Government Technology

78 Percent of Tweets Either Conversations or Pointless Babble



August 17, 2009 By

Pear Analytics, a San Antonio, Texas-based market research firm, recently released the results of a study on Twitter. The study was designed to test the hypothesis that Twitter is being used primarily for self-promotion instead of helping users "join the conversation," Twitter's current motto.

To conduct the study, the company sampled 200 "tweets" over 10 consecutive business days between the hours of 11:00 a.m. and 5:00 p.m., for a total of 2,000 sampled tweets. These tweets were divided into six categories based on their content: news, spam, self-promotion, conversational, pass-along value (any tweet with an RT in it, e.g., what happens if you click the "tweet" button below this story) and pointless babble. Pear determined pointless babble to be a tweet detailing, for example, what a user was doing at any given moment, such as "watching a movie."

Out of the 2,000 tweets sampled, the winner, with 40.55 percent, was pointless babble. Conversational tweets -- people actually conversing over Twitter, came in second at 37.55 percent. The rest of the categories each came in at fewer than 10 percent.

The complete study can be read at http://www.pearanalytics.com. It features a number of interesting Twitter insights, such as charting tweets by time of day and day of week, as well as recommendations on the best time to use Twitter for maximum exposure.

 


| More

Comments

The Content Coach    |    Commented August 19, 2009

This shouldn't really be a big surprise to anyone. However, I think there is insider value...if you know the person posting the seemingly meaningless tweet, you have an idea what that person is saying or about. It is supposed to be connecting with friends, on the large part, so that needs to be taken into account.

The Content Coach    |    Commented August 19, 2009

This shouldn't really be a big surprise to anyone. However, I think there is insider value...if you know the person posting the seemingly meaningless tweet, you have an idea what that person is saying or about. It is supposed to be connecting with friends, on the large part, so that needs to be taken into account.

The Content Coach    |    Commented August 19, 2009

This shouldn't really be a big surprise to anyone. However, I think there is insider value...if you know the person posting the seemingly meaningless tweet, you have an idea what that person is saying or about. It is supposed to be connecting with friends, on the large part, so that needs to be taken into account.


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers