{"id":240,"date":"2020-04-26T15:00:45","date_gmt":"2020-04-26T07:00:45","guid":{"rendered":"https:\/\/networkconference.netstudies.org\/2020OUA\/?p=240"},"modified":"2020-04-26T15:11:26","modified_gmt":"2020-04-26T07:11:26","slug":"twitter-terrorism","status":"publish","type":"post","link":"https:\/\/networkconference.netstudies.org\/2020OUA\/2020\/04\/26\/twitter-terrorism\/","title":{"rendered":"Twitter terrorism"},"content":{"rendered":"\nAbstract summary\n\n\n\nExperts suggest Twitter is not a typical social network, with its topological characteristics making it more akin to a broadcast medium \u2013 comprising of a unique playing field of mass media, evangelists, and grassroots contributors (Cha, Benevenuto, Haddadi, &amp; Gummadi, 2012). Dissecting Twitter\u2019s affordances of anonymity, identity, and spreadability through differential association theory, statistics, and academic reports on digital community and identity, we explore how <a href=\"https:\/\/networkconference.netstudies.org\/2020OUA\/2020\/04\/26\/twitter-terrorism\/\" class=\"more-link\">Read more [...]<\/a>","protected":false},"excerpt":{"rendered":"<p>Abstract summary Experts suggest Twitter is not a typical social network, with its topological characteristics making it more akin to a broadcast medium \u2013 comprising of a unique playing field of mass media, evangelists, and grassroots contributors (Cha, Benevenuto, Haddadi, &amp; Gummadi, 2012). Dissecting Twitter\u2019s affordances of anonymity, identity, and spreadability through differential association theory, statistics, and academic reports on digital community and identity, we explore how Read more [&#8230;]<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"bgseo_title":"","bgseo_description":"","bgseo_robots_index":"index","bgseo_robots_follow":"follow","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[61,59,72,38],"class_list":["post-240","post","type-post","status-publish","format-standard","hentry","category-social","tag-social-media","tag-social-networks","tag-terrorism","tag-twitter"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/posts\/240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/comments?post=240"}],"version-history":[{"count":2,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/posts\/240\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/posts\/240\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/media?parent=240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/categories?post=240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2020OUA\/wp-json\/wp\/v2\/tags?post=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}