SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Social Media and
Citizen Security in
Mexico
Kristen Blandford, Rosemary D'Amour,
Kathleen Leasor, Allison Terry,
Isadora Vigier de Latour
                   SoMe enVivo @some_envivo
A changing security environment...
•  How are social media platforms being used
  in response to security needs?

•  Hypothesis: Civil society, media workers,
  and government are adapting security
  reporting to social media platforms because
  they meet needs of post-2006 security
  environment
Methodology
•  Public Sphere and Knowledge Dynamics
  Model

•  Network Analysis
•  Twitter Analytics
•  Content Analysis
•  Case Studies
Public Sphere




•  Political/Rhetorical Speech
•  Political Outcomes/Raised Awareness
•  New?
Knowledge Dynamics
•  Knowledge
  Conversion

•  Knowledge
  Transfer

•  Information vs
  Knowledge
                      Image from Naoka 1994
Methodological Tools
•  Structure and Content
•  Networks: Nodes, Information Flows, Top
  Users

•  Analytics: Tweet Volume, Tweets:Retweets
•  Content: Coding for Keywords, Top Words
Movimiento por la Paz
•  Statistics
•  MPJD - most popular
     social movement, why?
•    Characteristics of a
     leader, Javier Sicilia
•    Moving north - peace
     caravan
                                                   MarchaZocaloDF8mayo




                              Pictures obtained from image gallery of
                              Movimiento por la Paz website:
                              http://mxlapazmx.views.fm/Galeria
MPJD in the Public Sphere
Findings
•  Rhetorical Public Sphere
•  Online and offline action by MPJD: increase
   attention and awareness
•  Twitter more popular. Use of #hastlamadre
•  2-way communication
•  Affiliation with U.S NGO via Social Media
•  Judgement formed to and from the
   movement
Statistical Data

Twitter Handle   Hashtags              No. of          No. of tweets Facebook
                                       followers                     likes



@mxlapazmx       #MPJD,                 6147           5655                  4964
                 #justiciaparanuevoleon
                 #enloszapatosdelotro
                 #dondeestan
                 #Sicilia
                 #CaravanaUSA
                                       Twitter and Facebook Statistics for MPJD as of 04.26.2012




                                                                       *Very rapid increase in no. of
                                                                                 followers for MPJD
Twitter Analytics Figure 1.




                       Image from The Archivist
                       @mxlapazmx
Blog del Narco

Twitter Handle   Hashtags          No. of      Following Tweets vs.
                                   followers             Retweets

@infonarco       #verfollow        104,869     0         Tweets: 40.26%
                 #mtyfollow
                 #reyonsafollow                          Retweets:59.74%
                 #elblogdelnarco
Figure 1

                                   •  Analysis: Not following anyone
                                      so they can stay anonymous
                                   •  Re-tweets only from followers,
                                      not the account
Blog del Narco
•  Network Analysis- Events




Figure 3
Blog del Narco
 o    March 28, 2012: Z40 quarters 5 men as an assault
      on el Chapo Guzman in Sinaloa

 o    April 18, 2012: This is when there was the largest
      amount of activity on the @InfoNarco Twitter
      account. On this day, Joaquin Guzman Loera, aka El
      Chapo Guzman leader of los Zetas, claimed
      responsibility for dismembering 14 Z40 members in
      Nuevo Laredo.
Blog del Narco
Findings

•  Credible, reliable, and alternative solution to
   government and traditional media

•  Mexicans use this blog as new public sphere to report
   public safety concerns- two-way flow of information
   o  Keeping anonymous and timeliness=crucial


•  Altering who gatekeeper of narco-related security
   information is onto civil society
The New Journalism

•  Changing media environment
  o    Adapting to immediacy of information flow


•  Comparison between media
  (@periodistasapie) and other users online
  o    NodeXL to compare information flow of hashtags,
       individual users, and media on Twitter.
The New Journalism
Image: CSO @CIC within   Image: Individual user,
  #mtyfollow               @erikam within
                           #mtyfollow
The New Journalism
                                 Image: @periodistasapie
•    Three-step process by
     which users in the
     network receive
     information.
      a. News organizations
         disseminate
         information
      b. Conversation with
         users and followers
      c. Users spread to their
         followers
The New Journalism


Image: First stage
of connectivity in
@periodistasapie
network.
The New Journalism


Image: Second stage in
  @periodistasapie.
The New Journalism


Image: Third stage in
  @periodistasapie.
The New Journalism
•  News organizations carrying an established
  offline identity into the online realm.
   o    Connectivity trumps individual users.


•  Role of media to report issues of public
  importance--but Mexico's security context
  has changed that.
  o  Anonymity in or omission of reporting.
The New Journalism
@periodistasapie top users, most of whom are individual users or organizations
  who are interested in the journalists’ network.
The New Journalism
@periodistasapie: Tweets vs. Retweets means within the network, the majority of content is not
   original, but that it reaches far into the network.
The New Journalism
•    #reynosafollow contains more original content.
The New Journalism
@periodistasapie tweets: Spikes in the graph indicate that more information or
  users are following the source.
Media Findings

•    Journalists are unable or unwilling to use offline identity
     to their advantage in reporting on social media.


•  Rather than reporting on violence, journalists and media
     institutions are reporting on ways to enable them to
     report on violence and citizen security.


•  Social media provides organizational network power,
     and can be an enabling tool to combat the decentralized
     nature of the drug war.
Government and Social Media
Policy
•  Phases
   •  December 2006-August 2011
   •  August 2011-present
•  Leveraging social media networks as
     security strategy - untapped
•    Access to information and protecting
     messengers
•    Changes in dissemination, not conversation
@SSP_mx Network Sample (N=100)




                     @ssp_mx
                     following: 44
                     followers: 41,199
                     Created with NodeXL
@SSP_mx Information Flows




                       Created with NodeXL
Top Users




            Image from the Archivist
Twitter Analytics
Twitter Volume Over Time




                     Image from the Archivist
Content @SSP_mx




TOTA
LAPRIL
FEBRUARY
Tweets:Retweets @SSP_mx

95% of
content is
unoriginal



                   Image from the Archivist
Original Content
•  BuscandoaAlex


•  USB-gate


•  The odd complaint, denunciation, praise, or
  opinion
Secretaría de Seguridad Pública
•  Federal Police - security updates
•  Low volume of tweets from SSP
•  Decentralized network
•  Limited control over information flows
•  Contribute significantly to content
Outputs @SSP_mx
•  Information dissemination

•  Raise awareness
•  Limited discourse
•  Weak rhetorical public sphere
                               Image from NoticiasenLínea
Overall Findings
•  Potential democratizing force in citizen
  security context enables communication
  between governors, media, civil society and
  individuals.

•  Changing "gatekeepers" of information.
•  Two challenges to social media and citizen
  security:
   o    Connectivity, virtual digital divide
   o    Decentralized security context
Implications for Further Research
•  How to connect excluded populations?
  Especially those in rural areas where the
  majority of the drug violence is occurring.

•  How can these three sectors coordinate the
  exchange of information in social media
  networks?
Thank you for your attention!

Questions?

Contact:
someenvivo.wordpress.com
some.envivo.mx@gmail.com
@some_envivo

Contenu connexe

Tendances

A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...
A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...
A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...Yandex
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top ModelRachel Reis Mourao
 
Opinion mining for social media
Opinion mining for social mediaOpinion mining for social media
Opinion mining for social mediaDiana Maynard
 
Crimson Hexagon Leadership Press Examples
Crimson Hexagon Leadership Press ExamplesCrimson Hexagon Leadership Press Examples
Crimson Hexagon Leadership Press ExamplesWayne_Saint
 
NSA Tweets Rohit kumar
NSA Tweets Rohit kumarNSA Tweets Rohit kumar
NSA Tweets Rohit kumarRohit Kumar
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection projectHarshdaGhai
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPTChhavi Mathur
 
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...Shalin Hai-Jew
 
Prime "Social" Ministers - Angela Merkel Analysis
Prime "Social" Ministers - Angela Merkel AnalysisPrime "Social" Ministers - Angela Merkel Analysis
Prime "Social" Ministers - Angela Merkel AnalysisDOING
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?Axel Bruns
 
Prime "Social" Ministers - Mariano Rajoy Analysis
Prime "Social" Ministers - Mariano Rajoy AnalysisPrime "Social" Ministers - Mariano Rajoy Analysis
Prime "Social" Ministers - Mariano Rajoy AnalysisDOING
 
U.S. Religious Landscape on Twitter
U.S. Religious Landscape on TwitterU.S. Religious Landscape on Twitter
U.S. Religious Landscape on TwitterLu Chen
 
Prime "Social" Ministers - Matteo Renzi Analysis
Prime "Social" Ministers - Matteo Renzi AnalysisPrime "Social" Ministers - Matteo Renzi Analysis
Prime "Social" Ministers - Matteo Renzi AnalysisDOING
 
Prime "Social" Ministers - Alexis Tsipras Analysis
Prime "Social" Ministers - Alexis Tsipras AnalysisPrime "Social" Ministers - Alexis Tsipras Analysis
Prime "Social" Ministers - Alexis Tsipras AnalysisDOING
 
Prime "Social" Ministers - François Hollande Analysis
Prime "Social" Ministers - François Hollande AnalysisPrime "Social" Ministers - François Hollande Analysis
Prime "Social" Ministers - François Hollande AnalysisDOING
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1Dave King
 
Kathryn korostoff presenting - 2011
Kathryn korostoff   presenting - 2011Kathryn korostoff   presenting - 2011
Kathryn korostoff presenting - 2011Ray Poynter
 
Curating and Contextualizing Twitter Stories to Assist with Social Newsgathering
Curating and Contextualizing Twitter Stories to Assist with Social NewsgatheringCurating and Contextualizing Twitter Stories to Assist with Social Newsgathering
Curating and Contextualizing Twitter Stories to Assist with Social Newsgatheringazubiaga
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...Nicholas Tancredi
 

Tendances (20)

A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...
A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...
A Dream of Predicting Elections and Trading Stocks using Twitter - Yelena Mej...
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top Model
 
I love Big Bird
I love Big Bird I love Big Bird
I love Big Bird
 
Opinion mining for social media
Opinion mining for social mediaOpinion mining for social media
Opinion mining for social media
 
Crimson Hexagon Leadership Press Examples
Crimson Hexagon Leadership Press ExamplesCrimson Hexagon Leadership Press Examples
Crimson Hexagon Leadership Press Examples
 
NSA Tweets Rohit kumar
NSA Tweets Rohit kumarNSA Tweets Rohit kumar
NSA Tweets Rohit kumar
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
 
Social media mining PPT
Social media mining PPTSocial media mining PPT
Social media mining PPT
 
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...
Understanding Public Sentiment: Conducting a Related-Tags Content Network Ext...
 
Prime "Social" Ministers - Angela Merkel Analysis
Prime "Social" Ministers - Angela Merkel AnalysisPrime "Social" Ministers - Angela Merkel Analysis
Prime "Social" Ministers - Angela Merkel Analysis
 
Are Filter Bubbles Real?
Are Filter Bubbles Real?Are Filter Bubbles Real?
Are Filter Bubbles Real?
 
Prime "Social" Ministers - Mariano Rajoy Analysis
Prime "Social" Ministers - Mariano Rajoy AnalysisPrime "Social" Ministers - Mariano Rajoy Analysis
Prime "Social" Ministers - Mariano Rajoy Analysis
 
U.S. Religious Landscape on Twitter
U.S. Religious Landscape on TwitterU.S. Religious Landscape on Twitter
U.S. Religious Landscape on Twitter
 
Prime "Social" Ministers - Matteo Renzi Analysis
Prime "Social" Ministers - Matteo Renzi AnalysisPrime "Social" Ministers - Matteo Renzi Analysis
Prime "Social" Ministers - Matteo Renzi Analysis
 
Prime "Social" Ministers - Alexis Tsipras Analysis
Prime "Social" Ministers - Alexis Tsipras AnalysisPrime "Social" Ministers - Alexis Tsipras Analysis
Prime "Social" Ministers - Alexis Tsipras Analysis
 
Prime "Social" Ministers - François Hollande Analysis
Prime "Social" Ministers - François Hollande AnalysisPrime "Social" Ministers - François Hollande Analysis
Prime "Social" Ministers - François Hollande Analysis
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1
 
Kathryn korostoff presenting - 2011
Kathryn korostoff   presenting - 2011Kathryn korostoff   presenting - 2011
Kathryn korostoff presenting - 2011
 
Curating and Contextualizing Twitter Stories to Assist with Social Newsgathering
Curating and Contextualizing Twitter Stories to Assist with Social NewsgatheringCurating and Contextualizing Twitter Stories to Assist with Social Newsgathering
Curating and Contextualizing Twitter Stories to Assist with Social Newsgathering
 
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...Digital Breadcrumbs-  Investigating Internet Crime with Open Source Intellige...
Digital Breadcrumbs- Investigating Internet Crime with Open Source Intellige...
 

En vedette

Implikasi konsep keperluan dlm amalan bilik darjsh[2]
Implikasi konsep keperluan dlm amalan bilik darjsh[2]Implikasi konsep keperluan dlm amalan bilik darjsh[2]
Implikasi konsep keperluan dlm amalan bilik darjsh[2]Tan Fen
 
Edu tech powerpoint
Edu tech powerpointEdu tech powerpoint
Edu tech powerpointhaileejo40
 
Animal research project
Animal research projectAnimal research project
Animal research projecthaileejo40
 
四年级科学全年计划 Sains thn4
四年级科学全年计划 Sains thn4四年级科学全年计划 Sains thn4
四年级科学全年计划 Sains thn4Tan Fen
 
Tmk tahun
Tmk tahunTmk tahun
Tmk tahunTan Fen
 
Tugasan waj3106 etnik
Tugasan waj3106 etnikTugasan waj3106 etnik
Tugasan waj3106 etnikTan Fen
 
Container communication on lattice #2
Container communication on lattice #2Container communication on lattice #2
Container communication on lattice #2Kenta Shinohara
 
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis air
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis airBiologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis air
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis airUwak Vadzla
 
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이 왜 이리 힘드나요? (Lock-free에서 Transactional Memory까지)
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이  왜 이리 힘드나요?  (Lock-free에서 Transactional Memory까지)Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이  왜 이리 힘드나요?  (Lock-free에서 Transactional Memory까지)
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이 왜 이리 힘드나요? (Lock-free에서 Transactional Memory까지)내훈 정
 
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?내훈 정
 

En vedette (18)

Implikasi konsep keperluan dlm amalan bilik darjsh[2]
Implikasi konsep keperluan dlm amalan bilik darjsh[2]Implikasi konsep keperluan dlm amalan bilik darjsh[2]
Implikasi konsep keperluan dlm amalan bilik darjsh[2]
 
Chapter 8, objective
Chapter 8, objectiveChapter 8, objective
Chapter 8, objective
 
Poverty
PovertyPoverty
Poverty
 
Edu tech powerpoint
Edu tech powerpointEdu tech powerpoint
Edu tech powerpoint
 
Seminar.health.workshop.
Seminar.health.workshop.Seminar.health.workshop.
Seminar.health.workshop.
 
Chapter 8, objective
Chapter 8, objectiveChapter 8, objective
Chapter 8, objective
 
Chapter 8, objective
Chapter 8, objectiveChapter 8, objective
Chapter 8, objective
 
Animal research project
Animal research projectAnimal research project
Animal research project
 
四年级科学全年计划 Sains thn4
四年级科学全年计划 Sains thn4四年级科学全年计划 Sains thn4
四年级科学全年计划 Sains thn4
 
KARYA ILMIAH
KARYA ILMIAHKARYA ILMIAH
KARYA ILMIAH
 
Tmk tahun
Tmk tahunTmk tahun
Tmk tahun
 
Tugasan waj3106 etnik
Tugasan waj3106 etnikTugasan waj3106 etnik
Tugasan waj3106 etnik
 
Histopathreport
HistopathreportHistopathreport
Histopathreport
 
Container communication on lattice #2
Container communication on lattice #2Container communication on lattice #2
Container communication on lattice #2
 
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis air
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis airBiologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis air
Biologi=penelitian pengaruh pertumbuhan kacang hijau oleh jenis air
 
Ndc12 2
Ndc12 2Ndc12 2
Ndc12 2
 
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이 왜 이리 힘드나요? (Lock-free에서 Transactional Memory까지)
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이  왜 이리 힘드나요?  (Lock-free에서 Transactional Memory까지)Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이  왜 이리 힘드나요?  (Lock-free에서 Transactional Memory까지)
Ndc2014 시즌 2 : 멀티쓰레드 프로그래밍이 왜 이리 힘드나요? (Lock-free에서 Transactional Memory까지)
 
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?
시즌 2: 멀티쓰레드 프로그래밍이 왜이리 힘드나요?
 

Similaire à Social Media and Security in Mexico

The Media Zones Where People Live And How To Connect With Them
The Media Zones Where People Live And How To Connect With ThemThe Media Zones Where People Live And How To Connect With Them
The Media Zones Where People Live And How To Connect With ThemKDMC
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Dataconomy Media
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
The language of social media
The language of social mediaThe language of social media
The language of social mediaDiana Maynard
 
The State of Social 2017
The State of Social 2017The State of Social 2017
The State of Social 2017tracx
 
The Social Web's Impact on Politics and Public Policy
The Social Web's Impact on Politics and Public PolicyThe Social Web's Impact on Politics and Public Policy
The Social Web's Impact on Politics and Public PolicyThe Glover Park Group
 
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...Automated Analysis of Journalists' and Politicians' Online Behavior on Social...
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...University of Groningen (The Netherlands)
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Christie Wilcox
 
Social Media and the U.S. Election: Producing the Campaign
Social Media and the U.S. Election: Producing the CampaignSocial Media and the U.S. Election: Producing the Campaign
Social Media and the U.S. Election: Producing the CampaignJanelle Ward
 
Big data dan riset sosial dan politik
Big data dan riset sosial dan politikBig data dan riset sosial dan politik
Big data dan riset sosial dan politikWidy Widyawan
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsMark Schaefer
 
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjb
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjbMEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjb
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjbMaryJoyPeralta
 
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Farida Vis
 
Josh de coster slideshare presentation
Josh de coster slideshare presentationJosh de coster slideshare presentation
Josh de coster slideshare presentationJoshua DeCoster
 
Leveraging Social Media Skills
Leveraging Social Media Skills Leveraging Social Media Skills
Leveraging Social Media Skills GovLoop
 

Similaire à Social Media and Security in Mexico (20)

The Media Zones Where People Live And How To Connect With Them
The Media Zones Where People Live And How To Connect With ThemThe Media Zones Where People Live And How To Connect With Them
The Media Zones Where People Live And How To Connect With Them
 
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
Data Natives Munich v 12.0 | "Political Data Science: A tale of Fake News, So...
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
The language of social media
The language of social mediaThe language of social media
The language of social media
 
The State of Social 2017
The State of Social 2017The State of Social 2017
The State of Social 2017
 
The Social Web's Impact on Politics and Public Policy
The Social Web's Impact on Politics and Public PolicyThe Social Web's Impact on Politics and Public Policy
The Social Web's Impact on Politics and Public Policy
 
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...Automated Analysis of Journalists' and Politicians' Online Behavior on Social...
Automated Analysis of Journalists' and Politicians' Online Behavior on Social...
 
BOLO2010 Lawrence
BOLO2010 LawrenceBOLO2010 Lawrence
BOLO2010 Lawrence
 
Media techsoc
Media techsocMedia techsoc
Media techsoc
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014
 
Social Media and the U.S. Election: Producing the Campaign
Social Media and the U.S. Election: Producing the CampaignSocial Media and the U.S. Election: Producing the Campaign
Social Media and the U.S. Election: Producing the Campaign
 
Big data dan riset sosial dan politik
Big data dan riset sosial dan politikBig data dan riset sosial dan politik
Big data dan riset sosial dan politik
 
Presentacion defensa marcelo_2018_v01
Presentacion defensa marcelo_2018_v01Presentacion defensa marcelo_2018_v01
Presentacion defensa marcelo_2018_v01
 
Social Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-TrendsSocial Media and Government: Five Mega-Trends
Social Media and Government: Five Mega-Trends
 
The Media Zones Where People Live
The Media Zones Where People LiveThe Media Zones Where People Live
The Media Zones Where People Live
 
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjb
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjbMEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjb
MEDIA AND INFORMation hsvhvkdbkbjbjbjbkjbknbbkjbkjjb
 
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
Twitter analytics: some thoughts on sampling, tools, data, ethics and user re...
 
Josh de coster slideshare presentation
Josh de coster slideshare presentationJosh de coster slideshare presentation
Josh de coster slideshare presentation
 
Leveraging Social Media Skills
Leveraging Social Media Skills Leveraging Social Media Skills
Leveraging Social Media Skills
 

Dernier

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Dernier (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Social Media and Security in Mexico

  • 1. Social Media and Citizen Security in Mexico Kristen Blandford, Rosemary D'Amour, Kathleen Leasor, Allison Terry, Isadora Vigier de Latour SoMe enVivo @some_envivo
  • 2. A changing security environment... •  How are social media platforms being used in response to security needs? •  Hypothesis: Civil society, media workers, and government are adapting security reporting to social media platforms because they meet needs of post-2006 security environment
  • 3. Methodology •  Public Sphere and Knowledge Dynamics Model •  Network Analysis •  Twitter Analytics •  Content Analysis •  Case Studies
  • 4. Public Sphere •  Political/Rhetorical Speech •  Political Outcomes/Raised Awareness •  New?
  • 5. Knowledge Dynamics •  Knowledge Conversion •  Knowledge Transfer •  Information vs Knowledge Image from Naoka 1994
  • 6. Methodological Tools •  Structure and Content •  Networks: Nodes, Information Flows, Top Users •  Analytics: Tweet Volume, Tweets:Retweets •  Content: Coding for Keywords, Top Words
  • 7. Movimiento por la Paz •  Statistics •  MPJD - most popular social movement, why? •  Characteristics of a leader, Javier Sicilia •  Moving north - peace caravan MarchaZocaloDF8mayo Pictures obtained from image gallery of Movimiento por la Paz website: http://mxlapazmx.views.fm/Galeria
  • 8. MPJD in the Public Sphere Findings •  Rhetorical Public Sphere •  Online and offline action by MPJD: increase attention and awareness •  Twitter more popular. Use of #hastlamadre •  2-way communication •  Affiliation with U.S NGO via Social Media •  Judgement formed to and from the movement
  • 9. Statistical Data Twitter Handle Hashtags No. of No. of tweets Facebook followers likes @mxlapazmx #MPJD, 6147 5655 4964 #justiciaparanuevoleon #enloszapatosdelotro #dondeestan #Sicilia #CaravanaUSA Twitter and Facebook Statistics for MPJD as of 04.26.2012 *Very rapid increase in no. of followers for MPJD
  • 10. Twitter Analytics Figure 1. Image from The Archivist @mxlapazmx
  • 11. Blog del Narco Twitter Handle Hashtags No. of Following Tweets vs. followers Retweets @infonarco #verfollow 104,869 0 Tweets: 40.26% #mtyfollow #reyonsafollow Retweets:59.74% #elblogdelnarco Figure 1 •  Analysis: Not following anyone so they can stay anonymous •  Re-tweets only from followers, not the account
  • 12. Blog del Narco •  Network Analysis- Events Figure 3
  • 13. Blog del Narco o  March 28, 2012: Z40 quarters 5 men as an assault on el Chapo Guzman in Sinaloa o  April 18, 2012: This is when there was the largest amount of activity on the @InfoNarco Twitter account. On this day, Joaquin Guzman Loera, aka El Chapo Guzman leader of los Zetas, claimed responsibility for dismembering 14 Z40 members in Nuevo Laredo.
  • 14. Blog del Narco Findings •  Credible, reliable, and alternative solution to government and traditional media •  Mexicans use this blog as new public sphere to report public safety concerns- two-way flow of information o  Keeping anonymous and timeliness=crucial •  Altering who gatekeeper of narco-related security information is onto civil society
  • 15. The New Journalism •  Changing media environment o  Adapting to immediacy of information flow •  Comparison between media (@periodistasapie) and other users online o  NodeXL to compare information flow of hashtags, individual users, and media on Twitter.
  • 16. The New Journalism Image: CSO @CIC within Image: Individual user, #mtyfollow @erikam within #mtyfollow
  • 17. The New Journalism Image: @periodistasapie •  Three-step process by which users in the network receive information. a. News organizations disseminate information b. Conversation with users and followers c. Users spread to their followers
  • 18. The New Journalism Image: First stage of connectivity in @periodistasapie network.
  • 19. The New Journalism Image: Second stage in @periodistasapie.
  • 20. The New Journalism Image: Third stage in @periodistasapie.
  • 21. The New Journalism •  News organizations carrying an established offline identity into the online realm. o  Connectivity trumps individual users. •  Role of media to report issues of public importance--but Mexico's security context has changed that. o  Anonymity in or omission of reporting.
  • 22. The New Journalism @periodistasapie top users, most of whom are individual users or organizations who are interested in the journalists’ network.
  • 23. The New Journalism @periodistasapie: Tweets vs. Retweets means within the network, the majority of content is not original, but that it reaches far into the network.
  • 24. The New Journalism •  #reynosafollow contains more original content.
  • 25. The New Journalism @periodistasapie tweets: Spikes in the graph indicate that more information or users are following the source.
  • 26. Media Findings •  Journalists are unable or unwilling to use offline identity to their advantage in reporting on social media. •  Rather than reporting on violence, journalists and media institutions are reporting on ways to enable them to report on violence and citizen security. •  Social media provides organizational network power, and can be an enabling tool to combat the decentralized nature of the drug war.
  • 27. Government and Social Media Policy •  Phases •  December 2006-August 2011 •  August 2011-present •  Leveraging social media networks as security strategy - untapped •  Access to information and protecting messengers •  Changes in dissemination, not conversation
  • 28. @SSP_mx Network Sample (N=100) @ssp_mx following: 44 followers: 41,199 Created with NodeXL
  • 29. @SSP_mx Information Flows Created with NodeXL
  • 30. Top Users Image from the Archivist
  • 32. Twitter Volume Over Time Image from the Archivist
  • 34. Tweets:Retweets @SSP_mx 95% of content is unoriginal Image from the Archivist
  • 35. Original Content •  BuscandoaAlex •  USB-gate •  The odd complaint, denunciation, praise, or opinion
  • 36. Secretaría de Seguridad Pública •  Federal Police - security updates •  Low volume of tweets from SSP •  Decentralized network •  Limited control over information flows •  Contribute significantly to content
  • 37. Outputs @SSP_mx •  Information dissemination •  Raise awareness •  Limited discourse •  Weak rhetorical public sphere Image from NoticiasenLínea
  • 38. Overall Findings •  Potential democratizing force in citizen security context enables communication between governors, media, civil society and individuals. •  Changing "gatekeepers" of information. •  Two challenges to social media and citizen security: o  Connectivity, virtual digital divide o  Decentralized security context
  • 39. Implications for Further Research •  How to connect excluded populations? Especially those in rural areas where the majority of the drug violence is occurring. •  How can these three sectors coordinate the exchange of information in social media networks?
  • 40. Thank you for your attention! Questions? Contact: someenvivo.wordpress.com some.envivo.mx@gmail.com @some_envivo