Friday 23 May 2014

The last assignments

After one week this course is over! Hope the students have enjoyed and learned at least almost as much as the professors!

Peer feedback is an elementary part of this course!
The last team assignment is to give peer feedback for the second group project outcome. Some teams have already started!
  • Team Austria will assess team Spain report, 
  • team Ireland will give feedback to team Austria, 
  • team UK will share their thoughts about team Ireland's effort, 
  • team Finland will do an evaluation of the outcome made by team UK and 
  • team Spain will make their review of the report produced by the Finland team.
There will also be two individual tasks, both about feedback. You will find them in your email very soon.

The deadline for all student input of this course is Wednesday 28th May. Thank you!

Thursday 22 May 2014

Team project #2 - Team Spain

The Spanish representative during this year's Eurovision Song Contest, performed in Copenhaguen was Ruth Lorenzo Pascual. She is a singer that became quite popular during her performances in the well known talent show "X-factor". Very few years after that, she was selected to represent Spain for the song contest performing "Dancing in the rain". She was one of the most liked singers of Spain to take part in the competition of the last years. She finally finished on the 9th place, one of the best results in the recent years for Spain, in the contest.




In order to have a concrete analysis we’ve reduced the questions in this four summary questions:

  • What kind of campaign does Ruth Lorenzo and TVE have on Facebook and Twitter? (We have decided not to study the label record because we didn’t find any relevant campaign in it)
  • Which are the differences between the use of Twitter and Facebook?
  • Are there fan communities in other countries? How do these communities operate?
  • What is done to attract the audiences in other countries? (This question is explain throughout the whole results)

The use of the social networks has had a vital importance in the contest. It has mainly had an effect to Eurovision itself as an interactive show. Therefore, it has also affected the artists that took part in it. Among those, we obviously find Ruth Lorenzo’s professional career. The non use of Twitter and Facebook would have clearly decreased the importance (or at least the level of followers and spectators) of the show. While we were investigating for the project, we found an enormous amount of Spanish people not only on the social networks but also in the real life, that Eurovision without Twitter would not have been the same, or that they would not have watched it.  This has made things much easier for us: nowadays everybody uses social networks so it has been easier to follow all the process of the Song Contest and the final show.

The fact is that Eurovision is not a very followed and respected show in Spain, as it is always said that our country basically takes part in it just to lose the contest. Moreover, it is also very criticized  the fact of being in the “Big Five” and paying every year an amount of money basically just for being in the final without having to pass the semifinals (if we take in consideration Spanish current economic situation).

We have noticed that Ruth has a little bit more activity on Twitter than on Facebook. However, the contents are quite similar despite the fact that she has more important stuff in Facebook than in Twitter. Something similar happens with the account of TVE, the Spanish public television responsible for the broadcast of the contest and supporter of every year’s singer.

Ruth manages her own Twitter and Facebook pages, posting professional but also personal content, fact that can be interesting for her followers. Thanks to Eurovision she has gained a high number of followers, previously she was barely known; despite she is a professional singer since 2010. Apart from Eurovsion she also got a top hit in her career when she performed in the British talent show “X-Factor”.

The amount of people following her increased, as we said, during the previous weeks and months of the performance. That also had an effect on the fan clubs. There were many fan pages in the social networks as well as in blogs, forums and even YouTube. However, most of this accounts have something in common… They were created during the highest peak of popularity of the singer and also had the more amount of activity during the previous days of her performance: They are not used anymore

FOR READING THE FULL REPORT CLICK HERE

Wednesday 21 May 2014

Team project #2 - Team Austria

THE WIENER TAKES IT ALL

Put a man with an outstanding voice in an evening gown to perform a Bond-like song on stage of Eurovision Song Contest (ESC), and you get all sorts of mixed reactions from the audience. Add a beard like a tangle of dry brush and you get a controversy of a kind. Say this artist passionately supports LGBT community and the whole bearded persona is a “statement of tolerance and provocative at the same time”, and you get an international criticism and a massive political resonance. Oh, and choose a song with breathtaking lyrics and music, that will get stuck in your head, making you sing it in the shower every morning.This year Austria managed to do all of it and win the competition. Austrian drag-queen, Conchita Wurst, is an excellent example of how to make a manly beard a continent-wide trend and annoy anti-gay politicians and activists all over Europe. Beardy lady stole thousands of hearts and made fans around the world knitting beards to express their support. 
 
And it’s not surprising, that since the participation announcement back in November, the news about Frau Wurst spread like wildfire and Austrian Eurovision music video “Rise like a phoenix” went viral in a matter of days (you can watch the video here). 

Team project #2 - Team UK



The UK contestant for Eurovision was Molly Smitten-Downes. Her song was Children of the Universe. Molly didn’t manage to gain huge success in the contest. We researched how Twitter and Facebook was used in promoting her, what was her presence like in social media and did this change during the whole period of Eurovision song contest.

Some of our research questions:
- What kind of campaign does the representative of UK have on Facebook and Twitter?
- How does Molly interact with people and has her social media presence changed during the Eurovision period?
- What is the content like posted in social media, more straight-forward promotional, or personal?
- What is done to attract the audiences in other countries?


Molly seemed to be new in the music field, so in the beginning she didn’t have too many fan communities, fans or followers considering she is from the UK. Her popularity was rapidly expanding, starting from the beginning of the contest and specially since she became the representative of the UK. At the time of the semifinals there had been an increase in people’s activity on Facebook, and even new fan pages have been made since.

In our opinion, Molly was trying hard to create a community around her and her team, but did not manage to do this so well in the end. Her presence was somewhat personal and she shared a lot of pictures, retweeted fan tweets and had some minor interaction with fans. Still, she didn’t manage to create too much social media popularity, and we felt that maybe it was because it felt a bit forced at times. Her fanbase did grow, but probably not as much as was expected.

BBC used many of their channells to promote Molly. On Twitter BBC campainging for her, was quite effective and they reached a lot of people in the UK and abroad.  During Eurovision Contest BBC was also very active and constantly cheering for Molly, but also commenting on other contestants. BBC Eurovision managed to get Molly’s fanbase very active on Twitter.


In the end we can say that social media had big part in this Eurovision song contest. Social media platforms were used actively for promotional and informative purposes. The contest and her team and BBC had a strong online presence during the weeks before and during the competition. Even though most of the content posted was mainly meant to raise awareness, support and excitement among people in the UK, they probably managed to reach Eurovision fans all over Europe.

Full report: here.

Team project #2 - Team Finland

On our second team assignment we researched how Finnish rock band Softengine used social media for community building and promotion during Eurovision 2014. Softengine was Finland’s representative in 2014 Eurovision song contest. They got to the final from the second semifinal and reached 11th place on the competition. They currently have a record deal with Sony Music.


On our research we tried to find answers to following questions:


  •  Does Finnish representative, Softengine, have campaigns in Facebook and Twitter?
  • Does Softengine’s record company have campaigns in Facebook and Twitter?
  •  Are there some fan communities in other coutries, which countries and what are they doing in order to attract the audiences?


Both the band and the record company have their accounts in Facebook and Twitter, and the band is very active also in Instagram. Most of the promotion was done by the band themselves; before and during the Eurovision competition active promotion focused in Twitter and Instagram. Record company on the other hand seems to save their marketing efforts to later date.

In Facebook the band has their band pages and closed fan community. In Twitter majority of their followers are outside from Finland, mainly female in their teens or early 20’s. Some individuals and groups in Twitter actively promoted the band during Eurovision, for example “Echelons” in Finland and Russia asked all fans to vote for them. In Russia the main platform for support has been Russian social network, Russia vk.com, where currently 15 fan communities for Softengine can be found.  

As conclusion we can say, that while there seems to be very little active fan communities around the band regarding Eurovision, it is clear that the band has received international attention in various social media. Their 24000 likes in Facebook or 14000 followers in Twitter are proof of that. Twitter, Facebook, Instagram and Russian social networks are platforms for discussion among the fans and show clear signs of community building in general.



Link to complete report: Final Report of Team Finland

Team project #2 - Team Ireland

Summary:


In our research we go through Irelands representatives campaign for Eurovision Song Contest 2014 in the social media and share some light on why their campaign wasn't very successful in the end.

We answer such research questions as:

- What kind of campaign does the representative of Ireland have on Facebook and Twitter?
- Are there fan communities in other countries? How do these communities operate?
- How does the representative use social media when the voting process is ongoing?

Irelands representative for Eurovision Song Contest 2014 was band named Can-Linn, featuring a Dublin-based singer Kasey Smith. They performed at the second semifinal 8.5.2014, but did not make it to the grand final.

hashtagboobs.jpg


Can-Linn had it’s own social media channels on Twitter, Youtube and Facebook. From these Twitter and Facebook were researched more closely, since they had more visible interaction. The most interaction with the fanbase happened through Twitter, but Facebook was a close second. The hashtag #YesWeCanLinn was used to promote the performers and to try and make it a trending hashtag on Twitter. Their interaction on the social media channels changed through the course of the campaign, the peak being on May 8th when the 2nd Semi-Final was held.

Read more about our research on our complete research report, which can be found HERE.


Wednesday 30 April 2014

Lesson 9: Six ways to show your story (and how to print all about Heidi on the screen)

You might have had a look at the stats section of the dashboard and wondered why some stories of this blog have not been read more than a couple of times, although you are sure there are more readers.

The explanation is that the same stories appear on several pages of the blog. On this blog every post (story) is published on six pages (actually on more):

On the first page
http://eva-some2014.blogspot.fi/
as long until it is story #8 (This blog now shows seven newest stories on first page, but that can be changed) Then the story will be moved to page 2 which at the moment is:
http://eva-some2014.blogspot.fi/search?updated-max=2014-04-07T13:33:00%2B03:00&max-results=7

Blogger stats are informative, but the report of the page-views of each
individual story is misleading showing only views when only the post
in question was shown alone on its own page.

Every page has its own page. It is these exclusive visits on the page the statistics show. You can copy the link of the story page and put it on a web page or send by email. The page URL of my story: Lesson 4 - Using Google Groups is:
http://eva-some2014.blogspot.fi/2014/03/lesson-4-using-google-groups.html

On this blog the posts are archived month by month. Thus every story posted in March this year are to be found and read at:
http://eva-some2014.blogspot.fi/2014_03_01_archive.html

Actually a page of stories each year is also generated. The following link shows all 2014 stories in sets of seven posts:
http://eva-some2014.blogspot.fi/search?updated-min=2014-01-01T00:00:00%2B02:00&updated-max=2015-01-01T00:00:00%2B02:00&max-results=50

For every label a page is generated. If you want to see all the lessons of this blog on one single page, go to:
http://eva-some2014.blogspot.fi/search/label/Lesson

Our blog has a global audience ;-)

Every search typed in the search box upper left corner of the blog generates a page if stories including the search term are found. If you want to find all stories mentioning the noblest of all arts - football - you type football in the search box and generate this web page:
http://eva-some2014.blogspot.fi/search?q=football

If you appear often on a group blog, you can also generate a page with all the stories you have written or beem mentioned on. Here's our Heidi on the Art&Media blog:
http://tamk-artmedia.blogspot.fi/search?q=m%C3%A4enp%C3%A4%C3%A4

The pages also have their own URL:s  like:
http://eva-some2014.blogspot.fi/p/library.html

Tuesday 29 April 2014

Lesson 8: Rebelling software

How to restore order?

Sometimes you might get really frustrated with software not working properly. You do everything right but things are not happening the way they should, You double check everything, do everything right and no result.


One of the most popular annoying situations with Blogger is that pics don’t appear where they should. You put the cursor where you want the pic, use the add image function, and the photo pops up on top of the story. You start moving the pic and create a mess. You start everything again and no positive feedback to your effort.

The way to address this problem is to close the post, then open it again, and it works.

On every course I use Blogger there is at least one student who can’t access the dashboard in the beginning by accepting the invitation. The fix is in most cases that the user logs out from Google, then logs in again. Then everything works fine.


Logging out and in again is also the fix if you are not able to see the edit button of a page to add content. This happened to one of the students of this course last week. You can find more details about this in our Google Group.

A general rule for putting all rebelling cloud software to order is to shut down the situation and start again - exactly like restarting the PC is most often best way to manage the computer.


Sunday 27 April 2014

Lesson 7: The Password Problem

We humans have become pretty good at physical security. It’s not very easy to rob a money transfer vehicle or a bank and actually get away with it. It seems unlikely that even the boldest terrorist would attempt to physically break into high security locations like Pentagon or Fort Knox.

Digital security however is a whole different matter. During the last few years we have gotten used to news about many of the largest companies in the world like Yahoo, Adobe, Twitter, Facebook, Nintendo and Apple getting hacked [1]. A big part of the problem with digital security is that our systems still rely heavily on passwords for authentication. Passwords are challenging for several reasons.

The amount of passwords
First of all, we need so many of them. According to Techradar 25 to 34 year old web users actively use 40 different online accounts on average. [2] We are told that each one of our accounts should have a unique password, so that if and when one of them gets hacked, the hackers don’t get access to all of our accounts. Remembering 40 unique username-password combinations is not very easy to do for most of us.

The complexity of passwords 
The passwords we choose should be long, random and complex. This is because in a typical hack the attacker gets access to the databases in which usernames and passwords are stored. Luckily most (but not all) system administrators are wise enough to store passwords in encrypted formats, so that the attacker has to crack them first in a process called brute-forcing. This is where the length and complexity of your passwords really comes into play.

The very first thing the hacker will attempt is a so called dictionary attack, in which a dictionary of common words and passphrases is tested for the password. [3] If your password is included in the dictionary, it will be cracked in less than a second. Howsecureismypassword.net estimates the time it would take for a desktop PC to brute-force different passwords. [4] I started the test with with a very common word “Michael” which of course would be cracked instantly. Adding the number one after it (Michael1) still puts it in the top 1000 of most common passwords, which means it’s probably found in every password dictionary. Interestingly adding the number three (Michael3) makes brute-forcing it last 15 hours, which while still being quite weak, is already a significant improvement. Below is a chart of other variations and their brute-forcing times:














 
Image: Brute-force attack times for a desktop PC for different passwords based on Howsecureismypassword.net results.

The charts demonstrate how important password complexity and length is. By adding special characters like exclamation marks and asterisks to our password, we can improve its strength significantly. By simply adding the letter “d” a few times to the end the word “password” it changes from the worst password in the world to a password that takes days to crack.

What’s good enough?
What is a safe enough time estimation to aim for then? We should remember two things: many hackers have access to botnets that comprise of thousands of computers and secondly computers are improving at an exponential rate according to Moore’s law. [5] Considering this I wouldn’t recommend settling for anything less than hundreds of thousands of years, of course also depending on the importance of the account you are protecting.

Another challenge with passwords is that no matter how good your password is, it is still very vulnerable to two things: phishing and keylogging.

Phishing
Phishing is a process in which a malicious actor masquerades as a legitimate entity in order to have you send your private information to them [6]. To give you an example from my own experience, I once received a genuine looking email from Paypal telling me that I need to log-in to my Paypal account in order to confirm my address. I was suspicious but decided to see what happens if I click on the link. It took me to a website that had the exact same design as Paypal and it asked for my username and password. I entered a completely made up username and a random password and clicked on the login button. The website pretended that it accepted my login information and took me to a page that looked like the usual Paypal interface! You can probably guess what would have happened if I had entered my real Paypal login: this phishing website would have gathered my login information and used it to enter my Paypal account in an attempt to steal my funds.

Keylogging
Keylogging is even worse than phishing: a hacker is able to install a small program on your computer without you noticing which then captures every keystroke you type and sends the text to the hacker in a discreet manner. This way the attacker can learn all the usernames and passwords that you use while the keylogger is active. In a 2010 report, 48% of inspected 22 million computers were found to have malware in them [7] and according to Australian Computer Emergency Response Team (ausCert) 80 percent of all keyloggers are not detectable by antivirus software. In other words this threat is very real and makes relying on passwords for security quite scary.

What can we do?
What can be done to improve the situation? To fight phishing attempts, you should always double check the URLs of the websites you visit. I also recommend using tools like Web Of Trust (https://www.mywot.com/) that will show you community based scores for the websites you visit. If you are about to enter a shady website, you will get a warning. You should never ever click on links you receive in email, unless you are absolutely sure about the sender. Remember that changing the sender-address is a quite trivial thing to do. If a service that you are using asks you to visit their site, it’s better to manually type in the address or google it to make sure you are taken to the right website.

Defending against keylogging is much more difficult, because these type of infections can be hard to detect. Naturally you should have an up-to-date virus scanner and you should be performing scans regularly, but that doesn’t really guarantee anything. One of the most efficient defenses against keylogging attacks is two factor authentication. It means that you use not only your password to log in to a service but also a code sent to (or generated by) another device, typically your mobile phone. Many of the big web companies like Google and Yahoo offer two factor authentication these days and I really recommend it for greatly improved safety. To perform a successful attack, the hacker would need to have control of both your computer and your phone, which is quite unlikely.

Password managers
To help remember all your unique passwords you can use a password manager like Roboform or KeePass, but those are kind of double edged swords. On the other hand they make life quite convenient by keeping track of all your passwords, but they also create a single point of failure: If the attacker learns the master password that protects your password manager, then suddenly they have access to all your online accounts all at once. I personally have Roboform installed, but only on my workstation that I keep “sterile” which means it never touches the internet. At the moment I have 980 different user accounts saved in those files and I would never be able to remember all those logins without Roboform.

Coming up with a system
If you do not have an offline computer to store your passwords safely, I recommend creating a system that allows your passwords to be unique, long and yet easy to remember. Let me give you an example. You could create a single random password to memorize, let’s say “XyZ##!:):P” and make it unique by adding the letters two and three from the service you are using it for to the end of the password. So your Facebook password would be “XyZ##!:):Pac”. Even better, you could do something like adding the first letter from the top-level domain (like .com .org or .fi) in all caps at the end to hide your pattern a bit more. So Facebook password would become XyZ##!:):PacC and that one would take 111 million years to crack. In my view this would provide good enough security for you non-critical online accounts. Your main email account and other highly important accounts should probably still have completely unique passwords (and thus not use a system like this).

Speculation about the future
What might the future of online security have in store for us? Many used to believe in biometric identification methods such as fingerprint- and eye scanners. The problem with these solutions is that just like passwords, malicious actors can use clever ways to obtain copies of this information in order to falsely prove their identity. Fingerprints might in some cases be even easier to obtain than passwords, as we leave copies of them pretty much everywhere. Unlike your password, you can’t really change your fingerprints if you fear a hacker has managed to get a copy of them, which in my opinion makes it an awful system for security. My prediction is that in future we authenticate with combinations of something we have (perhaps a smart watch or a ring) and something we know (a simple password), but hopefully the systems also analyzes our typical behavior and adjusts the requirements based on our behavioral patterns. For example, the login-system should demand higher degrees of verification if the login attempt is made from an unknown computer at an unfamiliar location. Many two factor authentication systems already allow you to mark commonly used computers as safe, removing the need to do a full two factor sign-in on those. Of course I am hopeful that all the smart security engineers will come up with something even better than I’m able to predict.

Many companies are already working hard to solve this problem and there are big incentives for a solution. According to popularmechanics.com the National Institute of Standards and Technology is offering a 10 million dollar reward for coming up with an alternative to passwords. Even Ford is working on a system that would automatically log you in based on the proximity of your smart phone. [8] The ones who can finally solve the password problem by coming up with more convenient and secure authentication methods will surely be applauded by internet users around the world.





Sources:

[1]
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 

[2]
http://www.techradar.com/news/internet/online-fraud-too-many-accounts-too-few-passwords-1089283

[3]
http://searchsecurity.techtarget.com/definition/dictionary-attack[4]https://howsecureismypassword.net/ 

[5]
http://en.wikipedia.org/wiki/Moore's_law[6]http://en.wikipedia.org/wiki/Phishing 

[7]
http://www.zdnet.com/blog/security/report-48-of-22-million-scanned-computers-infected-with-malware/5365 

[8]
http://www.popularmechanics.com/technology/how-to/computer-security/solving-the-password-problem-14993917-2

Tuesday 15 April 2014

Team project #2 - research on social media usage in building fan communities

The second team team research project is about finding out how social media is used for community building and promotion.
The Eurovision song contest is used for research material - hundred millions of people will try to help their favourite to win using social media channels.

Example of a Twitter search helping to find the right
#hashtags to search and @usernames to follow.

The steps needed to complete the assignment are:

1. Organise your team Create the project wiki folder of you team in the EVA Social Media 2014 folder.

Make the schedule of team hangouts, chats and other meetings. The professors are available for meetings. Try Antti first, then Cai.

2. This course is a collaborative enterprise. You are not supposed to split the project in independent tasks and then merge the work of each student to a research report. Division of labor is allowed and necessary, but at least the research questions and the final report must be done in interaction, collaboratively.

3. Design your research questions. Some possible:
* what kind of campaign does the representative of country x have on Facebook and Twitter?
* what kind of campaign does the broadcasting company involved of country x have on Facebook and Twitter, if any?
* what kind of campaign does the record label of representative of country x have on Facebook and Twitter, if any?
* it is obvious that there is a lot of noise on Facebook and Twitter to support the artist in her/his country. But you can't get any votes from you own country. What is done to attract the audiences in other countries?
* Are there fan communities in other countries? If you are the Sweden team, can you find international fan communities to support your representative? How do these communities operate?
* Are there any differences in use of Facebook and Twitter for promotion and community building?
In short: How is social media and communities on social media used to win Eurovision? Or is it not only about Eurovision, but about something beyond? (Remember though that your research object is NOT the artist or the song BUT the functions and usage of social media).

    A lot of research material; 700 000+ fans in this Facebook community.
You'll 
find more relevant FB pages and groups to follow, also ones to
support the
candidate of your team.

4. Follow what happens:

the weeks before the event
first semifinal May 6
second semifinal May 8
Grand Final May 10.

5. Analyse what happened and write the research report with your team.
The research report is structured like this:
- Who we are
- our research questions were
- our results are
- how we did it
- questions for future research
(Some students need to know how long the report should be. Aim at 4000-6000 characters.)

Your complete research project is in your team folder, shared with anyone with the link.

On the blog you publish an abstract or executive summary
of your report - a maximum of 2600 characters + pics. Add label Research report #2. Add a link to the blog post to the complete report in your Google Drive folder.

6. Report deadline: Wednesday May 21  

Monday 14 April 2014

Lesson 6 Microblogging part 5: Teleportation machine and collaborative notebook

Twitter walls are very common on conferences and other events. It adds to the social experience of the event to see and share comments on the Twitter wall. But Twitter feed can have more ambitious functions:

  • The participants can make a silent or spoken agreement to share their notes on Twitter using a session or topic specific hash-tag
  • The participants can view the stream from parallel sessions in real time and have grounds for a decision of session switch
  • You can view the notes of the parallel sessions afterwards
  • You can follow the conference events in real-time even if you are thousands of kilometres away

MindTrek Conference 2013 Twitter wall.
Photo copied from Tweet by @lecklin (Tuomas Lecklin)
I have tested use of Twitter at conferences with my students at some occasions. Some students love it. Some students hate it. Some students enjoy following the stream, but find it very hard to follow the conference producing simultaneously notes for Twitter.

If you want to have a look on how hash-tags worked at last European Youth Award (EYA) festival check this.

And here's one example how to utilize Twitter feed: I have on many occasion composed blog posts using the Twitter feed of my students. Here is an example from EYA 2012.

Engage the experts
Apple founder Steve Wozniak interacting on-line with
MindTrek 2013 participants.
Many professonals are active Twitter users, and some of them like to interact and share. You loose nothing by giving a try asking the experts. The example here Woz replying to @Lecklin is from an arranged situation, where Stewe Wozniak had promised to answer questions, but I've seen other situations where my students have asked and the expert replied on Twitter.

TAMK Media student Tuomas Lecklin was very happy Steve Wozniak answered the question he made on Twitter on-line. You can see the six minute interaction on YouTube.

To collect data for our second research project
Our second research project studies the use of social media by #eurovision song contest fan communities, contestants, record labels and television broadcasters around Europe. Twitter is one of the main sources of research materials for the study.

The brief of the research project will be on this blog tomorrow.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google?
4. A massive database
5. Teleportation machine and collaborative notebook (This story)

Thursday 10 April 2014

Lesson 6 Microblogging part 4: A massive database

One of the very first social media services I used was del.icio.us (now delicious.com), the social bookmarking service, priceless in large research projects.
Twitter is similar but applied to tweets. By looking for the most popular hash-tags of the topics you are interested in you possess a data library without limits. And you can initiate valuable banks of information by creating and sharing your own hash-tags.

A very basic but illustrative example of Twitter data usage is Tweetping:
Screenshot (partial) of Tweetping. The application shows you world
tweets in real-time with lots of data. 
F-bomb is another simple example of how you can visualise Twitter data: it just shows in real-time all tweets on earth containing the F-word.

Here you can follow where and when "Happy New Year" was tweeted.

Twitter-data and your Eurovision research project
The examples above are amusing. But the Twitter feed can be used for very ambitious projects.
The links below give you an idea how Twitter data has been used to analyse Eurovision and it’s audiences. Twitter analysts knew in advance that Laureen would be the winner in 2012.

Measuring the popularity of the contestants in the Eurovision Song Contest using Twitter  (2012)
Forecasting of Events by Tweet Data Mining (2013)
Twitter as a Technology for Audiencing and Fandom: The #Eurovision Phenomenon 
Eurovision Song Contest 2011 – tweets visualized
Eurovision and Twitter - #Eurovision the ultimate in social TV? (2009)

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google?
4. A massive database (This story)
5. Teleportation machine and collaborative notebook (upcoming)


Wednesday 9 April 2014

Lesson 6 Microblogging part 3: Twitter better search engine than Google?

Would it be a good idea to use Twitter as your main search engine?
Not really. But if you want to follow the current discussion about some topic you find the Google search engine pretty useless. Twitter again brings you the most recent arguments and news on the floor.
You can see the difference on the screenshots below. Google is powerful if you want to know about Motion Graphics in general. But if you want to know what is happening right now around Motion Graphics, Twitter is the service to use.


Google (above) gives you 50M links - too many to find fresh discussions. Twitter (below) shows the jobs available, takes you to the conferences running right now and lists the most recent industry news.


So services like Google and Twitter are both better search tools the same way bikes and trains are both more useful in satisfying specific transportation needs. You just have to identify the right tool for the job.
|||
Also please note that the Twitter search offers two handy options not introduced in Part 2 of this lesson:
All people/People you follow The latter is very handy if you remember one of the persons you follow (or yourself) has tweeted something important on the topic but you don't remember who and/or when. (Maybe you have not faced this problem yet, but don't worry; you will start forgetting things sooner or later.)
Everywhere/Near you gives you the option of searching globally or in your neighbourhood.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #)
3. A better search engine than Google? (this story)
4. A massive database (upcoming)
5. Teleportation machine and collaborative notebook (upcoming)

Tuesday 8 April 2014

Lesson 6 Microblogging part 2: A specific news channel

To be honest, for many years I did not understand the value of Twitter. But in August 2010 I was in big trouble -  then Twitter came and helped me out showing what a useful service it can be.

I was in the deep woods of eastern Finland. Can you believe there are areas in Finland with no Internet? Not even with a mobile data modem? Yes, there are such areas, even entire villages without the Internet.

Normally I can survive some time without the Net, but now Hull City had a very important game, and I just had to be able to follow the match in real time. But no chance to listen to Radio BBC Humberside match commentary over the Net in Möhkö, Ilomantsi.

Möhkö is the most eastern spot of continental EU.
(Funny that Finland, the most eastern part of EU
is said to belong to Western Europe)
In my desperation I had to try any means, so I tested Twitter over SMS. The hashtag to follow Hull City news is #hcafc. I followed the Twitter stream created by a number of Hull City friends at the stadium and I could imagine I was there with them watching the game.

Amazing. Fantastic! Spectacular!! 
Now I understood the genius of a service like Twitter: from the magnitude of streams on the Net, from the babel of billion voices I could filter only the most valuable for me at the moment.

I could create my own news channel which focused on the one and only important news stream for the moment.

Searches with or without #, saving and choosing what to see


Above you can see results of a search I made with hash tag and the search term; #eurovision. The result is a list of entries where the user has printed the # before the search term thus highlighting the importance of Eurovision in her/his tweet.

Note that you can choose between seeing all tweets or only the most important ones, and that Twitter offers you the option of saving the search.


The search above is made without the #. You can see that the result shows all tweets containing the word "eurovision", with or without the hash tag. What do you think: can it be useful to know and utilize the difference?

Other search options

Below you can find the result of another topical search this morning:


On the left side of the picture please find advanced search options:

  • Everything is the basic search showing all tweets.
  • People restricts the search to entries made by users having "ebola" in their name or user name.
  • Photos show only a list of photos attached/linked to "ebola" tweets.
  • Videos show only a list of videos attached/linked to search term tweets.
  • News shows tweets about the topic by news services.
  • Advanced search enables more search options like countries, languages, time etc.

|||
The lesson about Twitter, parts 1-5:
1. A general news channel (lists) published on April 7
2. A specific news channel (basic searches, using #) (this story)
3. A better search engine than Google? (upcoming)
4. A massive database (upcoming)
5. Teleportation machine and collaborative notebook (upcoming)

Monday 7 April 2014

Lesson 6 Microblogging part 1: General news channel

On this course we use micro-blogging to collect and share data, then process the data hoping to again learn something. The service we use is Twitter, which allows the user to share posts of length up to 140 characters.

Twitter is the Swiss army knife of Social Media and the net — you could use it to replace your email and all the social media services you use. You would not get all the special functions -  only the basic features. But then again Twitter is more.

Just to give some ideas about the ways to use Twitter I give five examples in this lesson which will be posted in five parts this week.

1. A general news channel
To be an active Twitter user you don't have to tweet at all. But you can use Twitter or similar services to keep yourself updated about whatever you are interested in. To have a general news service of what is happening you just choose some news media to follow.

For most of my life newspapers and television were my main source of news. For some years I learned most of the breaking news through Facebook. Now Twitter seems to have become my main source of news, followed by radio (the real radio!). Whatever media you follow, be sure to include many sources in your news feed, because there are no objective media, they all have an agenda to serve.

But is not a news story consisting of maximum 140 character too brief and shallow?* Yes, if the story is in that message. But news tweets are most often headlines followed by a link to a story, often with links to more in-depth background articles on the topic.

Twitter lets you create lists for different purposes.
This is my News-list which gives me an excellent
view of the news around the world.

On the picture you see a stream of news you can create on Twitter. (Go to Me/Lists/Create new list)
Here are some lists of mine you can view to get the idea:
News
Football
TAMK international media programme students

The best things about lists:
If you follow on Twitter all users you might be interested in you will find yourself in trouble; the feed is so intense you would not have time for anything else than reading your Twitter feed.

Designing lists solves this problem, here's an example: @ftransfers (footballtransfers) and @premierleague (English Premier League) are most relevant Twitter accounts for a football enthusiast like me, but they are so active they occupied a too dominant role in my Twitter feed.

My solution: I stopped being a follower of them but kept them on my Football list; and on Saturday afternoons when nothing else than football matters, I follow only my Twitter Football channel.


* And short stories are not necessarily shallow. It is told Ernest Hemingway considered this six word story one of his best works: “For sale: Baby shoes. Never worn.”

The lesson about Twitter, parts 1-5:
1. A general news channel (lists)
2. A specific news channel (hash tags)
3. A better search engine than Google?
4. A massive database
5. Teleportation machine and collaborative notebook