recommended reading

Mapping the 'Geography' of the Internet

Sergey Nivens/Shutterstock.com

In case you didn’t know, muscle-car lovers have a thriving Internet community. Twitter users like @HookupMyRide and @CorvetteBlogger are among the chattiest sports-car enthusiasts, tweeting links and striking up conversations with other fans of fast cars. The influential drivers of the muscle-car blogosphere stick to what they like; they mostly share links and thoughts about cars. For that reason, it’s unlikely that they’d ever interact with Twitter users who focus on environmental issues – in fact, the two groups live in entirely separate neighborhoods of the Internet.

That may seem like a strange metaphor for the non-physical space of the Internet, but to John Kelly, the chief scientist at Morningside Analytics, it's quite apt. He spends his days mapping the "cyber-social geography" of the Internet, anlayzing who is talking to whom and what they’re talking about. While many web analytics companies focus on the users who are most influential across the entire Internet, Kelly said, his data show who’s influential in small, specific communities. This helps uncover a few interesting trends about who really gets heard in the public sphere of the Internet.

First, like the muscle-car lovers, people with shared interests often create isolated communities, talking among themselves about a limited set of topics. That means that people who share certain interests or viewpoints are less likely to interact with people who have different and possibly opposing priorities – for example, car lovers and environmental activists.

But Kelly’s maps also suggest two different models for becoming influential in the digital public sphere: Be like Oprah, who reaches lots of different people on many subjects, or be like the president of a very committed bowling club, who reaches a limited audience that probably cares a lot about that specific topic. The question is, are the "bowling club presidents" of the Internet really regular people who happen to love a certain topic? Data suggest that “traditional” influencers like companies and news organizations still have a lot of power, even in niche digital spheres.

Read more at The Atlantic Cities

(Image via Sergey Nivens/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.