Background The increasing volume of health-related social media activity, where users connect, collaborate, and engage, has increased the significance of analyzing how people use health-related social media. Objective The aim of this study was to classify the content (eg, posts that share experiences and seek support) of users who write health-related social media posts and study the effect of user demographics on post content. Methods We analyzed two different types of health-related social media: (1) health-related online forums—WebMD and DailyStrength—and (2) general online social networks—Twitter and Google+. We identified several categories of post content and built classifiers to automatically detect these categories. These classifiers were used to study the distribution of categories for various demographic groups. Results We achieved an accuracy of at least 84% and a balanced accuracy of at least 0.81 for half of the post content categories in our experiments. In addition, 70.04% (4741/6769) of posts by male WebMD users asked for advice, and male users’ WebMD posts were more likely to ask for medical advice than female users’ posts. The majority of posts on DailyStrength shared experiences, regardless of the gender, age group, or location of their authors. Furthermore, health-related posts on Twitter and Google+ were used to share experiences less frequently than posts on WebMD and DailyStrength. Conclusions We studied and analyzed the content of health-related social media posts. Our results can guide health advocates and researchers to better target patient populations based on the application type. Given a research question or an outreach goal, our results can be used to choose the best online forums to answer the question or disseminate a message.
more »
« less
Spotlight Tweets: A Lens for Exploring Attention Dynamics within Online Sensemaking During Crisis Events
In this article, we introduce the concept of a spotlight social media post —a post that receives an unexpected burst of attention—and explore how such posts reveal salient aspects of online collective sensemaking and attention dynamics during a crisis event. Specifically, we examine the online conversation surrounding a false missile alert in Hawaii in January 2018. Through a mixed-methods analysis and visualizations, our research uncovers mechanisms that lead to rapid attention gains, such as spotlighting —when a user with existing influence confers attention by sharing others’ content with their audience. We highlight how spotlight social media posts (specifically spotlight tweets ) are distinct from other heavily shared content and that they offer insight into previously overlooked patterns in information exchange. We additionally reveal that attention dynamics may alter the social position of spotlight post authors immediately afterward (and possibly in the long term). We argue that spotlight social media posts offer a productive window for understanding online collective sensemaking, and we discuss how this can inform social media platform design and serve as a basis of future research.
more »
« less
- Award ID(s):
- 1749815
- PAR ID:
- 10428072
- Date Published:
- Journal Name:
- ACM Transactions on Social Computing
- Volume:
- 6
- Issue:
- 1-2
- ISSN:
- 2469-7818
- Page Range / eLocation ID:
- 1 to 33
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Many scientists make use of social media and take various approaches to humor in their posts to encourage online public engagement, yet little is known about how publics respond to particular types of online science humor. This study investigates the behavioral effects of the presence of different types of science humor, specifically anthropomorphism, wordplay, and the two combined, shared by a scientist on Twitter. Individuals who experienced higher levels of mirth after exposure to humorous science content were more likely to leave a comment on the social media post. Additionally, individuals' need for cognition moderated the relationship between humor exposure and mirth, as well as the relationship between mirth and leaving a comment. These results and future research are discussed.more » « less
-
null (Ed.)A social media phenomenon that has received limited research attention is the advent and propagation of viral online challenges. Several of these challenges entail self-harming behavior, which, combined with their viral nature, poses physical and psychological risks for both participants and viewers. The objective of this study is to identify the nature of what people post about the social media challenges that vary in their level of risk. To do so, we conducted a qualitative analysis of three viral social media challenges, the Blue Whale, Tide Pod, and Ice Bucket challenges, based on 180 YouTube videos, 3,607 comments on those YouTube videos, and 450 Twitter posts. We identified common themes across the YouTube videos, comments, and Twitter posts: (1) promoting education and awareness, (2) criticizing the participants, (3) providing detailed information about the participants, (4) giving viewers a tutorial on how to participate, and (5) attempting to understand this seemingly senseless online behavior. We used social norm theory to discuss what leads people to post about the challenges and how posts intended to raise awareness about harmful challenges could potentially create a contagion effect by spreading knowledge about them, thereby increasing participation. Finally, we proposed design implications that could potentially minimize the risks and propagation of harmful social media challenges.more » « less
-
Over-sharing poorly-worded thoughts and personal information is prevalent on online social platforms. In many of these cases, users regret posting such content. To retrospectively rectify these errors in users' sharing decisions, most platforms offer (deletion) mechanisms to withdraw the content, and social media users often utilize them. Ironically and perhaps unfortunately, these deletions make users more susceptible to privacy violations by malicious actors who specifically hunt post deletions at large scale. The reason for such hunting is simple: deleting a post acts as a powerful signal that the post might be damaging to its owner. Today, multiple archival services are already scanning social media for these deleted posts. Moreover, as we demonstrate in this work, powerful machine learning models can detect damaging deletions at scale. Towards restraining such a global adversary against users' right to be forgotten, we introduce Deceptive Deletion, a decoy mechanism that minimizes the adversarial advantage. Our mechanism injects decoy deletions, hence creating a two-player minmax game between an adversary that seeks to classify damaging content among the deleted posts and a challenger that employs decoy deletions to masquerade real damaging deletions. We formalize the Deceptive Game between the two players, determine conditions under which either the adversary or the challenger provably wins the game, and discuss the scenarios in-between these two extremes. We apply the Deceptive Deletion mechanism to a real-world task on Twitter: hiding damaging tweet deletions. We show that a powerful global adversary can be beaten by a powerful challenger, raising the bar significantly and giving a glimmer of hope in the ability to be really forgotten on social platforms.more » « less
-
null (Ed.)Over-sharing poorly-worded thoughts and personal information is prevalent on online social platforms. In many of these cases, users regret posting such content. To retrospectively rectify these errors in users' sharing decisions, most platforms offer (deletion) mechanisms to withdraw the content, and social media users often utilize them. Ironically and perhaps unfortunately, these deletions make users more susceptible to privacy violations by malicious actors who specifically hunt post deletions at large scale. The reason for such hunting is simple: deleting a post acts as a powerful signal that the post might be damaging to its owner. Today, multiple archival services are already scanning social media for these deleted posts. Moreover, as we demonstrate in this work, powerful machine learning models can detect damaging deletions at scale. Towards restraining such a global adversary against users' right to be forgotten, we introduce Deceptive Deletion, a decoy mechanism that minimizes the adversarial advantage. Our mechanism injects decoy deletions, hence creating a two-player minmax game between an adversary that seeks to classify damaging content among the deleted posts and a challenger that employs decoy deletions to masquerade real damaging deletions. We formalize the Deceptive Game between the two players, determine conditions under which either the adversary or the challenger provably wins the game, and discuss the scenarios in-between these two extremes. We apply the Deceptive Deletion mechanism to a real-world task on Twitter: hiding damaging tweet deletions. We show that a powerful global adversary can be beaten by a powerful challenger, raising the bar significantly and giving a glimmer of hope in the ability to be really forgotten on social platforms.more » « less
An official website of the United States government

