{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:08Z","timestamp":1761007088942,"version":"build-2065373602"},"reference-count":7,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Frequent users of social services such as Twitter are now familiar with the use of URL shortening services to produce compressed versions of actionable URLs. Although the typical user motivation for these is often taken to be convenience \u2013 particularly in the matter of reducing the amount of space taken by a link during a tweet, these shortening services are also used for various other purposes, including the collection of analytics for marketing purposes. In this poster we present the initial findings from our analysis of 350,000 tweets from Twitter on a subject close to the hearts of many ASIS&amp;T conference attendees \u2013 the TSA (transport security administration). These tweets, gathered over a period of six weeks, primarily collect together reactions to a number of events and announcements of both positively and negatively nature, and as such, contain a large number of encoded URLs. We show the result of back\u2010tracking URLs to their origin, demonstrating that it is now commonplace for URLs to be redirected through more than one redirection service. From analysis of the shortening services used we demonstrate that the majority of shortened URLs make use of one of a very small number of services, although these may be identified via an alias. Finally, we discuss the implications of these findings, both in terms of preservation and our ability to access the context of older Twitter conversations, and in terms of the implications for developers of user applications or content analysis platforms.<\/jats:p>","DOI":"10.1002\/meet.14504901381","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Clusters and constellations: Untwisting shortened links"],"prefix":"10.1002","volume":"49","author":[{"given":"Emma","family":"Tonkin","sequence":"first","affiliation":[]},{"given":"Heather D.","family":"Pfeiffer","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_9_2_1","unstructured":"Carmody T.(2011) A Tangled Web of Shortened Links. A study of link shortening reveals hidden strands of the Web.Technology Review. Retrieved May 16 2011 fromhttp:\/\/www.technologyreview.com\/news\/423170\/a\u2010tangled\u2010web\u2010of\u2010shortened\u2010links\/"},{"key":"e_1_2_9_3_1","doi-asserted-by":"crossref","unstructured":"Clemens E. K. Barnett S.andAppadurai A.(2007).The future of advertising and the value of social network websites: some preliminary examinations. ICEC '07: Proceedings of the ninth international conference on Electronic commerce.","DOI":"10.1145\/1282100.1282153"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","unstructured":"Day M.(2003).Preserving the Fabric of Our Lives: A Survey of Web Preservation Initiatives. T. Koch and I.T. S\u00f8lvberg (Eds.):ECDL 2003 LNCS 2769 pp.461\u2013472 2003.","DOI":"10.1007\/978-3-540-45175-4_42"},{"key":"e_1_2_9_5_1","unstructured":"dev.twitter.com(2012).The T.co URL wrapper. Retrieved May 15 2012 fromhttps:\/\/dev.twitter.com\/docs\/tco\u2010url\u2010wrapper"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"Rodrigues T. Benevenuto F. Cha M. Gummadi K.. andAlmeida V.(2011).On word\u2010of\u2010mouth\u2010based discovery of the web. Proceedings of IMC 11.","DOI":"10.1145\/2068816.2068852"},{"key":"e_1_2_9_7_1","doi-asserted-by":"crossref","unstructured":"Thomas K. Grier C. Paxson V.andSong D.(2011).Suspended Accounts in Retrospect: An Analysis of Twitter Spam Proceedings of IMC 11.","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_2_9_8_1","unstructured":"Yi.tl(2012).URL shorteners. Retrieved May 15 2012 fromhttp:\/\/yi.tl\/pages\/urlshorteners.php."}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901381","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901381","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:33:25Z","timestamp":1760960005000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":7,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901381"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901381","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}