Wanted: Access To Social Media Data

Within days of Russia’s recent invasion of Ukraine, several social media companies effectively reduced the circulation of Russian state-backed media and anti-Ukrainian propaganda. Facebook, said that  it closed down about 40 accounts, part of a larger network that had already spread across Facebook, Instagram, Twitter, YouTube, Telegram, and Russian social media. 

“They ran websites posing as independent news entities and created fake personas across social media platforms including Facebook, Instagram, Twitter, YouTube, Telegram and also Russian Odnoklassniki and VK" says a post from Facebook's parent company, Meta... “We’re recommending that people in Ukraine and Russia take steps to strengthen the security of their online accounts to protect themselves from being targeted by threat actors.”

The accounts being warned about used fake identities, with profile pictures, most likely generated with Artificial Intelligence (AI) deepfake toolsposing as news editors, engineers, and scientists in Kyiv. The perpetrators behind the network also created fake news websites that portrayed Ukraine as a failed state betrayed by the West. Disinformation campaigns like this have become pervasive in the vast realm of social media.

Because outsiders don't get access to the inner workings of the handful of companies that run the digital world, the details of where information originates, how it spreads, and how it affects the real world. It’s hard to know about, let alone quantify.

One of the main barriers to greater access is corporate policies aimed at protecting users’ privacy. Social media users are reasonably concerned that outsiders might get their hands on sensitive information and use it for theft or fraud. Users expect information shared in private accounts to stay private, for very good reasons.

Digital Social Behaviour

Human social behaviour has rapidly shifted to digital media services, whether Gmail for email, Skype for phone calls, Twitter and Facebook for micro-blogging, or WhatsApp and SMS for private messaging. This digitalisation of social life offers researchers an unprecedented world of data with which to study human life and social systems. However, accessing this data has become increasingly difficult. 

Current regulations were set up to protect the privacy of people’s data, not with the idea of facilitating research that will inform society about the impact of social media. 

More and better research depends on social media companies creating a window for outsiders to peer inside.
But for years, Facebook has created hurdles for researchers, journalists and civil society groups attempting to access data via more traditional web-scraping methods and the company’s application programming interfaces. 

Facebook has blocked investigative tools from journalists and researchers that track and targeting by disabling the functionality of browser plugins, disallowed the sharing and data-sets amongst researchers and rolled back access for research projects. 

Researchers can only access what Facebook wants them to see and until policies exist for regulated platform data transparency, researchers have to scrape, access, preserve and share data independently as best they can. It’s up to researchers themselves to repudiate Facebook’s unhelpful transparency efforts.

Right now, many machine learning algorithms are being built to do what traditionally would be performed by a human in many of the analytical approaches, both quantitative and qualitative. 

It is important to understand that whilst the mention of ‘machine learning’ and ‘algorithms’ may hint at quantitative techniques which might be scientifically verifired, all these algorithms are doing is replacing the work a human would do, the analytical output is still qualitative. The techniques used and the processes taken to apply them must be viewed separately to be usefully understood. 

Facebook:      NiemanLab:     Gov.UK:    Morning Consult:     University of York:     SAGE:  

You Might Also Read: 

Algorithms, Lies & Social Media:

 

« Some Apps Come Loaded With Malware
Costa Rica Declares A State Of Emergency Following Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

Hackinsure

Hackinsure

Front Row Insurance’s Hackinsure provides protection against online hazards including Cyber Liability, Theft & Fraud, Business Interruption, Extortion & Ransomware, Forensic Investigation.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.