Advanced search

Showing result 1 - 5 of 232 essays matching the above criteria.

  1. 1. Influencers in Confinement : Measuring Covid-19’s Impact on Leadership in Pro- Eating Disorder Twitter Communities

    University essay from Linköpings universitet/Institutet för analytisk sociologi, IAS

    Author : Jacquelynn Ennis; [2024]
    Keywords : Social Network Analysis; Twitter; Pro-eating Disorder; Eating Disorders; Covid-19; Topic Modelling; Online Communities;

    Abstract : The Covid-19 pandemic presented unprecedented challenges, with global lockdowns impacting individuals on a profound scale. Many took to social media to cope with feelings of anxiety and isolation. READ MORE

  2. 2. The state of social media usage to fight malnutrition among children under the age of five years in Tanzania

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Debora Mbilinyi; [2023]
    Keywords : social media; nutrition literacy; malnutrition; behavior change communication; social media usage;

    Abstract : This study has evaluated how Tanzania Food and Nutrition Centre (TFNC), a government institution overseeing nutrition, uses social media to enhance the nutrition literacy of caregivers and parents of children under the age of five years. The study contributes to knowledge on how Tanzania’s resource-constrained health sector’s nutrition communication can benefit from social media by answering the following research questions: Which social media platforms and features does TFNC use to share nutrition knowledge pertaining to children under the age of five years? What kinds of nutrition knowledge pertaining to children under the age of five years does TFNC share on social media? How is nutrition knowledge pertaining to children under the age of five years posted on TFNC social media pages packaged? And, how frequently is nutrition knowledge pertaining to children under the age of five years repeated on TFNC social media pages? These questions have been answered from a social-behavioral change communication perspective that has combined the Media Ecology Theory and the Theory of Planned Behavior. READ MORE

  3. 3. Gaining Social Power In a Time of Conflict : A case study on how the two superpowers China and the US are using security branding on Twitter to gain social power during an ongoing war.

    University essay from Högskolan Väst/Institutionen för ekonomi och it

    Author : Emil Karlsson; Linda Wilsson; [2023]
    Keywords : Security Branding; Generic Frames; Digital Diplomacy; International Relations; Soft Power; Social Power; Superpower Rivalry; Twitter;

    Abstract : How are the two superpowers of the world using Twitter as a platform for gathering global support for their policies when tweeting about an ongoing international conflict? That is the question that is answered in this thesis through a small-N case study. A mixed-method content analysis, based on security branding and generic framing, was applied to the data to determine how security branding is used by the actors to acquire social power. READ MORE

  4. 4. Exploration of using Twitter data to predict Swedish political opinion polls with neural networks

    University essay from Lunds universitet/Matematisk statistik

    Author : Alexander Gren; Klara Lundgren; [2023]
    Keywords : Mathematics and Statistics;

    Abstract : This thesis aims to explore the possibility of using deep learning techniques to mine opinions on Twitter, with the objective to predict the political opinion distribution in Sweden. Different methods of gathering and annotating training data are evaluated to achieve accurate and reliable predictions. READ MORE

  5. 5. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Manjunath Kakkepalya Puttaswamy; [2023]
    Keywords : Apache Flink; Apache Spark; Big Data; Twitter; X;

    Abstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE