Kansas State University


IT News

Tag: twitter

The NodeXL Series: Conducting a Twitter User Network Crawl (Part 6)

Per the prior entry, if a hashtag search is very time-dependent and ephemeral / transitory, the user accounts and relationships created around entities (people, organizations, companies, robots, and “cyborgs”) tend to be more stable.  While the research does not necessarily show that a follower / following sort of reciprocal relationship means that all Tweets are read and engaged, these do show a sense of some initial commitment and public declaration of a kind of relationship.  (Those interested I the research may find that there are surprises, such as that popularity and positive word-of-mouth does not necessarily translate to sales commitments.  Further, there is sufficient system gaming by using ‘bot and other accounts that a more accurate read of a user network requires some more digging and critical thinking analysis.)

First, it helps to pick a “target.”  A search on a search engine of an organization’s name “and Twitter” will often lead to the account information. For our purposes, we’ll go with the Centers for Disease Control and Prevention (CDC), in part because they have a clear social media strategy to engage their constituents.

A Limited Crawl of the CDCGov User Network on Twitter

The official Twitter account for the CDCGov site is https://twitter.com/CDCgov.  (Do read the fine print carefully to make sure that you haven’t landed on a farce site.  There are many pretenders, some not-so-subtle, and others very elusively so.)

Continue reading “The NodeXL Series: Conducting a Twitter User Network Crawl (Part 6)”

Mapping the Twitterverse of K-State President Kirk Schulz

With the popularization of online social networks (OSNs), various software tools have been created to extract social data for research.  One open-source freeware tool is NodeXL, which is a plug-in to more recent versions of Microsoft Excel (Office 2008 and 2010 on PCs, and Office 2011 on Macs).

"Tweeting K-State University President"

Continue reading “Mapping the Twitterverse of K-State President Kirk Schulz”

Cleaning out your Twitter feed

It is always a good idea to clean house once in a while, and this includes any social networks you may use. There may be stale or out-of-date information or posts that you would like to remove and, in some cases, clean out the whole thing and start over.

In the Twitter world, more and more tools are becoming available to help you manage your Twitter feeds and clean out old posts or completely delete everything that the public can see. One tool is an iOS app called DLTTR Continue reading “Cleaning out your Twitter feed”

April 16 registration deadline for free Twitter class

The registration deadline for the free, online course on “Getting Started with Twitter” is Monday, April 16. This four-week course begins Tuesday, April 17, and is designed to introduce K-Staters to the fundamental concepts and uses of Twitter.

Each week, participants will be required to do the readings and exercises assigned. Assignments can be done at the participant’s convenience, but must be completed prior to the start of the next week’s assignments. You can expect to spend 1-2 hours a week on the course. Questions about the course can be sent to Cathy Rodriguez (cathyr@k-state.edu).

iTAC offers free Twitter class

The Information Technology Assistance Center is offering a free, online course on “Getting Started with Twitter.” This four-week course begins Tuesday, April 17, and is designed to introduce K-Staters to the fundamental concepts and uses of Twitter. The course requires pre-registration.

Learn how to network and share short bites of information with others. This course covers: Continue reading “iTAC offers free Twitter class”

IT security roundtable June 4: Risks of social networking

Social networks like Facebook, Twitter, YouTube, and MySpace are a fact of life (and for some, obsessions!), especially for the current generation of students at K-State. The reality is if you want to communicate with that generation, you need to  have a presence in social media. The other reality is that hackers/criminals know this is where people spend their time and therefore target these platforms.

Social networks have also permanently altered the privacy landscape on many fronts — the information we post about ourselves, what others post about us, and the information about you that the social networking sites themselves harvest and perhaps share with third parties.

Join us 9-10 a.m. this Friday, June 4, in Union 213 (note that it will only last one hour this time) for a discussion on the security risks of social networking. Continue reading “IT security roundtable June 4: Risks of social networking”

"Twitter Tools" TechBytes rescheduled for April 1

Eric Dover will present “Twitter Tools” at 1:30 p.m. Thursday, April 1, in 501 Hale Library. (Editor’s note: This session was rescheduled from March 4.) This session will cover possible uses of Twitter and cool tools such as TweetDeck, to help organize and send Tweets. Bring your own Twitter experiences, as we will also be having an open discussion about Twitter and how others use it.

Keeping up with IT security news at K-State

The world of IT security is very dynamic — the threats are constant, persistent, and evolving, as are the tools and strategies for combating the threats. To help K-Staters sift through the volumes of IT security information produced daily, K-State’s IT security team maintains an IT security threats blog with information gleaned from a variety of sources. Information is posted about new vulnerabilities and/or patches in applications used commonly at K-State, current attacks seen at K-State, warnings about spear phishing scams and other forms of fraud, and other security-related news relevant to K-State.

To accommodate the variety of ways people prefer to get information, K-State’s IT security news is available in several ways:

  1. Webpage – visit the K-State IT Security Threats Blog daily
  2. E-mail – subscribe to the SIRT-THREATS mailing list
  3. Twitter – follow KSU_IT_Threats on Twitter
  4. RSS feed

Continue reading “Keeping up with IT security news at K-State”

Spring 2010 TechBytes series begins Thursday, Feb. 4

The TechBytes series begins Feb. 4.  Sessions are scheduled 1:30-2:30 p.m. in Hale Library.

Thursdays TechBytes topic Location
Feb. 4 Windows 7 501 Hale Library
Feb. 11 Yolink Search 501 Hale Library
Feb. 18 Time to Talk 501 Hale Library
Feb. 25 Many Uses of WordPress 301A Hale Library
March 4 Twitter Tools 501 Hale Library
March 11 Zimbra Calendar 501 Hale Library
March 25 Google Wave 501 Hale Library

TechBytes seminars are free and open to the K-State community. This series shares technology innovations with the campus community, whether it’s a new technology or a new way to use an existing technology. Visit the TechBytes website for descriptions of the sessions.