2012
DOI: 10.1515/mir-2012-0019
|View full text |Cite
|
Sign up to set email alerts
|

Using DiscoverText for Large Scale Twitter Harvesting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…One of the main reasons is that there are fewer transaction data sets available to researchers. While participation data are frequently publicly accessible online and research tools exist to create data sets from public social media content (e.g., Beyer, ; Shah, ), other types of transaction data, such as Web server logs, are often the proprietary property of the digital service provider. Some companies work with researchers and allow the publication of some research using this type of data (e.g., Bond et al, ; Hampton, Goulet, Marlow, & Rainie, ), but many do not.…”
Section: Types Of Digital Tracesmentioning
confidence: 99%
“…One of the main reasons is that there are fewer transaction data sets available to researchers. While participation data are frequently publicly accessible online and research tools exist to create data sets from public social media content (e.g., Beyer, ; Shah, ), other types of transaction data, such as Web server logs, are often the proprietary property of the digital service provider. Some companies work with researchers and allow the publication of some research using this type of data (e.g., Bond et al, ; Hampton, Goulet, Marlow, & Rainie, ), but many do not.…”
Section: Types Of Digital Tracesmentioning
confidence: 99%
“…Tweets were collected during the period from 5 June 2013 up until 25 January 2014 using DiscoverText (Beyer, 2012), a social media analysis platform that collaborates with GNIP – a social data provider which was in fact acquired by Twitter shortly after our data collection was completed. We had so-called Power Track access, meaning that our search string functioned as a filter in relation to the Twitter Firehose – the full and completely unfiltered stream of posts that are made on the platform.…”
Section: Methodsmentioning
confidence: 99%