Michele Weigle Profile picture
Sep 28, 2022 10 tweets 10 min read Read on X
For #WebArchiveWednesday, I'm highlighting some of the ways that #webarchives have been used to study #disinformation over the past few years and bring together some of the work that @WebSciDL has done in this area. @oducs @ODUSCI /1
ws-dl.blogspot.com/2022/09/2022-0…
Examples include how #webarchives have been used to:
* examine how webpages have been changed
* corroborate or refute posted screenshots
* study archived social media posts
* investigate metadata and past behavior of particular social media accounts
/2
This post is essentially a follow-up to @WebSciDL MS student @lesley_elis's recent post that looked at how journalists use web archives. ws-dl.blogspot.com/2022/08/2022-0…

Below are links to some of the @WebSciDL projects that I mention in my blog post. /3
Two of the projects were from this year's @oducsreu @NSF REU Site in Disinformation Detection and Analytics, work done by undergrads @calebkbradford and @haleybragg17. /4
ws-dl.blogspot.com/2022/08/2022-0…
The analysis of screenshots and mementos of blog.reidreport. com landed @phonedude_mln on TV a couple years ago. /5
There are several references to the work of @WebSciDL PhD students @kritika_garg @HimarshaJ and alum @ibnesayeed (now Web and Data Scientist @internetarchive) analyzing the quality of Twitter mementos. /6
ws-dl.blogspot.com/2020/12/2020-1…
PhD student @HimarshaJ kicked off our study of how well Instagram is archived. @WebSciDL /7
ws-dl.blogspot.com/2020/11/2020-1…
PhD student @tarannum_zaki is currently investigating techniques to distinguish fake screenshots of social media posts from real ones. @WebSciDL /8
We are working with @WebSciDL alum and @DrexelCCI faculty @machawk1 on a @US_IMLS funded project to study how well online ads are archived. /9
ws-dl.blogspot.com/2022/08/2022-0…
Thanks to research from @amelia_acker and @katestarbird and collaborations and discussions with my @WebSciDL colleague @phonedude_mln for piquing my interest in this intersection of #webarchives and #disinformation! /end

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Michele Weigle

Michele Weigle Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @weiglemc

Nov 18, 2022
If you've downloaded your Twitter archive, note that the "Your archive.html" page renders links in your tweets as t .co links. If Twitter dies, so does the t .co redirection service.

See below to further preserve the links in your tweets. Image
Inside your Twitter archive, the file data/tweets.js contains your tweet data, including information about links.

The snippet here shows the "urls" structure corresponding to the t .co in my previous tweet. It includes the t .co "url" as well as the "expanded_url". Image
If you want to be able to later resolve the t .co URLs, you can push them to the @waybackmachine now.

Use this awk line to grab all of the t .co URLs in your tweets.js file:
awk -F '\"' '/\"url\" :/ {print $4}' tweets.js

gist.github.com/weiglemc/312a1…
Read 5 tweets
Nov 16, 2022
🎉🎓Congratulations to @CorrenMcCoy for the successful defense of her PhD dissertation, "A Relevance Model for Threat-Centric Ranking of Cyber Vulnerabilities". This is great work -- we are so proud!
@phonedude_mln, @Faryane, Ross Gore from @VMASC_ODU
@WebSciDL @oducs @ODUSCI
🧵 Corren and dissertation com...Corren and title slide, &qu...
Motivation: Most vulnerabilities released on Patch Tuesday are rated Important. If everything's important, then nothing is.
@CorrenMcCoy ImageImage
RQ1: What factors can be used to model security threats based on the attacker's skill level and motivation?
RQ2: What characteristics can be used to develop a vulnerability ranking policy that improves ROI of applied mitigations?
@CorrenMcCoy Image
Read 7 tweets
Oct 7, 2021
1/ To celebrate #InternetArchive25, I wrote about using the @waybackmachine to look back over 20 years of LSU women's basketball's main webpage @LSUwbkb @WebSciDL
ws-dl.blogspot.com/2021/10/2021-1…
2/ I started with reliving my experience at a classic LSU vs. Tennessee game from 1999 (that LSU won, of course).
3/ First, I found that the URI of the current webpage, lsusports.net/sports/wbball/, is fairly new, so I needed to do more investigation to find URIs that had previously been used. web.archive.org/web/*/https://…
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(