2020
DOI: 10.1177/1461444820972389
|View full text |Cite|
|
Sign up to set email alerts
|

Proactive ephemerality: How journalists use automated and manual tweet deletion to minimize risk and its consequences for social media as a public archive

Abstract: Despite their ephemeral constantly changing nature, social media constitute an archive of public discourse. In this study, we examine when, how, and why journalists practice proactive ephemerality, deleting their tweets either manually or automatically to consider the viability of social media as a public record. Based on interviews conducted with journalists in New York City, we find many journalists delete their tweets, and that software-aided mass deletion is common, damaging Twitter’s standing as an archiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…We rely on expert interviews here since experts have at their disposal an “advantage of knowledge” (Meuser & Nagel, 2009, p. 18). The OOH is strategically ephemeral (Ringel & Davidson, 2022; Welsh, 2020) in that its existence is difficult to prove, and intentionally so. Therefore, harnessing the expertise of those who have attempted and/or succeeded in tracking and tracing its existence—journalists, fact-checkers, and researchers—becomes a key point of access and inquiry.…”
Section: Methodsmentioning
confidence: 99%
“…We rely on expert interviews here since experts have at their disposal an “advantage of knowledge” (Meuser & Nagel, 2009, p. 18). The OOH is strategically ephemeral (Ringel & Davidson, 2022; Welsh, 2020) in that its existence is difficult to prove, and intentionally so. Therefore, harnessing the expertise of those who have attempted and/or succeeded in tracking and tracing its existence—journalists, fact-checkers, and researchers—becomes a key point of access and inquiry.…”
Section: Methodsmentioning
confidence: 99%
“…Once a tweet is posted, it could be deleted for multiple legitimate reasons, for example, to correct mistakes, protect privacy (Ringel and Davidson 2020), or in regret (Zhou, Wang, and Chen 2016). Deletions can be performed by users through the Twitter app, website, third-party services (TweetDelete 2021; Matthews 2020), and the Twitter API.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have responded by developing algorithms for identifying different kinds of suspicious activities, for example, accounts controlled by bots (Yang et al 2019;Sayyadiharikandeh et al 2020) and groups of accounts coordinated to accomplish a task (Pacheco et al 2021). Most of these research efforts suffer from a common limitation, namely, the reliance on data provided by public APIs that exclude deleted content.…”
Section: Introductionmentioning
confidence: 99%