Beantin

James Royal-Lawson

social networking

How many Twitter users in Sweden 2013?

Almost half a million Swedish Twitter accounts is the quick answer. Twitter in Sweden has seen an strong period of growth during the past year.

Hampus Brynolf and Intellecta Corporate have released the results of their third Swedish Twitter census.


475474 Swedish Twitter accounts

The number of Twitter accounts that at some point during a 30 day period in February/March 2013 tweeted in Swedish was 475,474. This is an increase of 59% in the 10-11 months since Intellecta presented the 2012 results.

For each potential Swede found, the words from their latest 100 tweets are analised. If enough words are Swedish, then they are classed as Swedish and their follows/followers analyised.

Healthy growth

In April last year there were 290,000 Swedish accounts. The first Swedish Twittercensus In December 2010 found just over 90,000 accounts. This year’s growth rate of 59% is tiny in comparison to the growth by approximately 300% during 2011.

Not all of the 460,000 accounts are active. Quite the opposite. Around half of these accounts haven’t written a single Tweet during the month that was analysed.

A number of those accounts, although not actively writing, will be actively reading – but this is impossible to calculate.

This total also excludes protected accounts as it’s not possible to analyse the language of their private tweets.

Very active Swedes

The number of very active Swedes – where one or more tweet is written (on average) during the 30 day period – also rose. Up from 52,887 to 79,516. A rise of around 50%.

It would be interesting to see how many of those 50,000 who were tweeting daily in 2012 were still tweeting daily in 2013. Many of them will be, but far from all.

The number of active Swedes – that is those who wrote a tweet during the 30 days of the census – was 219,732.

Diversity

Twitter is no longer a niche network occupied by early adopters. It is now broadly established in Sweden. Analysis of the bios associated with the accounts shows a rich diversity of occupations, people, and interests on Twitter.

A fascinating fact thrown out by Hampus during the presentation was that the number of degrees of separation between Swedish Twitter users was usually 2 (sometimes 3).

Although everyone is relatively close on Twitter, the clusters found were very strong and certain clusters were very separated from others. There isn’t one Twitter, there are many.

An interactive visualisation of all the Swedish Twitter accounts found and their clustering according to analysis of their bio can be found here.

An established platform

The previous Twitter census was performed directly after a significant peak in number of new registrations. It was always going to be very difficult for the growth levels this year to match last year.

That said, with there being a Twitter account for every 1 in 20 Swedes and the rich diversity of people present on the platform, Twitter has established itself quite definitely In Sweden as a communication, broadcast and social platform.

Or perhaps, because of the clustering, we should say that it’s one platform but multiple channels. That’s tactically important for businesses to remember…

James Royal-Lawson+ is a freelance digital strategist based in Stockholm Sweden.

Social denial of service attacks

In computing, a denial of service attack has been a practice deployed by groups and individuals to limit or bring down a web site for a number of decades.

In the age of social networking the denial of service attack has taken the leap from a pure networking phenomenon to a social weapon.

Through the use of social networks it’s possible for large numbers to communicate, plan and execute various ideas. At the same time, due to limitations in how social media presences are managed, individuals (or relatively small groups of people) can cause irreparable damage for brands.

The damage that can be caused isn’t just limited to online. We saw during the London riots last year how relatively easy it is for ideas to travel into the offline world.

Spread rapidly

With the viral way in which comments, ideas (and propaganda) can spread rapidly both within and between social networks – irrespective of whether they are true or false.

I’m beginning to lose track of the amount of times that today is the day that Doc went back to in Back To The Future or the latest celebrity death-hoax.

It’s also very simple to set up a hate group or write a negative blog post or submit a less than favourable review.

There’s plenty already been written about online reputation management and social media crisis management.

What I wanted to highlight was how easy it is to do execute more direct harm to a brand or a company that simply generating negative publicity or spreading poor and disappointing customer experiences.

Reporting content

Most social networks have the ability to report offensive or infringing material – and that’s a good thing.

The automated nature of many reporting processes means that nightmare situations can quickly occur. Such as when Sexual Futurist’s Facebook page was closed seemingly because of a oversight when using Facebook advertising that resulted in a significant number of complaints.

Another example is that of Bizarre magazine that a couple of years ago found multiple aspects of it’s web presence closed down after updates on various services were flagged as inappropriate.

This is an example of a social denial of service attack.

Poo attack!

More bizarre was how a Swedish career-coach and social media profile was recently subjected to a “poo attack” where a “friend” uploaded a number of pictures of faeces to her Facebook wall before subsequently blocking her – making it difficult to discover or do anything about the problem – effectively a SDoS attack.

Pushing a company to bankruptcy?

Earlier this month, one of the largest electronic retail chains here in Sweden, Expert, went bankrupt. A few days later the stores re-opened their doors for a stock liquidation sale.

Outside many of the stores there were huge queues of people who were hoping to grab a bargain.

Long queue of people outside an electronics store in Stockholm

What if people get a taste for this kind of liquidation sale? What if people encouraged each other (via social media) not to shop at a particular chain?

We’ve seen this kind of campaigning for “legitimate” causes to try and change a company’s behaviour. There are also numerous review sites where company’s are judged and rated – negatively and positively.

How long before the power of social forces a legitimate company into bankruptcy? It might sound a little far fetched, but with the tools and platforms available to everyday people, it’s more simply achievable than you may think.

It might even happen unintentionally. Also earlier this month we saw the example of how a 15 year old Dutch girl’s party invitation going viral spreading to 30000 people, 3000 of which turned up in the small village of Haren in the Netherlands causing the cancellation of the party and the drafting in of 900 riot police to secure the town.

Social denial of service attacks

So social denial of service attacks can be of varying size and style:

A relatively small number of individuals disrupting a person’s or organisation’s social media activities by abusing the tools put into place to help protect users from abuse.

A large number of individuals drowns an individual or organisations social media activities in unwanted content, or spreads content that is incorrect, misleading or undesirable.

The first mention I can find about SDoS attacks is by Joe Gregorio and how working group mailing list has it’s progress (deliberately) derailed with a constant stream of objections and wildly divergent proposals.

The phenomena was brought up again by Reuven Cohen in 2009 in relation to a spate of social hacktivism attacks.

Can it be prevented?

Many social denial of service attacks are impossible to predict or prevent; perhaps at best you can be aware of the possibility and perhaps be prepared – especially if you rely very heavily on a particular social platform.

How do you think you could prepare or prevent a social denial of service attack?


James Royal-Lawson+ is a digital strategist and web manager based in Stockholm Sweden.

Social Intranets & digital natives

One particular statistic from the Swedish internet use report for 2011 was how everyone in Sweden in the 16-25 age group uses social media.

For a fair while we’ve been discussing the expectations of young employees in the workplace, but this statistic is about as big as a wake-up call as an organisation can get.

It’s time for companies to stop slacking, pull their intranet socks up and get social.

Digital natives

Let’s paint a picture. Jesper is 25. Not long out of university and has spent pretty much as long as he can bother to remember using MSN instant messaging, texting, and socialising with his friends via Facebook. All the time.

He’s been receiving constant feedback, answers, and opinions around the clock. At the same time he’s been giving feedback, answers and opinions to his peers around the clock. It’s a totally natural part of his life. A digital native.

Social media sites blocked

So what happens when he enters the corporate world and sits behind his laptop at work? He replicates his natural behaviour outside of the workplace. He expects to be able to network with his colleagues and his professional contemporaries in the same way as he does naturally outside of work.

But your organisation hasn’t embraced social business. The intranet is still a place for pushing news articles from internal communication. Facebook access is blocked. Internally, email is still the king.

Jesper is starting to regret accepting this job and realises that next time, he’s going to do his company culture homework a lot better.

He then pulls out his iPad from his bag and opens up all his normal social networks, invites all of his colleagues to be friends, or follows them, or connects with them and starts working.

Carry on regardless

Circumnavigating your attempts at blocking sites, working outside of your firewall, he has filled in the gaps. It doesn’t matter any more whether you think it’s a good idea to have a social intranet, or haven’t budgeted for one – the digital natives in your workplace are going to network regardless.

Providing social and collaborative tools inside the firewall (or within the realm of the organisation) will help you retain some of Jesper’s knowledge though his social behaviour and turn it into a digital asset for your company.

Banner for IntraTeam Event 2012James Royal-Lawson+ is a digital strategist, web and intranet manager based in Stockholm Sweden.

This blog post was born over a beer and a chat in Stockholm with intranet pioneer Mark Morrell and Martin Risgaard, Social Media Strategist at Arla Foods.

What gets shown in Facebook’s Ticker?

Facebook has rolled out their Ticker to all users as part of their September updates (if you haven’t got it yet, you soon will!).

Combined with other changes to the appearance of the news feed, this has raised a fair few questions from people about their privacy settings and what gets shown where.

I’m going to try to explain it for you.

So how does it work?

The visibility of every update you post to Facebook is controlled by the privacy settings associated to it. Using the inline audience selector you can control the privacy settings at the time you post it, and adjusted them at any point afterwards.

Screenshot from Facebook

The news feed now just shows a selection of updates based on a number of factors (which i’m not going to go into during this post). If you want to see everything that is happening the world of Facebook as defined by your friends (and people subscribed to) then you need to take a look at the ticker in the right hand column.

xxx

The activity firehose

This ticker shows everything people who you’ve subscribed to are doing on Facebook that has a privacy setting that you are included in. You are subscribed to your friends, and all their types of updates by default.

You can unsubscribe from a persons activity, and you can even turn off certain types of activity from a specific person. So if someone listens to far too much music on Spotify that rubs you the wrong way, you can untick Music and Videos.

xxx

By and large though, what this means is that you may see more Facebook activity than you are used to seeing – if you bother to look at the Ticker in the right hand column that is!

Examples

Whenever any of your friends write someone on someone else’s wall, for example, you’ll see that action appear in your ticker.

If any of your friends comment on a person’s update who isn’t your friend, if that update has public or “friends of friends” as it’s privacy settings, then you will see not only your friends’ comment, but also all the other (non-public) comments everyone else has written.

If someone publishes a public update (of whatever kind; a status, a photo, event, action) then any comments and likes made to that public update will also be public. In this case, public means totally public. Not-logged-into-Facebook public.

Keep your eye on the grey icon

So what matters now is that you pay special attention to the little grey icon visible at the bottom of each update. If this has a little globe on it, whatever you say will be public. If it has a couple of silhouettes, then hover over the icon and see what it says. It will explain the reach of the update, and therefore the potential exposure of anything you write.

xxx

xxx

xxx

Remember though, privacy can be changed afterwards. So something you once said in private may become public (and vice versa). Even if you said it years ago…


is a freelance web manager and strategist based in Stockholm Sweden.

Google Social search: followers and follows

This week Google rolled out a new feature to it’s SERPs and snippets when logged in. If you have a Google Profile and Google has indexed who you are connected to, there’s a chance that you will see a small profile picture along with a name and the text “shared this on <someplace>”.

a search result showing that a friend had share this page on Twitter

This is Google taking another step forward in integrating information it gathers about your social graph into it’s search results. This, of course, has a number of implications. You can read a bit more about the feature and what Google themselves have said about it in this Tech Crunch article.

Your connections

What isn’t apparent at first is who, exactly, are your friends. My initial presumption was that it was just the people I followed (on Twitter), but after a few searches it became apparent that it was both the people I follow and the people who follow me.

two snippets one showing sharing information from a follower on Twitter, the other sharing information from someone I follow

As you can see from the example above, the 4th and 5th placed search results are both indicated as being shared by people I’m connected to. I follow Alan Colville (Klout of 44), but Steve Cook (Klout of 23) follows me (I have Steve on a list, but I don’t directly follow him)..

Impact on SERPs

How much, if any, have those two tweets impacted upon the order of the results? Well, by logging out and doing a clean search for the same phrase the same two results are now 4th (still) and 9th. The second result has now dropped 4 places.

the two snippets from the previous example are 4 places further apart when not logged in

Ok, a number of additional factors could also be playing a role in moving that 9th placed result up to 5th – and as I didn’t do this test with the same Google account before this feature was launched I can’t say for sure how much of this movement is down to the shared link data. But I suspect it’s playing some part in it.

Importance of Twitter

What this does mean though, is that suddenly, following people on (public) social networks (in particular twitter) could lift the ranking of pages you’ve shared in those people’s search results. From an SEO perspective, the number of people you follow (and who follow you) became something to consider.

Shared links and little profile pictures makes Google’s use of this data really very obvious – but that’s limited to people logged into Google. What we can’t see as easily is how much Google is using this data in it’s regular organic search results, but we have seen from other case studies that it seems to already be a factor.

1 of 3
123
Reload this page with responsive web design DISABLED