Twitter bomb

Summary

The term twitter bomb or tweet bomb (also spelled as one word) refers to posting numerous (pejoratively, "spamming") Tweets with the same hashtags and other similar content, including @messages, from multiple accounts, with the goal of advertising a certain meme, usually by filling people's Tweet feeds with the same message, and making it a "trending topic" on X (formerly Twitter).[1][2][3] This may be done by individual users, fake accounts, or both.[4]

Advertising edit

Twitter bombing may be used for commercial advertising. An early example from April 2005 referred to advertising a YouTube video series Ask a Ninja.[2]

Politics edit

Twitter bombing is one of the tools used in Internet activism, both by mainstream politicians like Barack Obama and by groups like Anonymous.[1][5][6]

The earliest recorded usage of the Twitter bomb is from August 2008, when it was used by bloggers Liza Sabater and Kenneth Quinnell in response to Republican use of the #dontgo hashtag relating to offshore oil drilling.[7] The term was used for other purposes in 2008, but the other meanings have since disappeared.[2]

An example of a Twitter bomb was the campaign organized by online activists in response to a July 31, 2009 Washington Post article on Hillary Clinton that was deemed sexist.[8]

In 2011, it was used extensively by Barack Obama's campaign staff to encourage his followers to contact Congress and encourage them to reach a compromise during the United States debt-ceiling crisis of 2011. Shortly thereafter, @BarackObama lost about 37,000 followers.[4]

Positive impacts edit

Twitter bombing/spamming can provide exposure to current events that are not being exposed enough from mainstream media. Dhiraj Murthy writes:

Twitter has received significant media attention in its use to disseminate information during disasters, including the 2008 Mumbai bomb blasts (Dolnick, 2005) and the January 2005 crash of US Airways flight 1549 (Beaumont, 2009).[9]

Linking this with the use of hashtag, see hashtag activism, news and information can be spread around the internet at a rapid pace with the use of hashtags.

Comparison to online spam edit

The use of the Twitter bomb tactics has been known to misfire, as people might be offended by spamming, or trolling.[2][10]

Spammers have several goals, which are phishing, advertising, or malware distribution. Unlike traditional online spamming, such as email, Twitter has a limit of only 280 characters per tweet. Therefore, a Twitter bomb often include URLs in their tweets in order to send others users to their malicious pages online.[11]

Unlike email spam, Twitter bombs may require participation from their targeted users. Fake accounts are a common source of Twitter bombs. In order to avoid Twitter's spam filters and to overcome their lack of followers, Twitter bombs are often sent as a reply to existing tweets about the same topic. This is done in hopes that the authors of the existing tweets will retweet the response to their own followers, spreading the Twitter bomb before the fake account is deleted.[12]

With regards to numbers, an example of a Twitter bomb analyzed in one research paper described how nine fake user accounts produced 929 tweets in 138 minutes, all with a URL to a political website, presenting negative views on the U.S. politician Martha Coakley.[12] The message might have reached about 60,000 before being eliminated by Twitter as spam.[13]

Criticism edit

Many Twitter users find comfort in sharing their ideas and thoughts to the general public. Though Twitter can be utilized to spread awareness of a variety of issues and causes, many can take advantage and post numerous tweets that may be viewed as spam. Twitter's rule page considers tweets "spam" once a user displays multiple tweets with unrelated hashtags to a certain topic, or continues to post multiple tweets of the same content in one account. Some instances, these tweets can be viewed as trolling once they begin to seek out other Twitter users for arguments about controversial issues.

See also edit

References edit

  1. ^ a b Mary C. Joyce (30 April 2010). Digital Activism Decoded: The New Mechanics of Change. IDEA. p. 221. ISBN 978-1-932716-60-3. Retrieved 30 April 2012.
  2. ^ a b c d Ethan Zuckerman, "The Tweetbomb and the Ethics of Attention", April 20, 2012, Last accessed on April 30, 2012.
  3. ^ J. Ratkiewicz, M. D. Conover, M. Meiss, B. Gonçalves, A. Flammini, F. Menczer, "Detecting and Tracking Political Abuse in Social Media", Proc. 5th International AAAI Conference on Weblogs and Social Media ICWSM (2011).
  4. ^ a b "37K Followers Ditch Obama After Twitter Bomb - @BarackObama tweets handles of GOP legislators, state by state". Newser. 30 July 2011. Retrieved 2012-04-30.
  5. ^ John Clifford Green; Daniel J. Coffey (1 September 2010). The State of the Parties: The Changing Role of Contemporary American Parties. Rowman & Littlefield. p. 178. ISBN 978-0-7425-9954-3. Retrieved 30 April 2012.
  6. ^ Chris Richardson (2012-04-20). "Anonymous Plans "24 Hour Tweet Bomb" To Fight CISPA". WebProNews. Retrieved 2012-04-30.
  7. ^ Kenneth Quinnell, "Twitter Bomb", Florida Speaks blog, August 5, 2008, Last accessed on August 27, 2012.
  8. ^ Mary C. Joyce (30 April 2010). Digital Activism Decoded: The New Mechanics of Change. IDEA. pp. 155–156. ISBN 978-1-932716-60-3. Retrieved 30 April 2012.
  9. ^ Murthy, Dhiraj. "Twitter: Microphone for the masses?." Media, Culture & Society 33.5 (2011): 779.
  10. ^ "Social Media Activism and the (In)justice of the Mob". Partisans. 2012-04-26. Archived from the original on 2012-05-06. Retrieved 2012-04-30.
  11. ^ Song, Jonghyuk, Sangho Lee, and Jong Kim."Spam filtering in twitter using sender-receiver relationship." Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011.
  12. ^ a b P. Metaxas, E. Mustafaraj, "From Obscurity to Prominence in Minutes: Political Speech and Real-Time Search", In: Proceedings of the WebSci10: Extending the Frontiers of Society On-Line, April 26-27th, 2010, Raleigh, NC: US (2010).
  13. ^ Neil Savage. 2011. "Twitter as Medium and Message", Communications of the ACM 54, no. 3 (March 2011), 18–20. DOI:10.1145/1897852.1897860