Social Media Examples
 

 
The table below provides links to materials which are relevant and applicable across all of the courseware in this program. For ease of access, this table is reproduced on every page of each lesson.
 
 Materials
 Web Sites   Glossary   Bibliography   Formulas   Tables   Media 
 Resources   Maps   Documents   News   GIS   Careers 
 

 
This module uses the framework for analysis to analyze several of the popular social media sites. While an extensive analysis of all of the social media applications would be prohibitive, these sites are particularly important. In total, these sites have hundreds of millions of users.
 
LinkedIn
Analysis of LinkedIn
IdentificationName: LinkedIn
URL: www.linkedin.com
ApplicationProfessional networking. Reconnects past colleagues and acquaintances. Job search and career development. Subject expertise finding.
Personal identityProfessional.
Evolved organizationThrough search users "find" other users/groups/organizations who they would like to be affiliated with. The users messages the other user/group/organization. The other user or a responsible individual at the group/organization approves the connection and a link is established.
LurkingLimited information about the member is available publicly.
Persistence Profiles, links, content, history and other information. Libraries of resources.
MembershipAnyone with a valid email address can become a member. No fees are charged.
Roles All members are equal. Groups and organizations have managers.
FundingOrganizations pay services fees , advertising
InteractionUsers have a built-in messaging capability. Groups and organizations support discussion lists.
SanctionsUsers can refuse to link to others. Users can unlink from undesirable users. LinkedIn can terminate a misbehaving user's account.
 
LinkedIn Traffic Stimulation eMail Message Examples
  • Hi Ken, I'd like to join your LinkedIn network.
  • 64 Notifications and updates from your network
    25+ new updates
    15 invitations
    3 job changes
    7 messages
  • ***** ***** has 6 new connections
  • ***** ***** invited you to connect 7 days ago.
  • You appeared in 8 searches this week
  • You were found by people from these companies
  • ***** ***** -We are HIRING would like to connect on LinkedIn. How would you like to respond?
  • You and Ronald have 3 mutual connections in common.
  • Ken, it's been a while since you last signed in to LinkedIn.
  • Congratulate **** on a work anniversary.
  • Connect with other people at Pitt.
 
Exercise:    
  • If you don't already have one, create an account on LinkedIn www.linkedin.com.
  • Create a profile for yourself.
  • Send me (sochats@pitt.edu) an invitation to connect to you.
  • Explore some of the features of LinkedIn on your own.
 

 
eBay
 
Analysis of eBay
IdentificationName: eBay
URL:www.ebay.com
ApplicationeBay is a marketplace broker. It creates permanent markets, called Stores, and on-line auctions
Personal identityMy eBay is a home for all transactions, preferences and other personal data for a user.
Evolved organizationUsers have organized themselves into hundreds of categories from Antiques to Toys. Specialized marketplaces for items such as real estate, vehicles and other items have evolved.
LurkingAnyone can view an auction or browse a store.
PersistenceComplete histories for buyers, sellers and goods.
MembershipUsers need to have an account (bank, credit, PayPal, etc.) which can be charged
Roles Buyer or seller. There are multiple classes fo sellers based on user feedback.
FundingTransaction fees, advertizing
InteractionSellers offer goods for sale and buyers bid on them.
SanctionsBased on user feedback sellers may be banished. Individual items may be withdrawn.
 
Examples of emergency management items found on eBay:
  • Fire Trucks
  • ambulances
  • Face Masks
  • Face Mask Cartridges
  • Fire Extinguisher
  • Bunker Gear
  • Bulletproof Vests
  • Hazmat
  • Medical Supplies/Equipment
  • Police
  • Naloxone
  •  

     
    WikipediA
    Analysis of Wikipedia
    IdentificationName: WikipediA
    URL:www.wikipedia.org
    ApplicationOnline user-edited encyclopedia.
    Personal identityEditors have accounts.
    Evolved organizationTerms are linked by usage and reference.
    LurkingAnyone can read WikipediA
    PersistenceHistoriees of edits are kept.
    MembershipAnyone can create an account.
    Roles Users are readers or editors.
    InteractionAny term may be updated at any time.
    SanctionsMisbehavine users caan be banished from the ssite.
     
    Walter Isaacson

    Einstein: His Life and Universe

    Simon & Schuster

    New York, 2007

    ISBN: 0-7432-6473-8

    www.amazon.com/Einstein-Life-Universe-Walter-Isaacson/dp/1847370489
     
     
    I had done a book about Albert Einstein and noticed that the Wikipedia entry on him claimed that he had traveled to Albania in 1935 so that King Zog could help him escape the Nazis by getting him a visa to the United States. This was completely untrue, even though the passage included citations to obscure Albanian websites where this was proudly proclaimed, usually based on some third-hand series of recollections about what someone’s uncle once said a friend had told him. I deleted the assertion from the article, only to watch it reappear.
     
    On the discussion page, I provided sources for where Einstein actually was during the time in question (Princeton) and what passport he was using (Swiss). But tenacious Albanian partisans kept reinserting the claim. The Einstein-in-Albania tug-of-war lasted weeks. I became worried that the obstinacy of a few passionate advocates could undermine Wikipedia’s reliance on the wisdom of crowds. But after a while, the edit wars ended, and the article no longer had Einstein going to Albania.
     
    Example searches on WikimediA
    • University of Pittsburgh
    • Chick-fil-A
    • Hobby Lobby
    • Vaccine
     

     
     
    Facebook
    Analysis of Facebook
    IdentificationName: Facebook
    URL:www.facebook.com
    ApplicationSocial Networking
    Personal identityUsers have named accounts. Organizations and groups can have accounts.
    Evolved organizationBy linking to each other, users form a social network. Users can determine who can link to them and what may be shown/shared.
    LurkingLimited.
    PersistenceAll data about a user/organization/group is maintained.
    MembershipNone.
    Roles All user entities essentially are the same and equal.
    FundingFees and advertising, sales of data
    InteractionUsers can link, message and email each other.
    SanctionsMisbehaving users can be banished from the site. Individual users can unlink to other users.
     
    Facebook has had many problems with regulators in the United States and other countries, particularly the European Union. Most of these problems have centered around the protection of the private data of users, advertising policies and antitrust behavior. See for example: FTC Consent Decree.
     
    A congressional commitee is currently investigating the behavior of social media firms. The CEOs of Facebook, Twitter, amazon and others have been called to testify.
     
    In 2020, FTC Sues Facebook for Illegal Monopolization See FTC site.

    Participating Attorneys General include: Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, the District of Columbia, Florida, Guam, Hawaii, Idaho, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, and Wyoming.
     
    Interestingly, law enforcement has become increasingly interested in using social media as a tool. The criminal culture is one that often lives outside the mainstream. They don't get married, register to vote, get a drivers' license or behave in ways which would create data on them.

    However, because of the machismo culture of gangs, illlegals and others, they regularly post information which aids in their apprehension.

    Some examples include:
    • Street Names (e.g. Smoke, TayTay, Little Man, etc.)
    • Relationships (baby daddy, baby mama)
    • Accomplices (peeps)
    • Pictures
      • Tatoos
      • Piercings
      • Teeth (gold, diamonds, missing)
      • Hair (dreads, colors, afros, mullets)
      • Jewelry (bling)
      • Clothes (colors)
      • Cars
      • Weapons
      • Drugs
    • Brags about crimes
    Some examples of law enforcement use of social and other media include:
    • A drug deal that went bad occurred on a crowded street in New Orleans, Louisiana. A gun battle erupted between the buyers and sellers. Four shooters were involved. Five innocent bystanders were killed and injured. One of the shooters was identified by a witness. Street cameras caught some of the action, but as it was evening, the images wer fuzzy. The NOPD looked up the identified perpetrator on Facebook and discoverd a picture of the suspect with his arms around his two unidentified accomplices. Their names were given in the picture tagline. All three were convicted of murder.

    • Tulsa, Oklahoma police were able to identify the body of a badly burned corpse through the tatoo on an arm of the victim that was not burned. That identification led to the conviction of his murderer.

    • In Iowa City, Iowa a teenage girl was attacked and murdered outside a local mall. DNA evidence was recovered from underneath her fingernails. The local police submitted the evidence to the CODIS system (Combined DNA Index System) CODIS maintained by the FBI. The search resulted in no hits. The police then tried a search on an ancestry service. The result was a familial match to a woman living in Oregon. It was discovered that the woman prviously lived in Iowa City and had three sons who were still living in the area. A court order was issued compelling each of the three sons to submit a DNA sample. One of the sons was a match and was subsequently convicted of the murder.

    • In Texas a man was murdered in his hot tub. On a stand next to the hot was an Amazon Alexa. The district attorney issued an order to produce any recordings from the device. Amazon was not forthcoming.
     
    Facebook has been associated with many crimes. See www.robertreeveslaw.com.
     

     
    Twitter
    Analysis of Twitter
    IdentificationName: Twitter
    URL:www.twitter.com
    ApplicationSocial network messaaging.
    Personal identityNamed account.
    Evolved organizationUsers "follow" other users by attaching themselves to that user's tweet stream.
    LurkingTweets are public by default.
    PersistenceProfiles and tweet history.
    MembershipAccounts with profiles.
    Roles Tweeteer and follower.
    InteractionUsers send 140 character messages (tweets).
    SanctionsUsers can have their accounts disabled. Users can "unfollow" users.

     
    YouTube
    Analysis of YouTube
    IdentificationName: YouTube
    URL:www.youtube.com
    ApplicationVideo sharing library.
    Personal identityThrough registration users create profiles.
    Evolved organizationSearch engines categorize videos.
    LurkingUnregistered users can watch videos.
    PersistenceHuge video library.
    MembershipNone.
    Roles Publishers and viewers.
    www.youtube.com
    Sample Videos

    Emergency Videos

     
    Second Life
    Analysis of Second Life
    IdentificationName: Second Life
    URL:www.secondlife.com
    ApplicationVirtual reality experimental world.
    Personal identityUsers are represented by avatars and their characteristics.
    Evolved organizationUser determined. Real estate, commerce, goods, events, etc. have evolved.
    LurkingNot permitted
    PersistenceThe world is maintained on linked servers.
    MembershipWhat are the prerequisites for membership/participation
    Roles User roles are self defined. Users can be animals if they want.
    InteractionAvatars can interact much as humans.
    SanctionsThere are no rules in Second Life.
     
    Avatars
     
          

    Ken's Avatars
     
          

     
          

     


    Animal Avatars
     


    Vehicle Avatars
     


    Robot Avatars
     


    Vampire Avatars
     
    Environments
     


    Fantasy World
     


    Forbidden Palace
     


    Forbidden Palace Courtyard
     


    Forbidden Palace Interior
     


    IBM Training Facility
     


    Jet Propulsion Laboratories
     


    Texas A&M
     


    Nottingham University
     


    Virtual Classroom
     
    Second Life Marketplace marketplace.secondlife.com
     
    Buildings
     


    Gothic Watchtower - L$2950
     


    Contemporary House - L$1450
     
    Clothes
     


    Kerry Heels - L$299
     


    Larry Jeans - L$99
     


    Pregnant Dress - L$55
     


    Cropped Hoodie - L$1
     


    Second Life Class Group Assignment
     
    Second Life Problems
     
    Second Life has experienced a number of problems that we encounter in First Life including but not limited to:
    • Sex
    • Vices
      • Gambling
      • Prostitution
    • Murder
      • Second Life
      • First Life
    • Crime
      • Theft
      • Fraud
    • Riots

     
    Delicious
    Analysis of Delicious
    IdentificationName: Delicious
    URL:www.delicious.com
    ApplicationWeb site recommending and popularity.
    Personal identityAccounts.
    Evolved organizationCategorized topics that evolve via user input..
    LurkingPermitted.
    PersistenceIndexes of popular web sites.
    MembershipOpen.
    Roles Readers and Recommenders.
    InteractionUsers read the recommended links of others.
    SanctionsMisbehaving users may lose their priviledges.

     
    Digg
    Analysis of Digg
    IdentificationName: Digg
    URL:www.digg.com
    ApplicationSocial news and commentary.
    Personal identityAccounts.
    Evolved organizationUser directed indexing.
    LurkingPermitted.
    PersistenceIndexes of popular news items.
    MembershipOpen.
    Roles Readers and Posters.
    InteractionUsers read the recommended links of others.
    SanctionsMisbehaving users may lose their priviledges.
     

    Notice the graphics and organization of these web sites. High quality graphics are used to create a "home".

    Exercise:     Use the analysis framework to analyze the social media site Trapster: www.trapster.com.
     
    Resources:     Social Media Directory http://socialmediadirectory.org/

    Social Media Websites www.socialmediawebsites.com

                  
    Copyright © 2011, 2024 Ken Sochats