Twitter Equity Firm Value

Slides:



Advertisements
Similar presentations
Building Corporate Relationships using Social media THE SALVATION ARMY 2012 CRD CONFERENCE.
Advertisements

August 23, 2013 Social Media Audit. Overview  Goals –Evaluate current social networking status –Identify trending topics and social influencers –Provide.
BUSINESS GETS SOCIAL How to integrate social media into your business.
Stock Market Prediction Using Sentiment Detection C. LEE FANZILLI ADVISORS: PROF. DVORAK AND PROF. WEBB.
Using Social Media to Communicate and Support Your School A Closer Look at Twitter.
Ulli F. P. Spankowski Stuttgart Financial / Boerse Stuttgart March 29th 2012 Wisdom of the Crowds – What to make of web-based sentiment?
Proposed Strategy for growing the on line community members of the network and how to use the Social Media as levers of engagement and participation.
Tweets Metadata May 4, 2015 CS Multimedia, Hypertext and Information Access Department of Computer Science Virginia Polytechnic Institute and State.
Noland Hoshino, High Five Media Seanette Corkill, Frontdoor Back.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
Problem Based Learning To Build And Search Tweet And Web Archives Richard Gruss Edward A. Fox Digital Library Research Laboratory Dept. of Computer Science.
MARCIA W. DISTASO, PH.D., APR ASSOCIATE PROFESSOR OF PUBLIC RELATIONS PENNSYLVANIA STATE SOCIAL MEDIA MEASUREMENT.
UW Social Media Certificate Program
Information Storage and Retrieval(CS 5604) Collaborative Filtering 4/28/2016 Tianyi Li, Pranav Nakate, Ziqian Song Department of Computer Science Blacksburg,
Twitter Based Research Benny Bornfeld Mentors Professor Sheizaf Rafaeli Dr. Daphne Raban.
INTRODUCTION TO SOCIAL MEDIA. MARKETING TOOL Global Networking 24/7 Building a Following Giving to Others Building Quality Relationships Online Sales.
DEVRY CIS 336 W EEK 7 G ROUP P ROJECT T ASK 5 Check this A+ tutorial guideline at
Big Data Processing of School Shooting Archives
Social Media and IPPOG.
Stock Trading with Microblog Sentiments
Social Media and Marketing Plan
Name: Sushmita Laila Khan Affiliation: Georgia Southern University
Topical Authority Detection and Sentiment Analysis on Top Influencers
Collection Management (Tweets) Final Presentation
Rdoc2vec Jake Clark, Austin Cooke, Steven Rolph, Stephen Sherrard
Common Crawl Mining Team: Brian Clarke, Tommy Dean, Ali Pasha, Casey Butenhoff Manager: Don Sanderson (Eastman Chemical Company) Client: Ken Denmark.
Twitter Overview of today’s presentation: how to tweet
Background Check Website for R4 OpSec, LLC
Flipkart is an e-commerce marketplace founded in 2007 by Sachin Bansal and Binny Bansal. Registered in Singapore and it operates in India, where it is.
Turning Real-Time Data in Real-Time Insight
Zenodo Data Archive Irtiza Delwar, Michael Culhane, John Sizemore, Gil Turner Client: Dr. Seungwon Yang Instructor: Dr. Edward A. Fox CS 4624 Multimedia,
Activity n° 2.
SOCIAL COMPUTING Homework 3 Presentation
Correlating Stock Price Shifts with Predictions from Twitter
VR4GETAR CS4624: Multimedia, Hypertext and Information Access
Visualizations of School Shootings
Trail Study Kevin Cianfarini, Shane Davies, Marshall Hansen, Andrew Eason … CS4624: Multimedia, Hypertext, and Information Access Instructor: Dr. Edward.
Leveraging the Power of Likes, Hashtags & Shares
Tweet Collections Multimedia, Hypertext, and Information Access
Clustering tweets and webpages
Introduction to Data Programming
Social Media Marketing Analytics 社群網路行銷分析
Hey everyone, I’m Sunny …harsh caroline xavier
Graph Query Portal Amit Dayal David Brock
Multimedia Database Virginia Polytechnic Institute and State University Blacksburg, VA CS 4624 Multimedia, Hypertext and Information Access Client.
Social Media and IPPOG.
Collection Management Webpages Final Presentation
Stream Field Final Project Presentation
Event Trend Detector Ryan Ward, Skylar Edwards, Jun Lee, Stuart Beard, Spencer Su CS 4624 Multimedia, Hypertext, and Information Access Instructor: Edward.
Tracking FEMA Kevin Kays, Emily Maier, Tyler Leskanic, Seth Cannon
Marketing Research.
Validation of Ebola LOD
LucidWorks: Vectorize Workflow Module
News Event Detection Website Joe Acanfora, Briana Crabb, Jeff Morris
Cryptocurrencies: A Brief Look & Sentiment Analysis
Michael Shuffett Virginia Tech Blacksburg, VA
Text Transformation May 5th, 2015 CS Multimedia/Hypertext
Paleontology Topic Trends
Tweet URL Analysis Guoxin Sun, Kehan Lyu, Liyan Li
Social Interactome Recommender Team
Katrina Database SearchKat
Adam Lech Joseph Pontani Matthew Bollinger
Enhancing Substantive Analytical Procedures with Third-Party Generated Information from Social Media My research focuses on … examine the usefulness of.
Open source intelligence. Twitter scraping using Twint
Best Useful Social Media Tips For Online Reputation Presented By:- Abhinav Shashtri.
2019 APTA Workshops World of Customer Care
Adult Day Services Promotional Video
Austin Karingada, Jacob Handy, Adviser : Dr
Python4ML An open-source course for everyone
COMM 464 class 3 Agenda Marketplace news
Presentation transcript:

Twitter Equity Firm Value Nathan Guinn, Rohan Rane, Christian Wiskur, Jacob Smith, and Erik Agren CS 4624 Multimedia, Hypertext, and Information Access Instructor: Dr. Fox Virginia Tech, Blacksburg VA 24061 May 2, 2018

Outline Project Overview Data Scraping and Gathering Twitter and Stock Data Analysis Company Guide Limitations Acknowledgements

Our Goal Analyze the ways companies can mitigate stock failure following a data breach using Twitter Research the role of users Provide a company guide Guidelines following a data breach using social media

Data Scraping Gather firm tweet data for 707 Data Breaches 120 days before and 30 days after Gather user tweet data 10 days before and 30 days after Keywords: security breach, hacker, theft, fraud, steal Gather stock price of the companies 3 days before and after the breach 2 weeks ago we spoke with our client, Ziqian Song We sat down together and figured out the main requirements for the project First, we’ll use tools to gather information about firms responses on twitter We’ll analyze this data for interaction with users as well as importance of tweets based on likes and retweets Next, we’ll gather user twitter data by querying the tweets dataset with keywords like “security”, “breach”, or a given “company’s name” Within this data set we’ll identify important users who may have more influence because of their position or having a large number of followers After we gather all the relevant twitter data, we’ll use different tools to analyze the breach effect on the company by analyzing their stock price We’ll combine all this information and determine whether or not a company’s response was successful Finally, we’ll propose an ideal response for companies based upon our findings

Tweet Collection Method CSV File Tweet CSV File Event ID Date Company Name Tweet Python Script: GetOldTweets API Event Date Retweets Twitter Account Favorites Mentions Hashtags Keywords File

Additional Tweet Data Collection Announcements vs. Replies Hyperlinks User biography, followers, following, verified http://www.londonlovesbusiness.com/londons-best/twillionaires-the-7-richest-people-on-twitter/5441.article

Stock Data Client provided stock data Raw stock data - unusable Over one million rows Scrub and clean Join with breach information Create new CSV for each event

Stock Data Event Stock CSVs Stock Return CSV EventID Date Python Script: stockManipulation.py Formatted Date Ticker Ticker Price Company Name Price

Data Analysis Use Fama French Model to analyze stock data Expected stock price vs actual stock price 3 days before and after Compute sentiment analysis Specifically the user tweets Analyze abnormally good and abnormally bad stock performance 2.5 standard deviations above and below Many didn’t have tweet data

Plotting Our Data

Company Guide Focus on replying to customers instead of making announcements This will help fight against tweets of Negative Sentiment Always reply to influential users Verified High Follower Count Try to keep tweet count down The breaches most tweeted about had the largest drops

Limitations Twitter data on breaches before 2010 Some breaches had an excessive amount of tweets to analyze Equifax breach had 90,000 tweets This limited how many abnormal companies to include in analysis Scope of project wasn’t well defined initially New requirements added to project throughout Underestimation of machine learning difficulty Data collection was delayed

Possible Improvements Add parallelization to several scripts Have a different data sharing platform than Google Drive Dedicate more time towards data analysis

Acknowledgements We would like to thank the following people: Our client Ziqian Song Our professor Dr. Fox Our TA Jin

References Hendricks, Kevin, et al. “Article Tools.” Management Science, Institute for Operations Research and the Management Sciences, 14 Oct. 2015, pubsonline.informs.org/doi/abs/10.1287/mnsc.2014.1987. Lee, Lian Fen, et al. “The Role of Social Media in the Capital Market: Evidence from Consumer Product Recalls.” Journal of Accounting Research, 27 Mar. 2015, onlinelibrary.wiley.com/doi/10.1111/1475-679X.12074/abstract.