid pace with the use of hashtags.

Comparison to online spam

The use of the Twitter bomb tactics has been known to misfire, as people might be offended by spamming, or trolling.[2] [10]

Spammers have several goals, which are phishing, advertising, or malware distribution. Unlike traditional online spamming, such as email, Twitter has a limit of only 280 characters per tweet. Therefore, a Twitter bomb often include URLs in their tweets in order to send others users to their malicious pages online.[11]

Unlike email spam, Twitter bombs may require participation from their targeted users. Fake accounts are a common source of Twitter bombs. In order to avoid Twitter's spam filters and to overcome their lack of followers, Twitter bombs are often sent as a reply to existing tweets about the same topic. This is done in hopes that the authors of the existing tweets will retweet the response to their own followers, spreading the Twitter bomb before the fake account is deleted.

With regards to numbers, an example of a Twitter bomb analyzed in one research paper described how nine fake user accounts produced 929 tweets in 138 minutes, all with a URL to a political website, presenting negative views on the U.S. politician Martha Coakley.[12] The message might have reached about 60,000 before being eliminated by Twitter as spam.[13]

Criticism

Many Twitter users find comfort in sharing their ideas and thoughts to the general public. Though Twitter can be utilized to spread awareness of a variety of issues and causes, many can take advantage and post numerous tweets that may be viewed as spam. Twitter's rule page considers tweets "spam" once a user displays multiple tweets with unrelated hashtags to a certain topic, or continues to post multiple tweets of the same content in one account. Some instances, these tweets can be viewed as trolling once they begin to seek out other Twitter users for arguments about controversial issues.

See also

Notes and References

  1. Book: Mary C. Joyce. Digital Activism Decoded: The New Mechanics of Change. 30 April 2012. 30 April 2010. IDEA. 978-1-932716-60-3. 221.
  2. [Ethan Zuckerman]
  3. J. Ratkiewicz, M. D. Conover, M. Meiss, B. Gonçalves, A. Flammini, F. Menczer, "Detecting and Tracking Political Abuse in Social Media", Proc. 5th International AAAI Conference on Weblogs and Social Media ICWSM (2011).
  4. Web site: 37K Followers Ditch Obama After Twitter Bomb - @BarackObama tweets handles of GOP legislators, state by state. 30 July 2011 . Newser. 2012-04-30.
  5. Book: John Clifford Green. Daniel J. Coffey. The State of the Parties: The Changing Role of Contemporary American Parties. 30 April 2012. 1 September 2010. Rowman & Littlefield. 978-0-7425-9954-3. 178.
  6. Web site: Chris Richardson . Anonymous Plans "24 Hour Tweet Bomb" To Fight CISPA . WebProNews . 2012-04-20 . 2012-04-30.
  7. Kenneth Quinnell, "Twitter Bomb", Florida Speaks blog, August 5, 2008, Last accessed on August 27, 2012.
  8. Book: Mary C. Joyce. Digital Activism Decoded: The New Mechanics of Change. 30 April 2012. 30 April 2010. IDEA. 978-1-932716-60-3. 155–156.
  9. Murthy, Dhiraj. "Twitter: Microphone for the masses?." Media, Culture & Society 33.5 (2011): 779.
  10. Web site: Social Media Activism and the (In)justice of the Mob . Partisans . 2012-04-26 . 2012-04-30 . dead . https://web.archive.org/web/20120506002256/http://www.partisans.org/2012/04/social-activism . 2012-05-06 .
  11. Song, Jonghyuk, Sangho Lee, and Jong Kim."Spam filtering in twitter using sender-receiver relationship." Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011.
  12. P. Metaxas, E. Mustafaraj, "From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search", In: Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, April 26-27th, 2010, Raleigh, NC: US (2010).
  13. Neil Savage. 2011. "Twitter as Medium and Message", Communications of the ACM 54, no. 3 (March 2011), 18–20. DOI:10.1145/1897852.1897860