Hassan Bashir; Amir Reza Tamaddon; Amin Mirshekari Soleimani
Abstract
With the increasing use of new communication technologies, public opinion management tools have also undergone fundamental changes; both in terms of method and theoretical foundations, there have been developments in the field of public opinion management that double the need to review and develop the ...
Read More
With the increasing use of new communication technologies, public opinion management tools have also undergone fundamental changes; both in terms of method and theoretical foundations, there have been developments in the field of public opinion management that double the need to review and develop the theoretical literature of the past. What is now being referred to as a new way of managing public opinion in recent years, and especially after the 2016 US election, is the issue of "social manipulation". The authors believe that Iran is one of the countries that is exposed to hostile social manipulation by regional and supra-regional powers due to its special communication position. To this end, with the framework of hostile social manipulation, the cyber actions of Saudi Arabia against the Islamic Republic of Iran have been studied. For the present study, more than 900,000 data related to Iran in Arabic were extracted by Twitter from the social network Twitter until 2021 & 2022 years; Then, using the network analysis method, the activity of Saudi users has been specially studied. The results of the study show that Saudi Arabia, with its hostile social manipulation techniques, especially by investing in cyber tools, seeks to discredit, destabilize, weaken, and sometimes promote specific groups and institutions that are important to the country's competitive power.
Razieh farshid; faezehsadat bahrololoumi tabatabai; nosrat riahinia
Abstract
The purpose of this study is to analyze and compare the concepts of media literacy and computer literacy based on the works indexed in the Web of Science .The present study is applied in terms of purpose and descriptive in terms of methodology with a scientometric approach in which network analysis techniques ...
Read More
The purpose of this study is to analyze and compare the concepts of media literacy and computer literacy based on the works indexed in the Web of Science .The present study is applied in terms of purpose and descriptive in terms of methodology with a scientometric approach in which network analysis techniques have been used. The research community of scientific products is related to the subject of media literacy and computer literacy.Findings indicate that 1736 works have been indexed in the field of media literacy and 772 works in the field of computer literacy. Fedro in the field of media literacy and Grasser AC have the most products in the field of computer literacy. Among the countries, the United States is in the first place in two areas, among which Iran with 11 works is in the position of 31 computer literacy and with 8 works is in the position of 19 media literacy. The co-occurence of media literacy works was 9 clusters and computer literacy works were 6 clusters. There are 327 common keywords in the thematic clusters of these two domains. Also, paying attention to the field of media literacy and computer literacy as one of the components of society can play an important role in the growth and promotion of individuals. In the analysis and results of the present study, suggestions were made for managers and politicians to better clarify the issues in this area and to invest better in its development.
Hossein Kermani; Marziyeh Adham; Amirali Tafreshi
Abstract
This paper provides a comprehensive and reliable approach to doing social research on Persian Twitter. Twitter has been one of the most favorable social platforms in Iran for years. Despite such popularity, research on Twitter has not been grown as it is supposed to be. Therefore, we are trying to fill ...
Read More
This paper provides a comprehensive and reliable approach to doing social research on Persian Twitter. Twitter has been one of the most favorable social platforms in Iran for years. Despite such popularity, research on Twitter has not been grown as it is supposed to be. Therefore, we are trying to fill this gap by suggesting a complete approach in this article. This approach is based on social network analysis, ethnographic content analysis, and social media critical discourse studies. Combining these methods, we are going beyond the limitations of current approaches which focus on either users or tweets. This approach provides researchers with a convenient method from the selection of gathering data strategy and time to statistical and final analysis. We suggest helpful and reliable concepts and tools to research on Twitter in each step. Moreover, we present a strategy to coding users’ demographic variables in addition to an approach to reach a close and valid reading of tweets. This approach could consist of a convenient basis for future studies.
Milad Mir Mohamad Sadeghi; Abdul Ali Ghavam; Afsaneh Mozaffari
Abstract
Using Social Network Analysis (SNA), the present article explored a network containing 7885 people and 9927 ties among Arab-speaking ISIS supporters on Twitter. The aim of this research was to explore the structure of the relationship among previously mentioned users, investigate the advantages and disadvantages ...
Read More
Using Social Network Analysis (SNA), the present article explored a network containing 7885 people and 9927 ties among Arab-speaking ISIS supporters on Twitter. The aim of this research was to explore the structure of the relationship among previously mentioned users, investigate the advantages and disadvantages of this structure for ISIS, and identify the key nodes based on centrality measures. Based on the findings of this study, the network of the Arab-speaking ISIS supporters in Twitter during February and March 2019 consisted of a decentralized deep structure with a long diameter and clusters which had a weak tie with one another and the whole network. This structure could lead to flexibility, stability, and agility of the network and it could also preserve the anonymity of the key ISIS supporters. The researchers determined the nodes with the highest centrality scores and divided the ISIS supporters into 3 distinctive groups: key users, connectors, and followers.
Hamed Talebian; hadi khaniki
Abstract
In cyberspace, a hyperlink from one website into another one is a link that connects various websites into each other. Connecting sites by hyperlink provides a nested network from information resources that its extent hypothetically covers the whole web space. In this research, I try to study a hyperlink ...
Read More
In cyberspace, a hyperlink from one website into another one is a link that connects various websites into each other. Connecting sites by hyperlink provides a nested network from information resources that its extent hypothetically covers the whole web space. In this research, I try to study a hyperlink network which is formed among sites presented by so-called “Filtering Page” at “www.peyvandha.ir” URL. This research aims to study link structure in this networks and recognize key nodes or that of key sites. To do so, after reviewing theoretical foundations of two basic approaches in Webometrics & Hyperlink Network Analysis in the field of social network analysis, I consider a 2370 list of religious-cultural sites presented by filtering page on 5 different sections as an input list for web crawler of SocioBot. The findings indicate that there are just 3 hyperlink networks with very low density in macro level and just 2 key sites in micro level, as well.